mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 10:42:17 +00:00
Auto-Update: 2024-07-24T16:00:17.731857+00:00
This commit is contained in:
parent
97aa7a28c3
commit
3afe87de53
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2010-0232",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2010-01-21T19:30:00.900",
|
||||
"lastModified": "2023-12-07T18:38:56.693",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:30:29.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-24",
|
||||
@ -20,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -53,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -67,98 +89,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:sp4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11AFB73A-1C61-40F1-8415-E4D40BB2699B"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA2CBE65-F4B6-49AF-983C-D3CF6C172CC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "4B2C1DB8-97B9-4D44-906C-3EFA100B01CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_nt:3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18CE48AB-D353-40AE-A1B2-0E024FD3B1C6"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "A6FBF171-B6B6-4244-AE1A-8E09FE44161E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D3B5E4F-56A6-4696-BBB4-19DF3613D020"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F6EA111-A4E6-4963-A0C8-F9336C605B6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CFB1A97-8042-4497-A45D-C014B5E240AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F9C7616-658D-409D-8B53-AC00DC55602A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFF81F4B-7D92-4398-8658-84530FB8F518"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AE15F6C-80F6-43A6-86DA-B92116A697A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:sp2:x32:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9517571A-BC1A-4838-A094-30081A86D36C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C162FFF0-1E8F-4DCF-A08F-6C6E324ED878"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:sp1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49F99773-D1AF-4596-856A-CA164D4B68E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:sp2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F916C0D-3B99-46F3-A7AE-BAF067361499"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:sp3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E69F8C21-5996-4083-A02A-F04AE948CEA9"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -168,57 +115,85 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://blogs.technet.com/msrc/archive/2010/01/20/security-advisory-979682-released.aspx",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.immunitysec.com/pipermail/dailydave/2010-January/006000.html",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lock.cmpxchg8b.com/c0af0967d904cef2ad4db766a00bc6af/KiTrap0D.zip",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2010/Jan/341",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/38265",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://securitytracker.com/id?1023471",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.microsoft.com/technet/security/advisory/979682.mspx",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/archive/1/509106/100/0/threaded",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/37864",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
"Broken Link",
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA10-040A.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
@ -226,20 +201,33 @@
|
||||
"url": "http://www.vupen.com/english/advisories/2010/0179",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-015",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55742",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8344",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2011-1889",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2011-06-16T20:55:02.543",
|
||||
"lastModified": "2018-10-12T22:01:05.957",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:30:00.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-24",
|
||||
@ -20,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -78,27 +100,51 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://secunia.com/advisories/44857",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/48181",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1025637",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-040",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67736",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12642",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2011-3544",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2011-10-19T21:55:01.097",
|
||||
"lastModified": "2018-01-06T02:29:19.410",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:29:45.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-24",
|
||||
@ -20,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -67,13 +89,460 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "893B13BC-9448-4AFD-BCC4-F289A523949B"
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.6.0",
|
||||
"matchCriteriaId": "FD1AF818-452D-46FE-BD02-05E2E94DDE30"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD3FC81B-4E54-44D8-8118-1E256FE619E2"
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A420DA5-1346-446B-8D23-E1E6DDBE527E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8CA8719-7ABE-4279-B49E-C414794A4FE1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC92B7EC-849F-4255-9D55-43681B8DADC4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ABC1045-7D3D-4A14-B994-7E60A4BB4C9C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F3C1E65-929A-4468-8584-F086E6E59839"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "42C95C1D-0C2E-4733-AB1B-65650D88995D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47A9F499-D1E3-41BD-AC18-E8D3D3231C12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D45B0D7E-BA0F-4AAA-A7BA-2ADA4CC90D94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D58A3E4F-2409-440A-891E-0B84D79AB480"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FC2226B-CFEF-48A4-83EA-1F59F4AF7528"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F29DC78F-4D02-47B4-A955-32080B22356C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81A4204E-6F50-45FB-A343-7A30C0CD6D3D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6E07069-D6EE-4D44-94A6-CDCA4A50E6F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4B151882-47C0-400E-BBAB-A949E6140C86"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DB4F19E-DFC4-42F4-87B9-32FB1C496649"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "301E96A3-AD2F-48F3-9166-571BD6F9FAE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9215D9-DB64-4CEE-85E6-E247035EFB09"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "352509FE-54D9-4A59-98B7-96E5E98BC2CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3EC13D3-4CE7-459C-A7D7-7D38C1284720"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8CDCD1B4-C5F3-4188-B05F-23922F7DE517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ACABC935-5DD6-4F85-992E-70AD517EF41D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6152036D-6421-4AE4-9223-766FE07B5A44"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE8B0935-6637-413D-B896-28E0ED7F2CEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30B480BC-0886-4B19-B0A5-57B531077F40"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA1990D-BBC2-429C-872C-6150459516B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DC2887E-610B-42FE-9A96-1E2F01BF17A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "130849CD-A581-4FE6-B2AA-99134F16FE65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D375CECB-405C-4E18-A7E8-9C5A2F97BD69"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50AF5AE9-5314-4CE7-95A7-CE6D1B036D23"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B10B19C-FA60-4CD5-AA61-A9791F6CECA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52EEEA5A-E77C-43CF-A063-9D5C64EA1870"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "003746F6-DEF0-4D0F-AD97-9E335868E301"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF830E0E-0169-4B6A-81FF-2E9FCD7D913B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6BAE3670-0938-480A-8472-DFF0B3A0D0BF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0EC967FF-26A6-4498-BC09-EC23B2B75CBA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update7_b32:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "270DE3F5-C51F-4E62-B532-7773BCF8CC7C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02781457-4E40-46A9-A5F7-945232A8C2B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update9_b31:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5ED1BA76-BCA4-483F-B238-39FA792984BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update9_b32:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D450D249-DD3B-435F-B006-C44A215A3DC4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.6.0",
|
||||
"matchCriteriaId": "BD9FCDEB-2854-42FF-8BF4-A50890B3F08F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB864346-1429-46B5-A91E-A1126C486421"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F199B346-B95E-4DCA-B750-148A36D559BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1714BDEF-6B0E-42BB-9510-3F9B52E170BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "830A3A51-F17A-4C61-8F5C-6A4582A64DA6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DE0E496-719D-4CEF-837F-B060A898099F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B02F361-0C64-4CB8-8DAD-A63F1A9CC025"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD4CC3E2-7BEA-4D8C-811C-C5012327A9AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F63A8AC-893D-4D75-B467-85E70B62541D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7823AE6-CB18-47DE-8A4F-1F98394B7237"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "381EFA43-DB73-48EA-A4B1-F451EF60D845"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "77C54E00-0197-4C87-9BFF-01A099AC3006"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64AD6007-EB92-4D0E-A0CB-8FFDDB61AA6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7415177F-A2FE-47AB-8D92-194A4F6D75C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52FA600C-08B6-4143-9C72-DB31E489DE3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EF13B96D-1F80-4672-8DA3-F86F6D3BF070"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1A2D440-D966-41A6-955D-38B28DDE0FDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1C57774-AD93-4162-8E45-92B09139C808"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD7C4194-D34A-418F-9B00-5C6012844AAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2752B83A-6DD2-4829-9E4F-42CDDCBC38C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "964CCFD6-316A-48C6-9A6B-7CFD1A1FB027"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DC8771D7-9531-4A1D-B2DE-FAA7A7549801"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C59C275-5964-4E5D-BE80-BA4EA34BEA62"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47C1922B-37E8-4009-97C7-B243F6F96704"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68957C57-EC74-4896-B97D-E936DC6AD31C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B3A8681-3EAC-4D02-811A-5FCCCC7B5635"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFAA351A-93CD-46A8-A480-CE2783CCD620"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4B153FD-E20B-4909-8B10-884E48F5B590"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F21933FB-A27C-4AF3-9811-2DE28484A5A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61B7A9E2-14BE-40E3-AF51-1BA6FC612170"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2B20041-EB5D-4FA4-AC7D-C35E7878BCFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3C3C9C7-73AE-4B1D-AA85-C7F5330A4DE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1D8BB8D7-D5EC-42D6-BEAA-CB03D1D6513E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "37B5B98B-0E41-4397-8AB0-C18C6F10AED1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0228195-41B4-4145-B8A4-7B974456ABA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44F8FB6D-3602-4263-9814-CCB64B8D1926"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB106FA9-26CE-48C5-AEA5-FD1A5454AEE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FF6C211-AD55-40FE-9130-77164E586F62"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D3257E5-17DB-4E02-9A8E-DD0E4D4339DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F40DB141-E5B3-4EC2-9E2F-2E27414FCCB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3391456D-86B0-457B-83BB-4C74DA0ED634"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA88EAC0-FD2D-4B38-8944-D4B6C3BD6FE7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C12DF03E-6E61-41DF-A283-D16AB356B6A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5831D70B-3854-4CB8-B88D-40F1743DAEE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEB101C9-CA38-4421-BC0C-C1AD47AA2CC9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA302DF3-ABBB-4262-B206-4C0F7B5B1E91"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9A8EBCB-5E6A-42F0-8D07-F3A3D1C850F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CD8A54E-185B-4D34-82EF-C0C05739EC12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD27AF64-5AA9-40F0-9308-2B4196FE7653"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FFC7F0D-1F32-4235-8359-277CE41382DF"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -87,265 +556,58 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:*:update_27:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.6.0",
|
||||
"matchCriteriaId": "9F67F2BE-367C-4700-AE28-DA082325FF9D"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3A4FEC7-A4A0-4B5C-A56C-8F80AE19865E"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18"
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:satellite_with_embedded_oracle:5.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2A12684-8CB8-49A6-8E06-1E1AE5B43E87"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CF5C5B9-2CB9-4CD8-B94F-A674ED909CC3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BFB9EA23-0EF7-4582-A265-3F5AA9EC81B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C367B418-659E-4627-B1F1-1B1216C99055"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CD5E6D4E-DDDD-4B45-B5E9-F8A916287AF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7358492A-491C-491E-AEDF-63CB82619BAA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3DACAAF-AFDC-4391-9E85-344F30937F76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECEDE405-CEF6-4E52-A8AE-28B9274B2289"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_23:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5559C2B-9A93-4EFC-BE31-32C9ADD4D5F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_24:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "029E1F1D-2A77-4258-9D4F-6D31E827DF5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_25:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D2F2BE2-3022-4DC9-8505-F597F8CE1192"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_26:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A44CCE27-EE9F-4A66-B65A-24D015CE2764"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD30DAEB-4893-41CF-A455-B69C463B9337"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:*:update_27:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.6.0",
|
||||
"matchCriteriaId": "3FB18875-CC4B-49AC-B038-44824BECBB7E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBCD143C-057D-4F42-B487-46801E14ACF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49260B94-05DE-4B78-9068-6F5F6BFDD19E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4FDE9EB-08FE-436E-A265-30E83B15DB23"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B08C075B-9FC0-4381-A9E4-FFF0362BD308"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F587E635-3A15-4186-B6A1-F99BE0A56820"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "188D2242-7D16-4F8E-AB61-4663804AAC17"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_23:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40271AA6-B0E7-461D-8903-414FE4E7109D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_24:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2231339D-4DF9-43CA-BC63-BD1EE1C17759"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_25:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A67ACAEB-D1B4-42C7-BEEC-8B5D8AFEBCB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_26:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "342D28DD-2AF4-489F-BAC7-29745C153726"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6"
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "D1D7B467-58DD-45F1-9F1F-632620DF072A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -355,66 +617,115 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=132750579901589&w=2",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://secunia.com/advisories/48308",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201406-32.xml",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2011-1384.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/50218",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id?1026215",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/USN-1263-1",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70849",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13947",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-3346",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2013-08-30T20:55:06.230",
|
||||
"lastModified": "2017-09-19T01:36:40.247",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:29:18.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-24",
|
||||
@ -20,6 +20,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -53,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -67,483 +89,45 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57"
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0",
|
||||
"versionEndExcluding": "9.5.5",
|
||||
"matchCriteriaId": "413B5753-2B8D-44F6-B3A3-3CB4C9E8B68E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5A5A316-88A0-4C32-A05A-1EDC74831731"
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.0",
|
||||
"versionEndExcluding": "10.1.7",
|
||||
"matchCriteriaId": "46FE52E1-6878-41E8-9898-B0C93DB1A711"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC"
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.0.03",
|
||||
"matchCriteriaId": "64498BAE-6B93-4171-987C-DA0D7E5586B6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*",
|
||||
"matchCriteriaId": "BCF823BA-69E2-4BFA-A779-5652B98B8403"
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0",
|
||||
"versionEndExcluding": "9.5.5",
|
||||
"matchCriteriaId": "59FB20F5-387E-4DB3-A2D5-E027C678B771"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593"
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.0",
|
||||
"versionEndExcluding": "10.1.7",
|
||||
"matchCriteriaId": "085F0347-0232-481A-8275-E19A9A0631AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6928580-8A0C-40C8-9FCA-452BFAC86390"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "27511A34-2631-4461-A361-F1073820BE08"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA6471B0-C717-4ED5-9726-AE01FE5FEBE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*",
|
||||
"matchCriteriaId": "54510A26-9F44-413B-AA65-828438192AB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1998E572-FB0D-4F37-98FD-5D5B50D04FED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8FA0B8C3-8060-4685-A241-9852BD63B7A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC6758E8-474A-4D64-AB29-DF484F3EE6AF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4AB9BBDE-634A-47CF-BA49-67382B547900"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F56B1726-4F05-4732-9D8B-077EF593EAEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F28D056-FBD4-4220-8326-BA4D6FFB193C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A258374F-55CB-48D2-9094-CD70E1288F60"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "627B0DA4-E600-49F1-B455-B4E151B33236"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "361B2A72-9C21-4D71-A04D-5C68E1B947E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54BD8F96-BB75-4961-B1E0-049F2273100D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3563311C-2685-4A43-9D3D-A747A9851676"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C14B310-65F0-475D-A2DD-0AD706805A99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2A630C3-6CC0-409E-B77C-D0AA2DBD482B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "356A0FAF-A25C-4D11-A70F-94B311B5778E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "51589BA6-E573-45FE-B778-D778AD049F59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "958768B5-ABA3-4843-986D-499AD480832B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "31278B7A-954C-4C44-8422-197C8E8C2F0F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0335CEAA-ED55-46AA-98D9-693733CDA68C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39E332C3-6ABF-4BFE-9C27-7D581BD286AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "314014C8-527A-4D6D-B9BF-30084178C9B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D12CA81D-6CDD-4FB4-8DE2-004D783BADE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AF167B4-0D05-490A-9A11-0447D8AA441B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0673141-9FA2-4C20-A224-0F46F8CB2F9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD194E0C-6699-4927-AC72-4D3339AF2AE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:9.5.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BEB429B0-E3E1-41F1-9B75-C0A60E38F23F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B57C5136-7853-478B-A342-6013528B41B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*",
|
||||
"matchCriteriaId": "353F77A1-E19C-4126-A10C-5A86B5C36E56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC1E1EE7-379E-4047-962D-0A311EB0DB1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*",
|
||||
"matchCriteriaId": "D57B9AEA-000B-49BF-BDBF-1CC7642F837A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C113D6BE-88CD-4670-A0FA-8E78EBAF9A81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4FC7DF0-7006-4805-9CA3-9A950DAA8D51"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3CA4B45-E643-4705-9B6C-8598A5357326"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADD314C8-A849-46C6-9ADD-72A2DF4C3219"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9EFDECFD-E02F-4545-939B-8C18A0BD82A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0D1565F5-8627-445B-AC76-662C08F215D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B10B4387-A6DB-4563-843E-0CF50F6293E0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D917DF13-8582-455E-A8E6-3334F36553A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04E4C131-8681-4A7E-B4E1-A9E44FBFB29D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10D5B006-F8CD-4B51-A5B6-A282C95C6C19"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "51C67ABD-5800-46DD-9E81-2A586698BC90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9FF4675-A9FF-4B0F-BBC6-D29B6324D27D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B508C5CE-1386-47B3-B301-B78DBB3A75D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DDC2EEB6-D5EC-430F-962A-1279C9970441"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DC590C7-5BDE-4E46-9605-01E95B17F01F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DCFE67F4-6907-4967-96A3-1757EADA72BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A328CC7F-5D02-4C7C-82CE-139EB2689C18"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F56EC75-4C65-4CD7-981D-823E1411CD6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E2D30C1-BDE8-4C1C-A8B3-A635A74E5D94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB6F49FE-2332-4CAF-A11D-CDE46A71447F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D0D8BBD-F727-4957-8128-10A4C456FBD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C107680A-DC95-454D-9315-9223A803A0EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "196213BA-0A50-4D0C-A959-EF9F8EB92095"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53433777-A33B-4265-96EE-36DC935ACB00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1DDDCC9-EC55-42D4-8116-4D60BC3E8749"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCDF625D-358F-4359-897A-0188CCD20AD8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.5.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5083821C-7D10-43E9-ACAC-19C43F7B6D26"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9731EFE2-A5BE-4389-A92D-DDC573633B6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9B4B357-27C7-4926-936C-A100A7AD538B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEE3D3B-C94C-4A85-B2C2-E4A72A88F4FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "978027C8-4DF6-4C18-A31D-1ACFBA857E9F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366E85EF-ED5F-4D4D-9CBE-E69F7248CB2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56C05D36-1343-4571-9886-E1AE8952E096"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5FBE0589-567D-4440-A51F-4EEC0A29DD44"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "823940EF-8B5F-44B0-8C74-2290A39DD15B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6944168-B6E8-4267-AE42-6E926B9CCB56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35D7E162-657C-4E1A-B394-80E457B3E366"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2F7EC9A-2CD6-4C75-8D2C-F48F1ACCEFF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3597B29D-1871-460A-A128-86C6BB777F36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E72C3C61-511E-4977-B029-70277C68E24D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47478166-EE66-4837-A6C0-0A519F9EDD26"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4E8E909-3277-429B-9CB2-973A606BB4A8"
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.0.03",
|
||||
"matchCriteriaId": "847908BF-1CD9-485F-93D7-5EB600DD7220"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -555,12 +139,16 @@
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb13-15.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19054",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-5065",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2013-11-28T00:55:04.677",
|
||||
"lastModified": "2018-10-12T22:05:24.417",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:29:06.787",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"evaluatorComment": "Per: http://technet.microsoft.com/en-us/security/bulletin/ms14-002\n\n\"This security update also addresses the vulnerability first described in Microsoft Security Advisory 2814486.\"",
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
@ -21,6 +21,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -54,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -68,18 +90,18 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2978BF86-5A1A-438E-B81F-F360D0E30C9C"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C0C7D2B-0AA5-4E82-B58B-2668A0EAC2E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:*:*",
|
||||
"matchCriteriaId": "68592FA5-6CD3-41A3-A4DA-C1C472297FF2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -99,16 +121,26 @@
|
||||
"url": "http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/ms-windows-local-privilege-escalation-zero-day-in-the-wild.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-002",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/37732/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-4902",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2015-10-22T00:00:03.093",
|
||||
"lastModified": "2022-05-13T14:38:26.663",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:28:47.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-24",
|
||||
@ -82,18 +82,328 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9907A48A-6F6A-47C9-86AD-0834E1CB30E7"
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D32C4C3-F0B1-4FE0-B36D-C959F8A19A83"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63A5916F-9EDC-48E3-A3D3-9BF98CD5BC63"
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A9570F9-CB9A-4E85-BAD4-7CF36E6D45A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15C71821-E1E2-4083-92FF-C0FE10443556"
|
||||
"criteria": "cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "615D100B-EFB3-49B1-9CBC-5AEE8259CD9A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4840254-CC76-4113-BC61-360BD15582B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85EA16E0-9261-45C4-840F-5366E9EAC5E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "967EC28A-607F-48F4-AD64-5E3041C768F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE1D81A1-CD24-4B17-8AFD-DC95E90AD7D0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F3BF4697-F1F9-446A-AB1E-7EB7DDEBC036"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D38A5DF8-5B7F-45EF-8CD3-119E1CE96751"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "90BE67DA-1F52-43DD-8610-8F8D414C0189"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C84EAAE7-0249-4EA1-B8D3-E039B03ACDC3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2148300C-ECBD-4ED5-A164-79629859DD43"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "837F0D24-99B3-4093-A45A-53ADB0367FCF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "357FDE3E-2248-4BCD-B726-97C4D92FDCB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E420B889-BB89-4B64-B0E0-7E9B8545B959"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B908AEF5-67CE-42D4-961D-C0E7ADB78ADD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F8EB695-5EA3-46D2-941E-D7F01AB99A48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29BBF1AC-F31F-4251-8054-0D89A8E6E990"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D8D654F-2442-4EA0-AF89-6AC2CD214772"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BCF87FD-9358-42A5-9917-25DF0180A5A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9835090F-120A-4A53-B4A8-375DD6999167"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8E5B5F9E-D749-45E5-8538-7CED9620C00C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "188019BF-3700-4B3F-BFA5-553B2B545B7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B8B2E32-B838-4E51-BAA2-764089D2A684"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4319B943-7B19-468D-A160-5895F7F997A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A584AAA-A14F-4C64-8FED-675DC36F69A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D373A806-8A25-4BD4-8511-879D8755C326"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CFE6C909-798B-4B7A-9BD4-6741933DBC1F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E9A24D0C-604D-4421-AFA6-5D541DA2E94D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A2E3637-B6A6-4DA9-8B0A-E91F22130A45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "634C23AC-AC9C-43F4-BED8-1C720816D5E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "37CE1DC7-72C5-483C-8921-0B462C8284D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8821E5FE-319D-40AB-A515-D56C1893E6F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AE981D4-0CA1-46FA-8E91-E1A4D5B31383"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F732C7C9-A9CC-4DEF-A8BE-D0F18C944C78"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0257D57-ABF4-49FF-AA59-1B82FAA6D147"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
|
||||
"matchCriteriaId": "35BBD83D-BDC7-4678-BE94-639F59281139"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
|
||||
"matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
|
||||
"matchCriteriaId": "E534C201-BCC5-473C-AAA7-AAB97CEB5437"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
|
||||
"matchCriteriaId": "2470C6E8-2024-4CF5-9982-CFF50E88EAE9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "55C5561F-BE86-4EEA-99D4-8697F8BD9DFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15FC9014-BD85-4382-9D04-C0703E901D7A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2076747F-A98E-4DD9-9B52-BF1732BCAD3D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D41A798E-0D69-43C7-9A63-1E5921138EAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1831D45A-EE6E-4220-8F8C-248B69520948"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A633996-2FD7-467C-BAA6-529E16BD06D1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -103,94 +413,162 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/77241",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1033884",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2016:1430",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/201603-11",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-0099",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2016-03-09T11:59:09.590",
|
||||
"lastModified": "2018-10-12T22:11:03.800",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:28:23.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-24",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -74,7 +74,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -88,13 +88,13 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -108,18 +108,13 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C28897B-044A-447B-AD76-6397F8190177"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "36559BC0-44D7-48B3-86FF-1BFF0257B5ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -133,8 +128,8 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -144,31 +139,65 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/84034",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1035210",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/39574/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/39719/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/39809/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/40107/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-5195",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2016-11-10T21:59:00.197",
|
||||
"lastModified": "2023-11-07T02:33:23.770",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:27:14.490",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-24",
|
||||
@ -26,19 +26,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
@ -280,6 +280,105 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "772E9557-A371-4664-AE2D-4135AAEB89AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.1",
|
||||
"versionEndExcluding": "7.0.14",
|
||||
"matchCriteriaId": "EA10748B-5F96-4A9B-B673-8E7C87F852D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.1.0",
|
||||
"versionEndExcluding": "7.1.8",
|
||||
"matchCriteriaId": "214A410F-7160-4E3A-BCCE-378FF0D962EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:hci_storage_nodes:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "855D6A52-F96F-4CA0-A59C-4D42173F22E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "212E1878-1B9A-4CB4-A1CE-EAD60B867161"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager_for_clustered_data_ontap:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "392D82A3-21BC-4CE1-A0AC-62A90468F0A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F74F467A-0C81-40D9-BA06-40FB8EF02C04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -324,215 +423,188 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -540,6 +612,7 @@
|
||||
"url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -548,6 +621,7 @@
|
||||
"url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -556,6 +630,7 @@
|
||||
"url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -564,6 +639,7 @@
|
||||
"url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -572,6 +648,7 @@
|
||||
"url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -700,8 +777,7 @@
|
||||
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -812,6 +888,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -820,6 +897,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -828,6 +906,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -836,6 +915,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -844,6 +924,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -852,6 +933,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -860,6 +942,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -868,6 +951,7 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -876,6 +960,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/93793",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -884,6 +969,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1037078",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -962,6 +1048,7 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:0372",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -983,6 +1070,7 @@
|
||||
"url": "https://bto.bluecoat.com/security-advisory/sa134",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -990,16 +1078,15 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -1020,6 +1107,7 @@
|
||||
"url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -1028,8 +1116,7 @@
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -1092,6 +1179,7 @@
|
||||
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -1099,6 +1187,7 @@
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10176",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -1106,6 +1195,7 @@
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10177",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -1113,20 +1203,30 @@
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10222",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html",
|
||||
@ -1189,6 +1289,7 @@
|
||||
"url": "https://www.exploit-db.com/exploits/40611/",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -1197,6 +1298,7 @@
|
||||
"url": "https://www.exploit-db.com/exploits/40616/",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -1205,6 +1307,7 @@
|
||||
"url": "https://www.exploit-db.com/exploits/40839/",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-7193",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2016-10-14T02:59:38.013",
|
||||
"lastModified": "2018-10-12T22:14:06.967",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:27:52.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-24",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -87,11 +87,21 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FEECD12A-5BEF-4675-B62E-86CF4A7474D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "081DE1E3-4622-4C32-8B9C-9AEC1CD20638"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*",
|
||||
@ -99,43 +109,18 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6404DAF-34CC-47A0-B711-87EAC662FD89"
|
||||
"criteria": "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24EEDAD9-9656-4B21-82E4-D60B83777492"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8235774-4B57-4793-BE26-2CDE67532EDD"
|
||||
"criteria": "cpe:2.3:a:microsoft:word:2011:*:*:*:*:macos:*:*",
|
||||
"matchCriteriaId": "126AF471-BF9D-4872-BAD3-A9DC9D89686D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "941B16A2-931D-4031-A016-5EA60E87BE20"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C64B2636-8F96-48BA-921F-A8FA0E62DE63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A57C675-05A9-4BC2-AE95-7CA5CA6B1F73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16F33176-442C-4EFF-8EA0-C640D203B939"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:word:2007:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "262BC12C-246A-41AB-A08D-3D205156F074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32E1400A-836A-4E48-B2CD-2B0A9A8241BA"
|
||||
"criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "D7A48E44-F01A-40AD-B8AF-8FE368248003"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -144,23 +129,13 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE"
|
||||
"criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:macos:*:*",
|
||||
"matchCriteriaId": "D38DF237-5D93-4705-B922-BE759C5102F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:word_automation_services:-:*:*:*:*:sharepoint:*:*",
|
||||
"matchCriteriaId": "144C2C66-2F9E-4223-BC9B-3425417F1179"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:word_for_mac:2011:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B429C3AB-B405-4156-B63E-BA2BC6A84894"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:word_for_mac:2016:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A06E1824-01B6-4BAE-9789-B0D3776915B9"
|
||||
"criteria": "cpe:2.3:a:microsoft:word_viewer:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AC45CB0-6C84-46D3-B16D-170D46822E54"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -170,15 +145,29 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/93372",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1036984",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-121",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-8562",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2016-11-18T21:59:02.033",
|
||||
"lastModified": "2022-04-12T10:15:09.537",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:26:41.253",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-24",
|
||||
@ -20,26 +20,26 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -75,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -90,8 +90,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB8F11F5-9982-4D82-99DC-F96C595CF607"
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.0.28",
|
||||
"matchCriteriaId": "F8CCE837-13AF-47FB-B4C8-7720F0876229"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -107,6 +108,34 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.0.28",
|
||||
"matchCriteriaId": "DDDA7068-0640-4E8C-A917-DB41F6A9D66A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D7AB0D5-FD3E-416A-975B-D212B3350433"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -114,6 +143,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/94436",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -122,17 +152,25 @@
|
||||
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-672373.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-0001",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2017-03-17T00:59:00.167",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:26:14.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-24",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -89,38 +89,38 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7519928D-0FF2-4584-8058-4C7764CD5671"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7F51B5F-AA19-4D31-89FA-6DFAC4BA8F0F"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "197E82CB-81AF-40F1-A55C-7B596891A783"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C28897B-044A-447B-AD76-6397F8190177"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -139,8 +139,13 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -152,13 +157,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/96057",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1038002",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0001",
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-8540",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2017-05-26T20:29:00.427",
|
||||
"lastModified": "2017-08-13T01:29:22.163",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:25:58.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-24",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -75,7 +75,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -88,21 +88,12 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:forefront_security:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB6F1182-AC87-4A8E-841D-25C94DD7116A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:malware_protection_engine:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.1.13704.0",
|
||||
"matchCriteriaId": "EAEB9885-D7CE-49E4-8780-0BDF2B975BDC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "794244D1-F317-44C8-8338-3DA74E71D4B0"
|
||||
"versionStartIncluding": "1.1.13701.0",
|
||||
"versionEndExcluding": "1.1.13704.0",
|
||||
"matchCriteriaId": "232A1DC9-D943-407F-B82C-3D7522E19A18"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -112,33 +103,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:microsoft:exchange_server:2013:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA16F88D-63BC-4EAA-8CA7-8B5DC54235E9"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD7B17EA-856C-492A-861F-6932A1BDF9BE"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FBC814B4-7DEC-4EFC-ABFF-08FFD9FD16AA"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "232581CC-130A-4C62-A7E9-2EC9A9364D53"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1DD582C-1660-4E6E-81A1-537BD1307A99"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
@ -147,8 +128,8 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7F51B5F-AA19-4D31-89FA-6DFAC4BA8F0F"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
@ -183,6 +164,66 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:endpoint_protection:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC297F51-9742-43A2-8783-53B7E4D5E435"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:exchange_server:2013:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "27EF8DB7-D5A0-47A8-9F69-7D0259490D69"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:exchange_server:2016:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8039FBA1-73D4-4FF2-B183-0DCC961CBFF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:forefront_endpoint_protection:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC9503E8-6282-4F3A-A6DA-0FA8A9BD941B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:forefront_endpoint_protection:2010:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E55E0DDF-4D05-4E5F-BC54-790A722E87A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:forefront_security:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB6F1182-AC87-4A8E-841D-25C94DD7116A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:intune_endpoint_protection:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CFC8E84F-EEC0-4803-9779-8A49658F2180"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20FBA682-B703-4590-98E4-8897EED11DE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:system_center_endpoint_protection:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "194DE421-9536-4001-9A27-6C88805421EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "794244D1-F317-44C8-8338-3DA74E71D4B0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -190,13 +231,19 @@
|
||||
"url": "http://www.securityfocus.com/bid/98703",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1038571",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8540",
|
||||
@ -209,7 +256,12 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/42088/",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-0167",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2018-03-28T22:29:00.907",
|
||||
"lastModified": "2019-10-09T23:31:22.237",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:22:37.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-17",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -110,8 +110,10 @@
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xr:5.2.0.base:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "37444878-DAB1-4A0F-B45C-D3AB9A3338BF"
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.1",
|
||||
"versionEndExcluding": "5.1.3",
|
||||
"matchCriteriaId": "C2213E83-7143-4ABF-9EFD-EB0928996464"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -172,13 +174,49 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:5.2.0.base:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F1A8DE5-8DBB-4A09-A9F2-8B5AF5E46896"
|
||||
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.6.3m1",
|
||||
"matchCriteriaId": "65FB1D01-2A6F-496E-AD56-BBE03DEB9493"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:5.2.0.base:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "95ECCCEC-FA36-481E-B714-3DA57AE89C5B"
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.6.3m1",
|
||||
"matchCriteriaId": "E51621B6-010D-4D9F-9A9D-C354D8BB8135"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1609D07F-FF2D-49D8-8672-9C512A69479D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(6\\)e0a",
|
||||
"matchCriteriaId": "AEE6CC29-29A9-4465-B0EA-1ECC435EBC55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(6\\)e0a",
|
||||
"matchCriteriaId": "DBBC562A-BC2C-4F64-B5D4-47C33BBEE3C7"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -206,16 +244,40 @@
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8994DEA7-C4EC-47B9-8AEA-832AF9D1F8E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1609D07F-FF2D-49D8-8672-9C512A69479D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9A02987-E6F4-41D2-92C5-016A22AC7D0A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(4a\\)ea5",
|
||||
"matchCriteriaId": "C7690EC4-F375-4D0A-8EED-26E01ECFDE55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(4a\\)ea5",
|
||||
"matchCriteriaId": "C90778E3-4A55-498F-9CD6-80F8029AA722"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300:-:*:*:*:*:*:*:*",
|
||||
@ -231,6 +293,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/103564",
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -239,6 +302,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1040586",
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-0173",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2018-03-28T22:29:01.170",
|
||||
"lastModified": "2019-10-09T23:31:22.940",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:23:20.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-17",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -187,13 +187,15 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:denali-16.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6EFCB86-450D-4DEF-8010-3A7CA606899C"
|
||||
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(6\\)e0a",
|
||||
"matchCriteriaId": "AEE6CC29-29A9-4465-B0EA-1ECC435EBC55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:denali-16.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8654D912-C8BA-476E-A8AC-3C8C16FA655A"
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(6\\)e0a",
|
||||
"matchCriteriaId": "DBBC562A-BC2C-4F64-B5D4-47C33BBEE3C7"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -225,7 +227,36 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9A02987-E6F4-41D2-92C5-016A22AC7D0A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(4a\\)ea5",
|
||||
"matchCriteriaId": "C7690EC4-F375-4D0A-8EED-26E01ECFDE55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(4a\\)ea5",
|
||||
"matchCriteriaId": "C90778E3-4A55-498F-9CD6-80F8029AA722"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300:-:*:*:*:*:*:*:*",
|
||||
@ -241,6 +272,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/103545",
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -249,6 +281,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1040591",
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-0174",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2018-03-28T22:29:01.233",
|
||||
"lastModified": "2019-10-09T23:31:23.190",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:12:44.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-17",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -142,13 +142,49 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sre7a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DEEE78E-68F8-4FCB-B679-9A003407EEA5"
|
||||
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(4a\\)ea5",
|
||||
"matchCriteriaId": "C7690EC4-F375-4D0A-8EED-26E01ECFDE55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:12.2\\(33\\)sre7a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CFFA6280-1821-4960-BA3D-C206E275750F"
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(4a\\)ea5",
|
||||
"matchCriteriaId": "C90778E3-4A55-498F-9CD6-80F8029AA722"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A97B3B5-6606-46F5-BCD8-141FDD6F6729"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(6\\)e0a",
|
||||
"matchCriteriaId": "AEE6CC29-29A9-4465-B0EA-1ECC435EBC55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(6\\)e0a",
|
||||
"matchCriteriaId": "DBBC562A-BC2C-4F64-B5D4-47C33BBEE3C7"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -180,11 +216,6 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9A02987-E6F4-41D2-92C5-016A22AC7D0A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A97B3B5-6606-46F5-BCD8-141FDD6F6729"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -196,6 +227,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/103554",
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -204,8 +236,9 @@
|
||||
"url": "http://www.securitytracker.com/id/1040591",
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-0175",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2018-03-28T22:29:01.280",
|
||||
"lastModified": "2019-10-09T23:31:23.347",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:10:41.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-17",
|
||||
@ -20,13 +20,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -145,18 +145,49 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "87BA352E-4C21-4428-A64B-E0C8B8287791"
|
||||
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(4a\\)ea5",
|
||||
"matchCriteriaId": "C7690EC4-F375-4D0A-8EED-26E01ECFDE55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:15.4\\(3\\)m4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6337E9DA-2C56-46BF-A00A-04B993ABD017"
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(4a\\)ea5",
|
||||
"matchCriteriaId": "C90778E3-4A55-498F-9CD6-80F8029AA722"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300_industrial_managed_ethernet_switch:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E96AE552-ABC5-4101-ACF6-B7F20FFB4043"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(6\\)e0a",
|
||||
"matchCriteriaId": "AEE6CC29-29A9-4465-B0EA-1ECC435EBC55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xr:15.4\\(3\\)m4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5EA58F1A-A931-4416-86F8-D1055F1F05AA"
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.2\\(6\\)e0a",
|
||||
"matchCriteriaId": "DBBC562A-BC2C-4F64-B5D4-47C33BBEE3C7"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -184,11 +215,6 @@
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8994DEA7-C4EC-47B9-8AEA-832AF9D1F8E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4519D430-ABFF-4683-AB18-1D87A6B1A217"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*",
|
||||
@ -197,6 +223,40 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.6.3m1",
|
||||
"matchCriteriaId": "65FB1D01-2A6F-496E-AD56-BBE03DEB9493"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "15.6.3m1",
|
||||
"matchCriteriaId": "E51621B6-010D-4D9F-9A9D-C354D8BB8135"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900_services_router:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4519D430-ABFF-4683-AB18-1D87A6B1A217"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -204,6 +264,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/103564",
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -212,6 +273,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1040586",
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-16928",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-09-27T21:15:10.017",
|
||||
"lastModified": "2023-11-07T03:06:03.593",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:24:33.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-17",
|
||||
@ -159,7 +159,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/09/28/1",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List",
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -167,6 +169,7 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/09/28/2",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
@ -200,8 +203,7 @@
|
||||
"url": "https://git.exim.org/exim.git/commit/478effbfd9c3cc5a627fc671d4bf94d13670d65f",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -213,15 +215,24 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EED7HM3MFIBAP5OIMJAFJ35JAJABTVSC/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3TJW4HPYH3O5HZCWGD6NSHTEBTTAPDC/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UY6HPRW7MR3KBQ5JFHH6OXM7YCZBJCOB/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/bugtraq/2019/Sep/60",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-1938",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2020-02-24T22:15:12.057",
|
||||
"lastModified": "2023-11-07T03:19:36.830",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T14:23:59.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-03-03",
|
||||
"cisaActionDue": "2022-03-17",
|
||||
@ -333,6 +333,28 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0EF46487-B64A-454E-AECC-D74B83170ACD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndIncluding": "3.1.3",
|
||||
"matchCriteriaId": "34B80C9D-62AA-42FA-AB46-F8A414FCBE5E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -340,7 +362,6 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -361,67 +382,117 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e%40%3Cdev.tomee.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e%40%3Cusers.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1%40%3Cusers.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65%40%3Cusers.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda%40%3Ccommits.tomee.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864%40%3Cusers.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f%40%3Cusers.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6%40%3Cdev.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97%40%3Ccommits.tomee.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b%40%3Cusers.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c%40%3Cusers.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb%40%3Ccommits.tomee.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794%40%3Cnotifications.ofbiz.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d%40%3Cnotifications.ofbiz.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d%40%3Cdev.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E",
|
||||
@ -433,85 +504,153 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db%40%3Cnotifications.ofbiz.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a%40%3Cusers.tomee.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f%40%3Cusers.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522%40%3Cnotifications.ofbiz.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9%40%3Cusers.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a%40%3Cdev.tomee.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194%40%3Ccommits.tomee.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425%40%3Cnotifications.ofbiz.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7%40%3Ccommits.ofbiz.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b%40%3Cusers.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2%40%3Cusers.tomcat.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca%40%3Cbugs.httpd.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3%40%3Ccommits.tomee.apache.org%3E",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -519,21 +658,29 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202003-43",
|
||||
|
56
CVE-2023/CVE-2023-452xx/CVE-2023-45249.json
Normal file
56
CVE-2023/CVE-2023-452xx/CVE-2023-45249.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-45249",
|
||||
"sourceIdentifier": "security@acronis.com",
|
||||
"published": "2024-07-24T14:15:04.867",
|
||||
"lastModified": "2024-07-24T14:15:04.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@acronis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@acronis.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1393"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security-advisory.acronis.com/advisories/SEC-6452",
|
||||
"source": "security@acronis.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48362",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-24T08:15:02.627",
|
||||
"lastModified": "2024-07-24T12:55:13.223",
|
||||
"lastModified": "2024-07-24T14:15:05.180",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -29,6 +29,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/24/3",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/9tt0q4bdjwgw0dz0l9knqxjnpb5y6zsl",
|
||||
"source": "security@apache.org"
|
||||
|
44
CVE-2024/CVE-2024-224xx/CVE-2024-22443.json
Normal file
44
CVE-2024/CVE-2024-224xx/CVE-2024-22443.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-22443",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-07-24T15:15:11.370",
|
||||
"lastModified": "2024-07-24T15:15:11.370",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct a server-side prototype pollution attack. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04672en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-319xx/CVE-2024-31971.json
Normal file
25
CVE-2024/CVE-2024-319xx/CVE-2024-31971.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-31971",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T15:15:11.800",
|
||||
"lastModified": "2024-07-24T15:15:11.800",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities on AdTran NetVanta 3120 18.01.01.00.E devices allow remote attackers to inject arbitrary JavaScript, as demonstrated by /mainPassword.html, /processIdentity.html, /public.html, /dhcp.html, /private.html, /hostname.html, /connectivity.html, /NetworkMonitor.html, /trafficMonitoringConfig.html, and /wizardMain.html."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/blob/main/AdTran/CVE-2024-31971",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/blob/main/AdTran/NetVanta-3120-XSS",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-319xx/CVE-2024-31977.json
Normal file
29
CVE-2024/CVE-2024-319xx/CVE-2024-31977.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-31977",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T15:15:11.863",
|
||||
"lastModified": "2024-07-24T15:15:11.863",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adtran 834-5 11.1.0.101-202106231430, and fixed as of SmartOS Version 12.5.5.1, devices allow OS Command Injection via shell metacharacters to the Ping or Traceroute utility."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.proton.me/urls/GXDM5T5NSG#RHa0yVWSKyoz",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/blob/main/AdTran/CVE-2024-31977",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/tree/main/AdTran/834-5",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-33694",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-26T13:15:47.770",
|
||||
"lastModified": "2024-04-26T15:32:22.523",
|
||||
"lastModified": "2024-07-24T15:15:11.927",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Meks Meks ThemeForest Smart Widget allows Stored XSS.This issue affects Meks ThemeForest Smart Widget: from n/a through 1.5.\n\n"
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Meks Meks ThemeForest Smart Widget allows Stored XSS.This issue affects Meks ThemeForest Smart Widget: from n/a through 1.5."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38164",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-23T22:15:08.420",
|
||||
"lastModified": "2024-07-24T12:55:13.223",
|
||||
"lastModified": "2024-07-24T15:15:12.270",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-38176",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-07-23T22:15:08.660",
|
||||
"lastModified": "2024-07-24T12:55:13.223",
|
||||
"lastModified": "2024-07-24T14:15:05.673",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
|
25
CVE-2024/CVE-2024-393xx/CVE-2024-39345.json
Normal file
25
CVE-2024/CVE-2024-393xx/CVE-2024-39345.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-39345",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T15:15:12.360",
|
||||
"lastModified": "2024-07-24T15:15:12.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "AdTran 834-5 HDC17600021F1 (SmartOS 11.1.1.1) devices enable the SSH service by default and have a hidden, undocumented, hard-coded support account whose password is based on the devices MAC address. All of the devices internet interfaces share a similar MAC address that only varies in their final octet. This allows network-adjacent attackers to derive the support user's SSH password by decrementing the final octet of the connected gateway address or via the BSSID. An attacker can then execute arbitrary OS commands with root-level privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/blob/main/AdTran/CVE-2024-39345",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/blob/main/AdTran/TBA",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39891",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-02T18:15:03.447",
|
||||
"lastModified": "2024-07-24T01:00:02.087",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-24T14:38:43.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-07-23",
|
||||
"cisaActionDue": "2024-08-13",
|
||||
@ -21,6 +21,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -44,6 +64,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -55,22 +85,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:twilio:authy:*:*:*:*:*:iphone_os:*:*",
|
||||
"versionEndExcluding": "26.1.0",
|
||||
"matchCriteriaId": "F645AEA3-6ACC-4386-ACA9-793E66DBF31E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:twilio:authy_authenticator:*:*:*:*:*:android:*:*",
|
||||
"versionEndExcluding": "25.1.0",
|
||||
"matchCriteriaId": "07B60ED3-2C9B-46F8-9B6C-1FFB46067D06"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/203.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Press/Media Coverage"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twilio.com/docs/usage/security/reporting-vulnerabilities",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twilio.com/en-us/changelog",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-419xx/CVE-2024-41914.json
Normal file
44
CVE-2024/CVE-2024-419xx/CVE-2024-41914.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-41914",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-07-24T15:15:12.437",
|
||||
"lastModified": "2024-07-24T15:15:12.437",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04672en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-60xx/CVE-2024-6096.json
Normal file
56
CVE-2024/CVE-2024-60xx/CVE-2024-6096.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6096",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-07-24T14:15:06.070",
|
||||
"lastModified": "2024-07-24T14:15:06.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Progress\u00ae Telerik\u00ae Reporting versions prior to 18.1.24.709, a code execution attack is possible through object injection via an insecure type resolution vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-470"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.telerik.com/reporting/knowledge-base/unsafe-reflection-CVE-2024-6096",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-63xx/CVE-2024-6327.json
Normal file
60
CVE-2024/CVE-2024-63xx/CVE-2024-6327.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-6327",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-07-24T14:15:06.283",
|
||||
"lastModified": "2024-07-24T14:15:06.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Progress\u00ae Telerik\u00ae Report Server versions prior to 2024 Q2 (10.1.24.709), a remote code execution attack is possible through an insecure deserialization vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.telerik.com/report-server/knowledge-base/deserialization-vulnerability-cve-2024-6327",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.telerik.com/report-server",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
149
CVE-2024/CVE-2024-70xx/CVE-2024-7067.json
Normal file
149
CVE-2024/CVE-2024-70xx/CVE-2024-7067.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2024-7067",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-24T14:15:06.593",
|
||||
"lastModified": "2024-07-24T14:15:06.593",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in kirilkirkov Ecommerce-Laravel-Bootstrap up to 1f1097a3448ce8ec53e034ea0f70b8e2a0e64a87. It has been rated as critical. Affected by this issue is the function getCartProductsIds of the file app/Cart.php. The manipulation of the argument laraCart leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is a02111a674ab49f65018b31da3011b1e396f59b1. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-272348."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/commit/a02111a674ab49f65018b31da3011b1e396f59b1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18#issuecomment-2192470359",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kirilkirkov/Ecommerce-Laravel-Bootstrap/issues/18#issuecomment-2206863135",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272348",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272348",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378780",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-70xx/CVE-2024-7068.json
Normal file
137
CVE-2024/CVE-2024-70xx/CVE-2024-7068.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7068",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-24T15:15:12.750",
|
||||
"lastModified": "2024-07-24T15:15:12.750",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in SourceCodester Insurance Management System 1.0. This affects an unknown part of the file /Script/admin/core/update_sub_category. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272349 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rtsjx-cve/cve/blob/main/xss2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272349",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272349",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.378874",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-24T14:00:17.863007+00:00
|
||||
2024-07-24T16:00:17.731857+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-24T13:50:31.710000+00:00
|
||||
2024-07-24T15:15:12.750000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257885
|
||||
257895
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2024-3896](CVE-2024/CVE-2024-38xx/CVE-2024-3896.json) (`2024-07-24T13:15:10.453`)
|
||||
- [CVE-2024-5818](CVE-2024/CVE-2024-58xx/CVE-2024-5818.json) (`2024-07-24T13:15:10.680`)
|
||||
- [CVE-2023-45249](CVE-2023/CVE-2023-452xx/CVE-2023-45249.json) (`2024-07-24T14:15:04.867`)
|
||||
- [CVE-2024-22443](CVE-2024/CVE-2024-224xx/CVE-2024-22443.json) (`2024-07-24T15:15:11.370`)
|
||||
- [CVE-2024-31971](CVE-2024/CVE-2024-319xx/CVE-2024-31971.json) (`2024-07-24T15:15:11.800`)
|
||||
- [CVE-2024-31977](CVE-2024/CVE-2024-319xx/CVE-2024-31977.json) (`2024-07-24T15:15:11.863`)
|
||||
- [CVE-2024-39345](CVE-2024/CVE-2024-393xx/CVE-2024-39345.json) (`2024-07-24T15:15:12.360`)
|
||||
- [CVE-2024-41914](CVE-2024/CVE-2024-419xx/CVE-2024-41914.json) (`2024-07-24T15:15:12.437`)
|
||||
- [CVE-2024-6096](CVE-2024/CVE-2024-60xx/CVE-2024-6096.json) (`2024-07-24T14:15:06.070`)
|
||||
- [CVE-2024-6327](CVE-2024/CVE-2024-63xx/CVE-2024-6327.json) (`2024-07-24T14:15:06.283`)
|
||||
- [CVE-2024-7067](CVE-2024/CVE-2024-70xx/CVE-2024-7067.json) (`2024-07-24T14:15:06.593`)
|
||||
- [CVE-2024-7068](CVE-2024/CVE-2024-70xx/CVE-2024-7068.json) (`2024-07-24T15:15:12.750`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `125`
|
||||
Recently modified CVEs: `28`
|
||||
|
||||
- [CVE-2024-6751](CVE-2024/CVE-2024-67xx/CVE-2024-6751.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6752](CVE-2024/CVE-2024-67xx/CVE-2024-6752.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6753](CVE-2024/CVE-2024-67xx/CVE-2024-6753.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6754](CVE-2024/CVE-2024-67xx/CVE-2024-6754.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6755](CVE-2024/CVE-2024-67xx/CVE-2024-6755.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6756](CVE-2024/CVE-2024-67xx/CVE-2024-6756.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6783](CVE-2024/CVE-2024-67xx/CVE-2024-6783.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6791](CVE-2024/CVE-2024-67xx/CVE-2024-6791.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6793](CVE-2024/CVE-2024-67xx/CVE-2024-6793.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6794](CVE-2024/CVE-2024-67xx/CVE-2024-6794.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6805](CVE-2024/CVE-2024-68xx/CVE-2024-6805.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6806](CVE-2024/CVE-2024-68xx/CVE-2024-6806.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6828](CVE-2024/CVE-2024-68xx/CVE-2024-6828.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6836](CVE-2024/CVE-2024-68xx/CVE-2024-6836.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6874](CVE-2024/CVE-2024-68xx/CVE-2024-6874.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6885](CVE-2024/CVE-2024-68xx/CVE-2024-6885.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6896](CVE-2024/CVE-2024-68xx/CVE-2024-6896.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6911](CVE-2024/CVE-2024-69xx/CVE-2024-6911.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6912](CVE-2024/CVE-2024-69xx/CVE-2024-6912.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6913](CVE-2024/CVE-2024-69xx/CVE-2024-6913.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-6930](CVE-2024/CVE-2024-69xx/CVE-2024-6930.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-7014](CVE-2024/CVE-2024-70xx/CVE-2024-7014.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-7027](CVE-2024/CVE-2024-70xx/CVE-2024-7027.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-7065](CVE-2024/CVE-2024-70xx/CVE-2024-7065.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2024-7066](CVE-2024/CVE-2024-70xx/CVE-2024-7066.json) (`2024-07-24T12:55:13.223`)
|
||||
- [CVE-2013-3346](CVE-2013/CVE-2013-33xx/CVE-2013-3346.json) (`2024-07-24T14:29:18.157`)
|
||||
- [CVE-2013-5065](CVE-2013/CVE-2013-50xx/CVE-2013-5065.json) (`2024-07-24T14:29:06.787`)
|
||||
- [CVE-2015-4902](CVE-2015/CVE-2015-49xx/CVE-2015-4902.json) (`2024-07-24T14:28:47.760`)
|
||||
- [CVE-2016-0099](CVE-2016/CVE-2016-00xx/CVE-2016-0099.json) (`2024-07-24T14:28:23.077`)
|
||||
- [CVE-2016-5195](CVE-2016/CVE-2016-51xx/CVE-2016-5195.json) (`2024-07-24T14:27:14.490`)
|
||||
- [CVE-2016-7193](CVE-2016/CVE-2016-71xx/CVE-2016-7193.json) (`2024-07-24T14:27:52.327`)
|
||||
- [CVE-2016-8562](CVE-2016/CVE-2016-85xx/CVE-2016-8562.json) (`2024-07-24T14:26:41.253`)
|
||||
- [CVE-2017-0001](CVE-2017/CVE-2017-00xx/CVE-2017-0001.json) (`2024-07-24T14:26:14.340`)
|
||||
- [CVE-2017-6736](CVE-2017/CVE-2017-67xx/CVE-2017-6736.json) (`2024-07-24T14:25:27.837`)
|
||||
- [CVE-2017-6737](CVE-2017/CVE-2017-67xx/CVE-2017-6737.json) (`2024-07-24T14:25:15.390`)
|
||||
- [CVE-2017-6738](CVE-2017/CVE-2017-67xx/CVE-2017-6738.json) (`2024-07-24T14:24:59.383`)
|
||||
- [CVE-2017-6739](CVE-2017/CVE-2017-67xx/CVE-2017-6739.json) (`2024-07-24T14:24:46.757`)
|
||||
- [CVE-2017-8540](CVE-2017/CVE-2017-85xx/CVE-2017-8540.json) (`2024-07-24T14:25:58.870`)
|
||||
- [CVE-2018-0167](CVE-2018/CVE-2018-01xx/CVE-2018-0167.json) (`2024-07-24T14:22:37.590`)
|
||||
- [CVE-2018-0173](CVE-2018/CVE-2018-01xx/CVE-2018-0173.json) (`2024-07-24T14:23:20.207`)
|
||||
- [CVE-2018-0174](CVE-2018/CVE-2018-01xx/CVE-2018-0174.json) (`2024-07-24T14:12:44.953`)
|
||||
- [CVE-2018-0175](CVE-2018/CVE-2018-01xx/CVE-2018-0175.json) (`2024-07-24T14:10:41.667`)
|
||||
- [CVE-2018-0179](CVE-2018/CVE-2018-01xx/CVE-2018-0179.json) (`2024-07-24T14:09:11.607`)
|
||||
- [CVE-2019-16928](CVE-2019/CVE-2019-169xx/CVE-2019-16928.json) (`2024-07-24T14:24:33.837`)
|
||||
- [CVE-2020-1938](CVE-2020/CVE-2020-19xx/CVE-2020-1938.json) (`2024-07-24T14:23:59.937`)
|
||||
- [CVE-2023-48362](CVE-2023/CVE-2023-483xx/CVE-2023-48362.json) (`2024-07-24T14:15:05.180`)
|
||||
- [CVE-2024-33694](CVE-2024/CVE-2024-336xx/CVE-2024-33694.json) (`2024-07-24T15:15:11.927`)
|
||||
- [CVE-2024-38164](CVE-2024/CVE-2024-381xx/CVE-2024-38164.json) (`2024-07-24T15:15:12.270`)
|
||||
- [CVE-2024-38176](CVE-2024/CVE-2024-381xx/CVE-2024-38176.json) (`2024-07-24T14:15:05.673`)
|
||||
- [CVE-2024-39891](CVE-2024/CVE-2024-398xx/CVE-2024-39891.json) (`2024-07-24T14:38:43.270`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
314
_state.csv
314
_state.csv
@ -41958,7 +41958,7 @@ CVE-2010-0228,0,0,8fab666641f1e7e3830c0307fb14f0f94a48bbd04846e537ed487d526d41ed
|
||||
CVE-2010-0229,0,0,bf42d81b9ce4797de98a97926d2b66429817d0537fb7fdd2b4de84d19d61ddaf,2010-01-08T05:00:00
|
||||
CVE-2010-0230,0,0,ab9c3f2ef24ca685ff02eb0b675e3f99182a29221ee191f310e2dcaa4ba30444,2011-04-28T04:00:00
|
||||
CVE-2010-0231,0,0,842e3d2e60a3093ee7b50aa2b2ce2c8b0bc7eb6c9b479761bb661adba5c21103,2023-12-07T18:38:56.693000
|
||||
CVE-2010-0232,0,0,29f16187830a6c28becd0986887b0be4d64c0e5b2de2bcf8d2437a5e412fac3c,2023-12-07T18:38:56.693000
|
||||
CVE-2010-0232,0,1,b22b3e1ec380faeda0f13a4e338b7a2636fbbd646c09523e869a1756f7099b38,2024-07-24T14:30:29.540000
|
||||
CVE-2010-0233,0,0,c734f7f273dab5cd0677096041ed7fcf039cf1ba15bc755e6a063602834b632d,2019-02-26T14:04:01.980000
|
||||
CVE-2010-0234,0,0,b96fe47a25018da7a1b1fbffbca65727d609739f54935e1079d2b9ac0062c287,2023-12-07T18:38:56.693000
|
||||
CVE-2010-0235,0,0,1c1e42b38d957189921e4cf4dda49ded53f217223e55813f11a0aeb3ec4e7d98,2019-02-26T14:04:00.993000
|
||||
@ -48657,7 +48657,7 @@ CVE-2011-1885,0,0,2477b2696e062f132689c20ad55dab3c851d5af79e80113da6596f9d4ef165
|
||||
CVE-2011-1886,0,0,d3aaabe7327492d8025ac75be9b28b58388e6dbecbe5ba58ac74bd235b95b6b5,2018-10-12T22:01:03.940000
|
||||
CVE-2011-1887,0,0,5f4679e3e5c79e31f0dfedc2517705b1d8c3c07a01236b21bdb2e8331cf429e2,2023-12-07T18:38:56.693000
|
||||
CVE-2011-1888,0,0,2ebfbf1c386dfcd030da661d84f7f7f16bf25f7052048bd6380dcb77a3df4ed3,2023-12-07T18:38:56.693000
|
||||
CVE-2011-1889,0,0,0bd83fa87d8d7bd68f7ba6f6a363096eae1709be7c40618a72369656323f8af4,2018-10-12T22:01:05.957000
|
||||
CVE-2011-1889,0,1,3aefd1d4133413b6a8e8e03cdc2f6644c6e6c6e55508f75ff28ed0ad21b6d899,2024-07-24T14:30:00.817000
|
||||
CVE-2011-1890,0,0,602b06fd7f53023b6a7f41b7b5d7baa66538abf79222f061e3da5d27524ad802,2018-10-12T22:01:06.533000
|
||||
CVE-2011-1891,0,0,2885421d4a3171c7a1279bbe0be30b9ba3b9e1214cf35fc659f5807382721d0a,2018-10-12T22:01:06.847000
|
||||
CVE-2011-1892,0,0,3468dca90ddcb0d2b7811de307210371bb9438179d3ce8192336add76b6ec59e,2018-10-12T22:01:07.143000
|
||||
@ -50192,7 +50192,7 @@ CVE-2011-3540,0,0,bb9c999493a201ca54af40e7ae80b737789888feed733ac46757539b2878d3
|
||||
CVE-2011-3541,0,0,eaab24574033a82e60ae0363fdfcc7603e2dc567e8469fde4c5e633efab1cfb5,2017-08-29T01:30:14.740000
|
||||
CVE-2011-3542,0,0,4e0d208a42646ba5cf7430662176ff780a4d1e6854b05dba706ef188305a4509,2017-08-29T01:30:14.787000
|
||||
CVE-2011-3543,0,0,4d5a90edb271cec3c1e270be62903ba1a02ba05868f627e01af8cf115c16c5ef,2017-08-29T01:30:14.850000
|
||||
CVE-2011-3544,0,0,baefcf3841e91fddd31bd14fb0b71b2522e906d5ff5a4724f11981137ff09c99,2018-01-06T02:29:19.410000
|
||||
CVE-2011-3544,0,1,231381b57284acc79ba372ef8414f5c40e4ac0bb32b9e3528cba0c7bb416b025,2024-07-24T14:29:45.840000
|
||||
CVE-2011-3545,0,0,ccf4955985b584b3c6888e539fdbf1c0db96acf936b1232f117d10a7a57b0427,2018-01-06T02:29:19.537000
|
||||
CVE-2011-3546,0,0,37e3f50cc31035e5a39a26956d5b6133b5d49b757f9d39e98594161291c28ad7,2022-05-13T14:52:58.547000
|
||||
CVE-2011-3547,0,0,abb5012795aa1104c8f3081d44c950447cf9837413c5d957c781d47ad72ad352,2022-05-13T14:52:52.973000
|
||||
@ -60792,7 +60792,7 @@ CVE-2013-3342,0,0,d1f3e008cc90a06414bf8464889ac1a7c15a3c5abf65cb90055eae9c8f74d9
|
||||
CVE-2013-3343,0,0,8ce4de6c5a3acd5c400b2b9154f9e897e82f040b24f0d2a9fedb20e9e40aadd1,2018-12-13T15:29:36.387000
|
||||
CVE-2013-3344,0,0,2710e7f032ecb4e637dc0ea8ee29d05cc9daa247921b795ac07735302fbec472,2015-10-23T15:19:54.537000
|
||||
CVE-2013-3345,0,0,49b7f673f68b2503237af66cf4da15d81d7456eb1cb89b07a6ed2fef165c73fa,2013-08-22T06:53:39.990000
|
||||
CVE-2013-3346,0,0,43ca080a4c5130b4443c0d803be88419dfb2993e8ac7f17eea84cfff4a004f4c,2017-09-19T01:36:40.247000
|
||||
CVE-2013-3346,0,1,2254a8a19136e11db6ae342f0f8c9d77ba571c98816b366c70c50c58a59f81c3,2024-07-24T14:29:18.157000
|
||||
CVE-2013-3347,0,0,d95bb31626c5133d9ee760c09614e7454845b34f06348ab2ca5ceabb251ccbba,2013-08-22T06:53:40.223000
|
||||
CVE-2013-3348,0,0,4f33ffda48c677088e6a6b8c206d24d5f9d7a780c4742c22d5efe596fd57f69f,2013-08-20T03:23:22.147000
|
||||
CVE-2013-3349,0,0,b1773332ef9346465e7ced34fba92f5543e4dce8bb8f60f7e58c7863ac9c020a,2014-01-28T04:53:36.950000
|
||||
@ -62370,7 +62370,7 @@ CVE-2013-5061,0,0,cc588cccd08476128d3d451c5500fcf88b566d2f0ea58587df374d0b429b7f
|
||||
CVE-2013-5062,0,0,e69c7b6565634dff5875737237bcc2f72e02c7c6acbd440a0f0bd9aba2aa2a53,2023-11-07T02:16:27.937000
|
||||
CVE-2013-5063,0,0,3dfd59bca8a17501d94af5969d745b27de1cd1e818f946a92cef5e868252bd19,2023-11-07T02:16:28.170000
|
||||
CVE-2013-5064,0,0,b10386120f7ac7f725933a2cdadd901d05afbffa839bbe13004c95f32ff32e19,2023-11-07T02:16:28.417000
|
||||
CVE-2013-5065,0,0,f9b295834854532e9123c3335199a05819b77e963beec11c7283581570a82528,2018-10-12T22:05:24.417000
|
||||
CVE-2013-5065,0,1,6655bc31172babb776bdfdf5144694b9ba7ae76cf52e20a4cf0f7e08d129db29,2024-07-24T14:29:06.787000
|
||||
CVE-2013-5066,0,0,e205a4f50586191eccc383c60dd96b69af8814856bdb6f91bfa33f31d91a10da,2023-11-07T02:16:28.657000
|
||||
CVE-2013-5067,0,0,5e11b80225c907e253b0568572498b8ea428d0bb83d8799d755c48e301818961,2023-11-07T02:16:28.883000
|
||||
CVE-2013-5068,0,0,0f7148a19cda9fb642dfb0b790594d729719aacf09b25cfd2085123d527825e2,2023-11-07T02:16:29.117000
|
||||
@ -77911,7 +77911,7 @@ CVE-2015-4898,0,0,1cf87cc4072f3479e8f6b3acb89ff16cba7e5b21f329e59112284aeddcff27
|
||||
CVE-2015-4899,0,0,5900ce6c669a5ab8f26bd1a458e7d18fa0c8fcc14183e0d8bfc06d6ce17bfdc1,2016-12-24T02:59:27.417000
|
||||
CVE-2015-4900,0,0,56305a36f8010437f7d3a81cd2c1b675c73eb03d59ff059f2cd58e57d5dae1f2,2016-12-24T02:59:27.463000
|
||||
CVE-2015-4901,0,0,b04774cf214c09d1a7bcb0726994aea64ecff5f6e3f8611c7fec6eba831fb495,2020-09-08T12:30:27.410000
|
||||
CVE-2015-4902,0,0,338ef76928160fbe1f27ec8a0b4ca8d974d503cb50d138ae4f7593c1b8905a93,2022-05-13T14:38:26.663000
|
||||
CVE-2015-4902,0,1,4189799b5c53ecd85516064fa804927b901c6fc706b67165264690ffed2b68df,2024-07-24T14:28:47.760000
|
||||
CVE-2015-4903,0,0,51a1972704646b395bcde95da7356f5c81d287001ed4edec793d58d8b5c2b235,2022-05-13T14:38:26.680000
|
||||
CVE-2015-4904,0,0,f4199dd23aee41f8c73259ed15d23b2867ffd7df0af441de5a803662d42296d8,2016-12-24T02:59:28.057000
|
||||
CVE-2015-4905,0,0,f2becda2358a2a2a39932dce1bc3c263fc7b341af362780ae745d911b771b420,2016-12-24T02:59:28.120000
|
||||
@ -82309,7 +82309,7 @@ CVE-2016-0095,0,0,418df911996856644d87ae6f6e7a056605f501e8900199338546529255f544
|
||||
CVE-2016-0096,0,0,012996f3a3940eb80007a29222b25b5abf7a34638cd980b981ec3a469cd0e23d,2018-10-12T22:11:03.237000
|
||||
CVE-2016-0097,0,0,38e5ed1e34b04f0ecbc3d69a1c00c831ad23e0a01f2e5eaf5bfcf35582b22df1,2023-11-07T02:29:04.853000
|
||||
CVE-2016-0098,0,0,c2bca9f82eac1c8ad91111ca618db6886f9617f093bbd1c3a2fdab84ee989c25,2018-10-12T22:11:03.520000
|
||||
CVE-2016-0099,0,0,18d8f9ce8b4ba7615293f549539251995372fd9aad67446f6196a788cda0dd85,2018-10-12T22:11:03.800000
|
||||
CVE-2016-0099,0,1,196930dfe44ee0a8790a969a7e37a7dc97eacb47a65e3bdc6b0e43d19c966ced,2024-07-24T14:28:23.077000
|
||||
CVE-2016-0100,0,0,877b9e34d43995ba80c7a9b04662ad3dff6e98faf6debac31b1e2e19ca0e6ed5,2018-10-12T22:11:04.410000
|
||||
CVE-2016-0101,0,0,ed23cc2ef501f4eb7019a77e55e5a4a72eee48a286e6948c3dbe9e6432187602,2018-10-12T22:11:04.690000
|
||||
CVE-2016-0102,0,0,07d6943f8e0ec5a368313d34577f6a60e41f17d644baa2270dcec9d129065f18,2018-10-12T22:11:05.003000
|
||||
@ -88388,7 +88388,7 @@ CVE-2016-5191,0,0,9e110170f6119edfa710d5391c65edfd29386d0860946c3b628d1f3d030f25
|
||||
CVE-2016-5192,0,0,06b6fbfb586ad9df82f779c0d0c3c60311a510134e5a27f961211611df7bf631,2023-11-07T02:33:22.570000
|
||||
CVE-2016-5193,0,0,2358c72649d8783652b1e6bbc63faebcc479bf99dbfe3ccabeee7745669d0f32,2023-11-07T02:33:22.910000
|
||||
CVE-2016-5194,0,0,7f70ee65e6b2ccb35699346f55ec198077436df1e8fd05b0a7fe8e5419b00fd5,2023-11-07T02:33:23.330000
|
||||
CVE-2016-5195,0,0,ec871f0c5bd9f7dc518fa99a7f648868f736cbdaf2ab1c5d20dddab0bc9ffc6b,2023-11-07T02:33:23.770000
|
||||
CVE-2016-5195,0,1,1ac9e063d07a1d90b1d94d179f6117474fb193e68fee06bc5ce044bd1d0aa7f7,2024-07-24T14:27:14.490000
|
||||
CVE-2016-5196,0,0,ffaf03038c9134999dbf2d49dd7935f38ba9edddcf7757faad736044509dab09,2023-11-07T02:33:24.627000
|
||||
CVE-2016-5197,0,0,227392cd72db3ef012d663681093f8582b81dac541c1e15fd3a2091768c1a7f2,2023-11-07T02:33:24.923000
|
||||
CVE-2016-5198,0,0,3e009606d0409b703291c8b166e5a9033b3b781dab09c3f95bec97735bc371bf,2024-06-28T14:19:29.210000
|
||||
@ -90140,7 +90140,7 @@ CVE-2016-7189,0,0,f641d7647d957e3c92e5766dfd2a984da11aab1fa2a55245c8270033933e86
|
||||
CVE-2016-7190,0,0,9d557b1c687954a777a1cbe86f83a39473cd0277e84992c819f0ee0a62e0daaa,2018-10-12T22:14:06.703000
|
||||
CVE-2016-7191,0,0,94a5771699687a2651249681ea2df86ed69a2dd1c787546c3e4dd9c5ec781150,2017-07-30T01:29:18.897000
|
||||
CVE-2016-7192,0,0,025dd15a117dcc3f9a8fd318b5091df0fcba14976b5d724c3898b72cb5aa490d,2023-11-07T02:34:17.380000
|
||||
CVE-2016-7193,0,0,4c16d76fa552284f00d20a4382cf4e2b3a2930472fb8ed981a4e4622ead2d3dc,2018-10-12T22:14:06.967000
|
||||
CVE-2016-7193,0,1,5957bbb4917d239843e1598231d5dd9440a3c8a321bf6184b28afcdcf8aa0e94,2024-07-24T14:27:52.327000
|
||||
CVE-2016-7194,0,0,18340acd6195131c3a13c02ff8179c7c17bfca0b0c3e437d116e007b2b2b22af,2018-10-12T22:14:07.233000
|
||||
CVE-2016-7195,0,0,f5b5ed40f299f54bfabf7496015255bd23b64b31a853d6fb2117d269f625fa83,2018-10-12T22:14:07.500000
|
||||
CVE-2016-7196,0,0,ce81af060d117cbc91d9a05f7026501c52049a627a0c8835db386af63dbc3762,2018-10-12T22:14:07.920000
|
||||
@ -91456,7 +91456,7 @@ CVE-2016-8558,0,0,c0386e67518591e3cc2af7b4e2644d52b0f07098ed11c5d85dcd7bc9d8b40b
|
||||
CVE-2016-8559,0,0,302640d7237672fdce48df4dbcfae041b69efa0b75a03e3c6fd724e8991cf771,2023-11-07T02:36:22.373000
|
||||
CVE-2016-8560,0,0,76e294367d379b6f33f382fa9feedfb41186243e74cebc434f3478f779d94846,2023-11-07T02:36:22.633000
|
||||
CVE-2016-8561,0,0,9db59d7d070c610a30c1c50b422b9c1e993280bdf332ccefc0fb1c8b7a0d2008,2022-04-12T10:15:09.470000
|
||||
CVE-2016-8562,0,0,cd81db8f8c36d47f5fc1ff60cb13e4c1f9ebf51c904354c3ce418e1c343b6a21,2022-04-12T10:15:09.537000
|
||||
CVE-2016-8562,0,1,7aea49c0235a69cc22e3a3bbf2412c6a6430053add2456518f945ef88686431c,2024-07-24T14:26:41.253000
|
||||
CVE-2016-8563,0,0,bdbf80f92083faab7e042e4be589ecc880c9f6143d7c7b302180168ddacdbbbd,2017-07-29T01:34:19.850000
|
||||
CVE-2016-8564,0,0,b615aefc1a4082bc1e181a6c55d1d5380e640bc124be11f6c9c9220372d84c20,2017-07-29T01:34:19.897000
|
||||
CVE-2016-8565,0,0,bbe0e6928e61f6a225ef768f29d05e0417c6ddef76b3776ca847afd6d51c8313,2017-07-29T01:34:19.943000
|
||||
@ -92761,7 +92761,7 @@ CVE-2016-9995,0,0,e156e5087d5651c2f963db51e0f239cf224c543687b933dac36801dda966e2
|
||||
CVE-2016-9996,0,0,6453258d4706747e1d9a6ba664dbc3795ff081936b9854874ceded6c65be7af5,2023-11-07T02:37:40.873000
|
||||
CVE-2016-9997,0,0,5ee83f2cdc59983440ef692086a454221961a192bc9e0085135620157ed1ee2e,2017-07-27T01:29:07.337000
|
||||
CVE-2016-9998,0,0,9895af2ec8ad1ed16b5967b0c00c30201370ad4b902d189342d11d5fe82dfb9f,2017-07-27T01:29:07.383000
|
||||
CVE-2017-0001,0,0,de9964df80759ee9921d9df72ec55b37dcd0f0f1e3b7cd84020fa6c848fab99b,2019-10-03T00:03:26.223000
|
||||
CVE-2017-0001,0,1,91c9486e2f0b35870d4529ab188d0a2d954b5c56661e43e6d01134027ccbca0f,2024-07-24T14:26:14.340000
|
||||
CVE-2017-0002,0,0,eb8fdeef284bb9fa105217112f90e215e73ff48e88566834934538f603c9a63b,2019-10-03T00:03:26.223000
|
||||
CVE-2017-0003,0,0,1035f15152f2ae0774f1527cd5de6a4f4047540415be863797e14545fe5bc80e,2018-10-12T22:15:06.503000
|
||||
CVE-2017-0004,0,0,7bcfd47d26ec69d52764e01daae5ad38c3ce8a94baec278eb756bce62edfe72e,2018-10-12T22:15:06.877000
|
||||
@ -106805,10 +106805,10 @@ CVE-2017-6732,0,0,324e747c4f1fadec63b95361b549751efc5b72592032082575095d0b739e12
|
||||
CVE-2017-6733,0,0,b4201d9289360535c2a779685aa166b6f08b1cfba4c9753d42e71ddc3b82264d,2017-07-16T11:32:30.907000
|
||||
CVE-2017-6734,0,0,2ea5eb5b13f17abaf318e49ee79f7f65ba00f87765c827e33aa8727a08b74c04,2017-07-14T13:43:02.840000
|
||||
CVE-2017-6735,0,0,fccddaaa28123d09011a0a191707f5f8f1942a527790d72903e8332ab4a873cd,2017-07-13T14:57:47.217000
|
||||
CVE-2017-6736,0,0,299b1e4c2d4c3d45e5aef609836c4d2f091ab966da273f8bfd817dc426a8c4b3,2018-01-08T02:29:00.690000
|
||||
CVE-2017-6737,0,0,63b23d0749e54cc72f5f15d85870b1c194abbbddac88990fc99f0005c3537d9f,2019-10-09T23:28:58.450000
|
||||
CVE-2017-6738,0,0,2442001efcaec9e91bb4db863f671cd80bfc8fdc190bd88e690cc523ff809135,2019-10-09T23:28:59.107000
|
||||
CVE-2017-6739,0,0,4ecd46593c870766d355ecdd49eee1376dd4afe2af1c5d7b1d3025d76b4e290e,2019-10-09T23:28:59.687000
|
||||
CVE-2017-6736,0,1,d2605ed92e29e406a6290e2dc4c7c41fd378bbbbbf837c6368d266ab8884e274,2024-07-24T14:25:27.837000
|
||||
CVE-2017-6737,0,1,bf4743428f013960881ee71bf8e086aa11b5381dfc1289715dc9d692ece045dd,2024-07-24T14:25:15.390000
|
||||
CVE-2017-6738,0,1,f48975111c3223632a35c6b349b6838eb2dd7fb9a9f6849a6a38c1fb1de1361c,2024-07-24T14:24:59.383000
|
||||
CVE-2017-6739,0,1,6d022cde6b8bcaf94ee9fc78f83b21fb599bfb6f02e5760620bce8adbd63076e,2024-07-24T14:24:46.757000
|
||||
CVE-2017-6740,0,0,4ee7bb525676686db169f112396ec65d98ab0c55daeace69dbc30722587ff5b6,2024-07-16T17:32:51.537000
|
||||
CVE-2017-6741,0,0,f64b26cf2ed012f946f66d43f995a3d30776fdf712cf634944e79614a9c708f2,2019-10-09T23:29:00.483000
|
||||
CVE-2017-6742,0,0,d7120ab725863d439e27426c9650985802392823ab0a15d87468fcd25b9a2a0a,2024-06-27T19:31:05.937000
|
||||
@ -108421,7 +108421,7 @@ CVE-2017-8536,0,0,0cb97ab7ec8813dbbff1b8c476f132d3c72293d4e81e882a884736e139f778
|
||||
CVE-2017-8537,0,0,914aae65cb71b558a67fead2a0788b88e37f6521e207f3bfadda8c46f7dcc93c,2020-04-09T13:15:06.717000
|
||||
CVE-2017-8538,0,0,25d54983b67c2fdc470d34cc1e616c944bd954ab50c79d56fef1fbcf136391e8,2017-08-13T01:29:22.117000
|
||||
CVE-2017-8539,0,0,0919f17c6f3afaa384af5fd7d4f420d4e580252b5462ab8fb00a0876be56a491,2019-10-03T00:03:26.223000
|
||||
CVE-2017-8540,0,0,398a8dc8737c08046a7974f7f7ba9ea03218135af62f60b3d5341af060cd379e,2017-08-13T01:29:22.163000
|
||||
CVE-2017-8540,0,1,a9c36dd225f21a7badfbc1bd0807b550e9e8f616a4fad710971c83dcfb2c0e60,2024-07-24T14:25:58.870000
|
||||
CVE-2017-8541,0,0,db56b6172cd6a14b7d2987cba95b23516fe04afccb68a6f609e04ece1f6b80eb,2017-08-13T01:29:22.227000
|
||||
CVE-2017-8542,0,0,727eb494e6e593e5e7a3061bb578872ab0d9e275129e1472e08cac63e5e16bf8,2019-10-03T00:03:26.223000
|
||||
CVE-2017-8543,0,0,6f196c7c2bee444a498f6ce641a3c0b8cbea0cd480d844be0e16b0a2b1a731a9,2019-10-03T00:03:26.223000
|
||||
@ -109878,19 +109878,19 @@ CVE-2018-0161,0,0,ed16e62fd2db3b13e1903daae7482b2d4bc19f36fe6addc4e07d57a5b42065
|
||||
CVE-2018-0163,0,0,e425f8532eeacedce4b8e66ef6486ced4f964afa62fd7416137354e10e498018,2021-04-28T22:38:37.293000
|
||||
CVE-2018-0164,0,0,3c06b5257cef6379aac063946b47d8ce9639068b91167cb2cc0cf923195bd104,2019-10-09T23:31:21.940000
|
||||
CVE-2018-0165,0,0,9fe9b4c8c4dddcd218ed7262a6d9e3c0295cc05c19c4b2bd5081f8a8a7627ad2,2019-10-09T23:31:22.067000
|
||||
CVE-2018-0167,0,0,93fb1adfdb64ca2dfa02820da22836c89a089b9bcf3300a0434854595178ff90,2019-10-09T23:31:22.237000
|
||||
CVE-2018-0167,0,1,af23e258293129f6e09d855c9d4b60a2c739049f7de5390dddeb39d9cad11996,2024-07-24T14:22:37.590000
|
||||
CVE-2018-0169,0,0,2a174cf1f9bc07a75fb11a602059aafc4a2cb1f64303051e76b9c0f85b54c793,2019-10-09T23:31:22.410000
|
||||
CVE-2018-0170,0,0,8fb1178b885a809b4dd36163f490c7b441362165655099214aefb3e9eb8f22b1,2019-12-03T18:55:09.220000
|
||||
CVE-2018-0171,0,0,859eedd34da17baf5c48694e42c0c387e8caba9dceabc53fb9b86523df179fd1,2020-09-04T18:25:04.367000
|
||||
CVE-2018-0172,0,0,7884402d845c1956e1fbb06908e4db32b48abec29790beb6ee4247b49573ba77,2020-09-04T18:25:52.107000
|
||||
CVE-2018-0173,0,0,460fed31c51a993482644d8083ffe80bd40a795c4550b6ff651df4a0f41fd32b,2019-10-09T23:31:22.940000
|
||||
CVE-2018-0174,0,0,5337ac0f84d335d2c3a56e2a8df1801b3e775b094df70fd46238c6c35d2f68e9,2019-10-09T23:31:23.190000
|
||||
CVE-2018-0175,0,0,df8b2a062535a616d6ccf5f33a1d1130406117c43efe89209e3ba26dfe9e7885,2019-10-09T23:31:23.347000
|
||||
CVE-2018-0173,0,1,1cab08eb979d58325a55d613eddda23d470d9b798d0c62af5625c82eb636b033,2024-07-24T14:23:20.207000
|
||||
CVE-2018-0174,0,1,e0cc85b62fcba4fed0ff2b29dd14ff8e65070c7c04dc7ba420e70c893308491e,2024-07-24T14:12:44.953000
|
||||
CVE-2018-0175,0,1,a16eef1f92dc18b2bae6785b5eb44f817ed8cd748116ad5256c3b62d12c049f1,2024-07-24T14:10:41.667000
|
||||
CVE-2018-0176,0,0,99cd484bd1c7bb7de2b0f843c2256bc24f8042a808271e6e7557cabf41004872,2019-10-09T23:31:23.487000
|
||||
CVE-2018-0177,0,0,31eb7676608befeb6f438be18e8a392c751c61ceba1340d04c3c399d3e515061,2021-10-18T12:03:03.887000
|
||||
CVE-2018-0178,0,0,fcc0266b77ab1fc75799d82f6a7c6e59e18c4d0d7343eda561cb6c3bd85d71f6,2023-11-07T02:50:59.347000
|
||||
CVE-2018-0179,0,0,3c2d5cb2e0846f782c6813f35d4be6ee4a49d641383a34f8f5ff59a51f469623,2019-10-09T23:31:23.817000
|
||||
CVE-2018-0180,0,1,b9ca3637ba782db6501883b7ad2d3a94932ccf3deb124e0b81fcff9c428f2ae7,2024-07-24T13:50:31.710000
|
||||
CVE-2018-0179,0,1,3c519315b526710cc4f65cad907d9d511d9ea88093c921d00be20aef274631de,2024-07-24T14:09:11.607000
|
||||
CVE-2018-0180,0,0,b9ca3637ba782db6501883b7ad2d3a94932ccf3deb124e0b81fcff9c428f2ae7,2024-07-24T13:50:31.710000
|
||||
CVE-2018-0181,0,0,811dd4c57b896349cd31ed129599418e8c18a3b08fe30d97fa626af8c9874e16,2019-10-09T23:31:24.270000
|
||||
CVE-2018-0182,0,0,6625e65dcb77de4ef278aa05492cde3cc56f8a01e69b687de74349299bbd4e21,2019-10-09T23:31:24.473000
|
||||
CVE-2018-0183,0,0,94bb7ae6755330992bdc867264c86300ad3ce31abbe1e2b0fad60c3a06c8b64a,2019-10-09T23:31:24.567000
|
||||
@ -134569,7 +134569,7 @@ CVE-2019-16924,0,0,f4faf7a76132af9a082e979af4a2c4a24926cd4b99687f35ac2055b0f8812
|
||||
CVE-2019-16925,0,0,daf427dba31c3acbde930aa0ba1e15909152d11e61008a80fb8178e3c061bc7f,2024-05-17T01:34:22.360000
|
||||
CVE-2019-16926,0,0,c3e47085d51f08cb5feb1383f52d98e34b489b0037407f9f36da34b165def535,2024-05-17T01:34:22.460000
|
||||
CVE-2019-16927,0,0,1a851e355f3daf3a3c999ea866f3c36b18959de6b014a216182c79f369d52bf0,2019-10-01T17:02:57.650000
|
||||
CVE-2019-16928,0,0,e196d7cb1e6c0775491a6a72c7c2692420fe374a4a004dc29e0a0b83239192f7,2023-11-07T03:06:03.593000
|
||||
CVE-2019-16928,0,1,9f286ac6ff58c5a49fd23890fbe697ef508a7c727577426a0e4cb6f4eecbb5dd,2024-07-24T14:24:33.837000
|
||||
CVE-2019-16929,0,0,3b95b946b9cdf36f15acf82d0abd4cdeb92ab089a9615cec608e8198f4fb9bcd,2019-10-17T19:31:10.043000
|
||||
CVE-2019-1693,0,0,ca6941e2d2de9f6bffc45cc6b2e79ae92cbc8bd63951bdb60c2829d200295b41,2023-08-15T15:24:56.340000
|
||||
CVE-2019-16930,0,0,fc14a4d7d5a3217e79a554c5c79b8a8e7375c5068beb144a64cec5310308c66a,2019-10-04T15:58:14.317000
|
||||
@ -146607,9 +146607,9 @@ CVE-2020-11633,0,0,37cbcea5a77a962bf1e2b9e27f0ae16785183d1cba7013567d26b76f77193
|
||||
CVE-2020-11634,0,0,151dce61605ff6717ebf94090aceba19201409fa20137c1f898caf40425b1d3f,2021-07-27T15:39:40.660000
|
||||
CVE-2020-11635,0,0,2478794e3a7bbfb42301b801c9f6045a58be4c590ead95d38b5a9df813b1009c,2021-07-21T11:39:23.747000
|
||||
CVE-2020-11637,0,0,adf0e85b69b992bf23350cfadd72968f90964afe06a851016f6f56d9b560d76c,2021-09-14T17:36:29.410000
|
||||
CVE-2020-11639,0,1,367aa7f7af8817aefd9f251e9177b37f1aeae83b9b633ce8a346a4c6eaefa861,2024-07-24T12:55:13.223000
|
||||
CVE-2020-11639,0,0,367aa7f7af8817aefd9f251e9177b37f1aeae83b9b633ce8a346a4c6eaefa861,2024-07-24T12:55:13.223000
|
||||
CVE-2020-1164,0,0,689cf2273ddf17764e610873f10f79f07f5534019190c9f4259c3e20ce76c79f,2021-07-21T11:39:23.747000
|
||||
CVE-2020-11640,0,1,012e41151a00a414ccdc870fcd92adc59bd15e3c70a431ccc003f5af69da6dbb,2024-07-24T12:55:13.223000
|
||||
CVE-2020-11640,0,0,012e41151a00a414ccdc870fcd92adc59bd15e3c70a431ccc003f5af69da6dbb,2024-07-24T12:55:13.223000
|
||||
CVE-2020-11641,0,0,b0f9e90a904914b5a85ce14dc4f011db0471b378fb4ea8f89ffee12ccf0c4743,2022-06-03T18:38:45.143000
|
||||
CVE-2020-11642,0,0,284b6d2e8f3975d208a54f0130610bd937cc9d539252cf0e07e11d88f8ee114b,2022-06-03T18:44:51.203000
|
||||
CVE-2020-11643,0,0,150fc52ada2768f3cd8fc05e6801ea9c78435009cbc2cabb045c6610cf099f69,2021-11-04T17:31:05.647000
|
||||
@ -152226,7 +152226,7 @@ CVE-2020-19362,0,0,142d1605d70eb5bb25e1289cd04433843fab25e939408a327f923d92cf081
|
||||
CVE-2020-19363,0,0,e9f93d26708022d450f08abde71acd675dcfb39654b221ed0d042506faf56678,2021-01-22T19:45:56.320000
|
||||
CVE-2020-19364,0,0,c44f456605a81c16c722e7cd3e9099fe58eef1ad3f73199760b02cab924af329,2021-01-22T20:49:39.427000
|
||||
CVE-2020-1937,0,0,42fa4d50cffbec1830adc8f0c54249dc9c1ce3cb643ec6ccc06f2f54e5147d51,2023-11-07T03:19:36.753000
|
||||
CVE-2020-1938,0,0,49904d6acdd786884a2d84ceb4379e584ba3cd9bee7c1080e527feb88a92435c,2023-11-07T03:19:36.830000
|
||||
CVE-2020-1938,0,1,aadf6818ff5253b4db6567ef81100cc8e4f6a7a19326fdbd0c93718e53b11f4d,2024-07-24T14:23:59.937000
|
||||
CVE-2020-1939,0,0,28319f2b82e52697710c066702bd731fee9d8aad374f060bda921ecb6d1e4bee,2020-05-19T16:19:17.037000
|
||||
CVE-2020-1940,0,0,e96bacadcc78fe42fe4b9516dedd97d6ee6f4a4492f17430930a53d954f66e8f,2023-11-07T03:19:37.197000
|
||||
CVE-2020-1941,0,0,5350eea2f69ee06553ae7544427286bd13a63b2c2f36419708dd108e1381d919,2023-11-07T03:19:37.307000
|
||||
@ -153813,7 +153813,7 @@ CVE-2020-24075,0,0,a4e1c0929a794592036d4f4f55f2018c473c4420020ce6d38d3ff859bb8f2
|
||||
CVE-2020-24085,0,0,36dc9ecfad21733adba79f670b8a0c7f72d1bc23a9ed5c08a1249114aa915aee,2021-01-30T01:52:56.210000
|
||||
CVE-2020-24088,0,0,5daaaa8199391d28694f1b5e660719fee34f66a68451cf84904db2a0d6ae742c,2023-09-13T15:03:46.090000
|
||||
CVE-2020-24089,0,0,7427b5dec3e8323e3589b26611c1fbfcb9d33a565a9c245ef2e62d02a728a986,2023-09-21T13:21:26.303000
|
||||
CVE-2020-24102,0,1,4dc99be1c23b766b4f26e96f2c2ddde1049e7b757649b21d1f80b9b3d114d1f3,2024-07-24T12:55:13.223000
|
||||
CVE-2020-24102,0,0,4dc99be1c23b766b4f26e96f2c2ddde1049e7b757649b21d1f80b9b3d114d1f3,2024-07-24T12:55:13.223000
|
||||
CVE-2020-24104,0,0,fbb4efcf58d1f727ffff0ae67b74aa346d7d8b26414283515bb2ec728cd84fb4,2020-08-31T16:29:12.210000
|
||||
CVE-2020-24113,0,0,a33d0a4b1ae816dfcdb9871437627d7bc94b10a4e745b33597c039104d4ac8f1,2023-08-28T20:09:43.660000
|
||||
CVE-2020-24115,0,0,30853f4c52f41b9976ea7ab90988e1af4c04baad5d97a60bd069017a25a9ac4b,2023-11-07T03:19:50.900000
|
||||
@ -190053,17 +190053,17 @@ CVE-2022-20695,0,0,a67218050b39b1ebcb3bb9d9ffe620f2393d7aa904bfc0db46b1b3ef9192d
|
||||
CVE-2022-20696,0,0,0e2ec17e85320daef5fa429716ab6e27435f89b1f94f0315cc9b4a011e075f88,2023-11-07T03:42:39.143000
|
||||
CVE-2022-20697,0,0,ca091db34783bcd68d348033ed7f75688ed0d3c2afbe10bb81b76de2204d8437,2023-11-07T03:42:39.340000
|
||||
CVE-2022-20698,0,0,54095f5556b313d88f3f5e122ea9374ff1e8a92c6b4d92dba6c3d83489770ded,2023-10-01T11:15:09.633000
|
||||
CVE-2022-20699,0,1,e254453ada9a1bd5adc3c782870b2ef2e4967f2991041d00d05716d5ac9241ea,2024-07-24T13:48:50.880000
|
||||
CVE-2022-20699,0,0,e254453ada9a1bd5adc3c782870b2ef2e4967f2991041d00d05716d5ac9241ea,2024-07-24T13:48:50.880000
|
||||
CVE-2022-2070,0,0,ebf8102595490c2d4a5029670d3d8dcc1fca8784e6efdcf222581d18ab65653b,2022-09-26T22:39:00.960000
|
||||
CVE-2022-20700,0,1,d16e53f01c4be018f921f79807007f55f3e6f1f87ad42b532a98a7e7a8dfeba2,2024-07-24T13:41:07.373000
|
||||
CVE-2022-20701,0,1,615eac12aacee411602a3db0cbfd72597dc3ebdb5e2aad3c6f0d87dfcad8bf0a,2024-07-24T13:38:21.353000
|
||||
CVE-2022-20700,0,0,d16e53f01c4be018f921f79807007f55f3e6f1f87ad42b532a98a7e7a8dfeba2,2024-07-24T13:41:07.373000
|
||||
CVE-2022-20701,0,0,615eac12aacee411602a3db0cbfd72597dc3ebdb5e2aad3c6f0d87dfcad8bf0a,2024-07-24T13:38:21.353000
|
||||
CVE-2022-20702,0,0,497a31546634167a7d1444c1f9b11f943d0874cc70ddd046a141d485d8c22070,2023-11-07T03:42:40.140000
|
||||
CVE-2022-20703,0,1,8b631797e12e5a4ae3f8f864b5fe05100d20e13f0991b79e4d7fcbc1b979491e,2024-07-24T13:35:37.437000
|
||||
CVE-2022-20703,0,0,8b631797e12e5a4ae3f8f864b5fe05100d20e13f0991b79e4d7fcbc1b979491e,2024-07-24T13:35:37.437000
|
||||
CVE-2022-20704,0,0,d1eaa2daef702c394337f9b3726615af78cf0936faca0be16b0e2c1b4a755d99,2023-11-07T03:42:40.520000
|
||||
CVE-2022-20705,0,0,02d315eddcce14eab80b9e5cc82c1ff31aec9f933f37a203c061dad8cb2a33b1,2023-11-07T03:42:40.710000
|
||||
CVE-2022-20706,0,0,fe0203e43dd8398ecf8d8fed0473fb3261e18714c854be4fd033d952cfc3e3f2,2023-11-07T03:42:40.963000
|
||||
CVE-2022-20707,0,0,94a26cf44e28e2ae8a6418fa44cafdb3a4fe751c7b77b406fe788b5be26c3520,2023-11-07T03:42:41.160000
|
||||
CVE-2022-20708,0,1,a23a02bb80ca5070212136ec2b90055129a907e0f97e57b75b61843ef77629d5,2024-07-24T13:34:53.930000
|
||||
CVE-2022-20708,0,0,a23a02bb80ca5070212136ec2b90055129a907e0f97e57b75b61843ef77629d5,2024-07-24T13:34:53.930000
|
||||
CVE-2022-20709,0,0,68e1555d29248b3630b08bdc17bdfbf84325b72a0c26ec64368307f5a2b58a99,2023-11-07T03:42:41.540000
|
||||
CVE-2022-2071,0,0,8bf9fb13da952a040d77a70c15958de046bed034eb5ae682c48171070a72d9fc,2022-07-29T16:41:26.513000
|
||||
CVE-2022-20710,0,0,9f2e2199ca7c49b7570bf329953c584157d289937017c33c127fd7131b4fd735,2023-11-07T03:42:41.727000
|
||||
@ -224253,13 +224253,13 @@ CVE-2023-32462,0,0,e07a0b8cf235c91f117aab5542e8a1e08692a6b7bc816a6d84fdff7939ebf
|
||||
CVE-2023-32463,0,0,9c0648bf3a62c21ad36b1e856d010660c2e367e55959b2f6ee06517e731afabd,2023-07-05T18:33:55.533000
|
||||
CVE-2023-32464,0,0,5002bc22d174d03b224c414e085222536ab31791807238bbf4cd033cfd86a1ab,2023-07-05T18:31:27.907000
|
||||
CVE-2023-32465,0,0,3b910cb507c14d4c201ed99e11b2f097c6e541241b586413c4b2c4c1c1c5ebcd,2023-06-27T18:39:23.987000
|
||||
CVE-2023-32466,0,1,aa84849cfa08c7092fc7acbf5a9b02abc1f7dc11e53d6384fb36872c6aab0adf,2024-07-24T12:55:13.223000
|
||||
CVE-2023-32466,0,0,aa84849cfa08c7092fc7acbf5a9b02abc1f7dc11e53d6384fb36872c6aab0adf,2024-07-24T12:55:13.223000
|
||||
CVE-2023-32467,0,0,92dc670a37cbc195f9aee3f2f699c2fc979d516f1a92fbab736ae2a84445b2ab,2024-07-11T13:05:54.930000
|
||||
CVE-2023-32468,0,0,3aaf8d963cbce4f5d5319dd617a26b2fa711b5f2996fe21d5e604c3f9b4c55f8,2023-08-03T18:23:50.197000
|
||||
CVE-2023-32469,0,0,6b66634362347d05c43893f73f84b043ba50f94ace2183d7db139e18e104e674,2023-11-29T19:49:42.947000
|
||||
CVE-2023-3247,0,0,dc024bb4c63f22d2d922c859e74704e54f9264e2ea29c37dc55d1fd134910214,2023-08-01T16:38:09.033000
|
||||
CVE-2023-32470,0,0,1d1831b86e4f49c8df32eecce1f1b20c4ae5ed94d12e60777f158aa9c9815ea1,2023-09-13T14:37:24.530000
|
||||
CVE-2023-32471,0,1,8e25c012663f3a81d6a55bccb2d24b5cdd8cd51ae78f2b7beced520b9c3113e4,2024-07-24T12:55:13.223000
|
||||
CVE-2023-32471,0,0,8e25c012663f3a81d6a55bccb2d24b5cdd8cd51ae78f2b7beced520b9c3113e4,2024-07-24T12:55:13.223000
|
||||
CVE-2023-32472,0,0,17c2725f723be369591982ed957fd026847faf3ab703e66da6749f40fa5279fc,2024-07-11T13:05:54.930000
|
||||
CVE-2023-32474,0,0,d6a828b10f15016d3a4296d029159cd45eff255f547ac600257d313f221bad5c,2024-02-12T21:37:18.687000
|
||||
CVE-2023-32475,0,0,1d606a374c4ae0f3a73cad6cf7cc78e1a939167312580108942fa2c074cb968a,2024-06-07T14:56:05.647000
|
||||
@ -233618,6 +233618,7 @@ CVE-2023-45245,0,0,f71f5550bce318c5896855b0720ef3b014b7edad826762736cbbe2c3e48a3
|
||||
CVE-2023-45246,0,0,6799976449efb5e7dfbd39ca49c91e79edc135b105c217fc842128d098ea333b,2023-10-11T17:20:21.937000
|
||||
CVE-2023-45247,0,0,cf730bce8af4196d54c7fa8e0341f517de223cc02208e0ec0dd8e04054077116,2023-10-11T19:06:49.937000
|
||||
CVE-2023-45248,0,0,cde75e840aad96dac96b2f35c9e6f15ef3cf04deb0931c7f7ba39cfb3ca21688,2024-02-27T17:15:10.327000
|
||||
CVE-2023-45249,1,1,10a9cde75e07e5659995bd3df2b40cf026739aac55f85d184ec520a70f016e83,2024-07-24T14:15:04.867000
|
||||
CVE-2023-4525,0,0,5bf42f67193da0102cbdfa0f5eae1107ad391f3088f5c3d8fcbbf1b1f9dc9ba6,2023-11-07T04:22:41.327000
|
||||
CVE-2023-45251,0,0,9301cd01cf0e1a09a624bf8b6813dd7dcd8b5641f21dfda46acef47990364d11,2023-12-26T18:15:08.030000
|
||||
CVE-2023-45252,0,0,307228454f587d0983793c9bfdd500c095874fad12af348d470cff72f1f8a6d2,2023-12-08T18:45:28.017000
|
||||
@ -235777,7 +235778,7 @@ CVE-2023-48358,0,0,fd42ec30edf0b4bc87a28db5c64e1d59dfe5aa82b9d6889cf14523d9f1e0b
|
||||
CVE-2023-48359,0,0,ccb3f595ead47de0e806cbd75338965d59fe717be8a86c3f09bb684f53159c8a,2024-01-24T20:35:30.263000
|
||||
CVE-2023-4836,0,0,08652eb22d8d820537a32135d6cdb0072945ba41f47c5813b91b860f7c20fc7e,2023-11-08T18:30:46.937000
|
||||
CVE-2023-48360,0,0,5b6e5d7b5fe192061e064b563bfee066f7ff8cfae4d4ee5e2ae28883a2e5e83c,2024-01-05T22:04:53.347000
|
||||
CVE-2023-48362,0,1,3df0b171100151d39c4325fb280aa8ac39964934d2974ee03f87fa3088272618,2024-07-24T12:55:13.223000
|
||||
CVE-2023-48362,0,1,2690f0d0cf647d3cb450d6d6a93a797aac88ce2f8b2f4be2d6392f9574f65861,2024-07-24T14:15:05.180000
|
||||
CVE-2023-48363,0,0,2bfc4ec5e7e25cb483b369af5958deb5dd28dd7cd426eb9cf32d0a8e81c4f250,2024-07-09T12:15:10.147000
|
||||
CVE-2023-48364,0,0,b82391d36b810ac4492568e964e6ec98f18ee88a09432c62aa0865e4a71170e3,2024-07-09T12:15:10.277000
|
||||
CVE-2023-48365,0,0,08ac0336d1b7c8130bf42658d4f4f8599137b51618c91dfe4765b7deedb1fc3a,2023-11-29T20:43:54.133000
|
||||
@ -241480,7 +241481,7 @@ CVE-2024-0756,0,0,b74435a4e5e1d4f3b3a4ce7f115d91d803212fb6f57df8fa4a2fa8d8698a38
|
||||
CVE-2024-0757,0,0,82f1d5fe239632b077ccabeaf1b70c316c565ea22ca5e26cba66c98605a2ac8c,2024-06-04T16:57:41.053000
|
||||
CVE-2024-0758,0,0,fc97ebc5b04803b57ecd71df236ee98d87d4a211b2215bb34049825cdbd967a6,2024-01-26T17:00:10.607000
|
||||
CVE-2024-0759,0,0,1f29bc7ec90b9be141ba5df168c832467834f0104b9d12619d749a3c91302f63,2024-03-07T20:15:50.480000
|
||||
CVE-2024-0760,0,1,36f24b399642a7d2e4a3be797e5822ecc21a02ca3e694d29c61f205ac07dd803,2024-07-24T12:55:13.223000
|
||||
CVE-2024-0760,0,0,36f24b399642a7d2e4a3be797e5822ecc21a02ca3e694d29c61f205ac07dd803,2024-07-24T12:55:13.223000
|
||||
CVE-2024-0761,0,0,b79031e86661bd45f67f34e880253c63ee13d5042f1a53406b385d1b1dffaecd,2024-02-13T17:16:46.780000
|
||||
CVE-2024-0762,0,0,81ad586535781fa8baa3508ec280780590072000f5a50fe32a89e5b366d40ac6,2024-06-21T10:15:10.580000
|
||||
CVE-2024-0763,0,0,5db758bc3605bfbe323fa32ed26d84a2f001f92484a51218ea35fbdc0710d446,2024-02-28T14:06:45.783000
|
||||
@ -241681,7 +241682,7 @@ CVE-2024-0977,0,0,4dea6129caae85894314c934930c2101596d2996e50ec3c75a7e794655207c
|
||||
CVE-2024-0978,0,0,a03b6af7d51db1804e2eaed08f8aa81c6b9c0077650321c83e62ecd6ffee9fe3,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0979,0,0,7723165f13ecdb2435ed2fb1f551bb8ae4a819c47830717a3e66000b31abf2c4,2024-07-02T14:51:28.827000
|
||||
CVE-2024-0980,0,0,c8c9084fb2baad3341765fe36b79c09c499a2498d7806837427d52160f9ced2a,2024-07-03T01:44:56.397000
|
||||
CVE-2024-0981,0,1,8e56067a329ae8be3c50d75a950124e3f0907862c1ec8eaaefc75c7ab7488249,2024-07-24T12:55:13.223000
|
||||
CVE-2024-0981,0,0,8e56067a329ae8be3c50d75a950124e3f0907862c1ec8eaaefc75c7ab7488249,2024-07-24T12:55:13.223000
|
||||
CVE-2024-0983,0,0,e4b8907c304c2092b03bf4a362956e919545b388414974dac04b6f4743499982,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0984,0,0,73a3a7bd606259afe92894700c99ddae6e9a89e966e6347fb231a8eb1fd7abd3,2024-02-29T13:49:29.390000
|
||||
CVE-2024-0985,0,0,6feb39a8a7f264b3cb456efd47a6c85fdf3bdc2b683c0aef1c01ee214b73b389,2024-07-10T18:15:03.083000
|
||||
@ -242238,7 +242239,7 @@ CVE-2024-1571,0,0,bfa27c72fb27e25145e1d8fbaa159be8f6817ae8b22600888e4724fd08ccce
|
||||
CVE-2024-1572,0,0,ce54662d932d47130273925c29aeed2cfb97655394c2c48a84b3a3915cba5f12,2024-05-02T18:00:37.360000
|
||||
CVE-2024-1573,0,0,1dca0fc4b174522b059a5ada22a974faf13b9e7ff7169f0c03f3321575fb2f67,2024-07-05T12:55:51.367000
|
||||
CVE-2024-1574,0,0,72feffe42c72d6830d032663fa96f8a42adaa592b8140c7ff86296f6edebc03d,2024-07-05T12:55:51.367000
|
||||
CVE-2024-1575,0,1,72640f5ac75448b4b5509a8cb432003a1dfdf54ba22e8912d56e4943fbc2b8dd,2024-07-24T12:55:13.223000
|
||||
CVE-2024-1575,0,0,72640f5ac75448b4b5509a8cb432003a1dfdf54ba22e8912d56e4943fbc2b8dd,2024-07-24T12:55:13.223000
|
||||
CVE-2024-1576,0,0,53cb5dbc448926f2ab1efc2aadbe2dfad5145a0890b1fd74dd7c940df36048b4,2024-06-13T18:36:09.010000
|
||||
CVE-2024-1577,0,0,0825f77547377b72aa868b67a204fdb0b73ad4a5025220d6124ec5802e6bc449,2024-06-18T13:15:51.627000
|
||||
CVE-2024-1579,0,0,b6d8173dad7692a86ca6531cf14391459a611253254c72b5260cedefe5ac123a,2024-04-30T13:11:16.690000
|
||||
@ -242375,7 +242376,7 @@ CVE-2024-1732,0,0,834564798b34803457a0ec9cad4eefb5bcc466f88b5c86130580cd8ef81bdf
|
||||
CVE-2024-1733,0,0,1de98e53179418755768544ec663a550e1c566834940320a34ae086f141e0f3f,2024-03-17T22:38:29.433000
|
||||
CVE-2024-1735,0,0,3dcff7ae67c98fab6233fc660b83fa45dc36cbd0301a4874decf976f37ddb465,2024-06-12T08:15:50.043000
|
||||
CVE-2024-1736,0,0,a622ca00070de7a96b73d1a11c2dcf2634e69d5606345f8f86e99a97ccacdaf4,2024-07-18T19:50:31.223000
|
||||
CVE-2024-1737,0,1,1e9882d67e688aa57cd7343caeee7823e7b6211bb225680c6854687540557338,2024-07-24T12:55:13.223000
|
||||
CVE-2024-1737,0,0,1e9882d67e688aa57cd7343caeee7823e7b6211bb225680c6854687540557338,2024-07-24T12:55:13.223000
|
||||
CVE-2024-1738,0,0,65086d20a025a8acdbd054263ca4cd14eb5b5ba61d808610c94ef2eec44edd2f,2024-05-15T16:15:09.807000
|
||||
CVE-2024-1739,0,0,0f6aa88dfc12de7693a69727eb574af9b67e4c54140ec3c21c30b657e8fcbacf,2024-07-03T01:45:31.133000
|
||||
CVE-2024-1740,0,0,974b4647e97273950b6a297affa420d08f59acef309aa37814c6598a456898d5,2024-04-10T19:49:51.183000
|
||||
@ -242596,7 +242597,7 @@ CVE-2024-1971,0,0,0d9cb5107f1036f4f23265da8dd7b2bd2dcf4479650a723be6560fae09ba01
|
||||
CVE-2024-1972,0,0,2560881ff7431f691f7bc00728ec8a23e2620398774dabc33f53c4508cee2e65,2024-05-17T02:35:43.363000
|
||||
CVE-2024-1973,0,0,626b2f0735da4862b031577cf6d60a60bb435d6eef085a140fda3327fd09bd68,2024-03-26T12:55:05.010000
|
||||
CVE-2024-1974,0,0,dc475e5db2810e48258099e8096a48a8d4eea51b1241d562afef1cfd4323c64d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1975,0,1,beaef9077e417c5b88d4f7e7a33c3d877a45569e428b187efa80dfd126df1238,2024-07-24T12:55:13.223000
|
||||
CVE-2024-1975,0,0,beaef9077e417c5b88d4f7e7a33c3d877a45569e428b187efa80dfd126df1238,2024-07-24T12:55:13.223000
|
||||
CVE-2024-1976,0,0,c42fde98a9f4f021d37eae05be5cdd6a425eba391cce3b7b3b2e8b240d70bd79,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1977,0,0,f4c93cb09e0dd632ab410c1ff88e1a572fb17d35be648b109a192a65dc30f9e6,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1978,0,0,194a996e86c18d7c40d1315b29a524d0f48e8a7d042ccb89cd8a2a6beb64d004,2024-02-29T13:49:29.390000
|
||||
@ -243665,7 +243666,7 @@ CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd
|
||||
CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000
|
||||
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
|
||||
CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000
|
||||
CVE-2024-21552,0,1,cca88d3958ef8dbde43c3d8aa2af78ed997fde7ae88029225af47b23b037e5fa,2024-07-24T12:55:13.223000
|
||||
CVE-2024-21552,0,0,cca88d3958ef8dbde43c3d8aa2af78ed997fde7ae88029225af47b23b037e5fa,2024-07-24T12:55:13.223000
|
||||
CVE-2024-2156,0,0,3e156cd1519b9856caf676cc7af155ea1ba3901c226a3a379024601d5610634d,2024-05-17T02:38:05.157000
|
||||
CVE-2024-21583,0,0,5ec658f3354d2fc39ca1e98c3b56c4da1b7944a9e0da47df38fc57405ca1a8ed,2024-07-19T13:01:44.567000
|
||||
CVE-2024-21584,0,0,8b5526ceb3e16a0ab47a1bfab91d9be92bc9a5e69e8211c3726ea53cdfac9e76,2024-03-12T12:40:13.500000
|
||||
@ -244318,6 +244319,7 @@ CVE-2024-2244,0,0,41aec355f079deb3c815718a9277f010e5e21c50317c0cc2fa902ffd2d6d51
|
||||
CVE-2024-22440,0,0,3d70b2afb8c1daefa939392497f652da82a7db6224ab8e08ddbf5f360293d915,2024-04-17T12:48:07.510000
|
||||
CVE-2024-22441,0,0,d974db705829cf05b22e157df217440dd5d74842713d9bc45c9eb02f022d665b,2024-06-13T18:35:19.777000
|
||||
CVE-2024-22442,0,0,6cd8943b606f82f9805c763a4b9ec31735cf88cf76efca2ccc718cdf40618170,2024-07-16T18:00:02.110000
|
||||
CVE-2024-22443,1,1,92c5174ac9c55788bda65af2899e87a58fc1ca5fbe5a961fb9d983bf5b1f2736,2024-07-24T15:15:11.370000
|
||||
CVE-2024-22445,0,0,a6af5c7306e37f1c831f19f1accec343bae2ff2fdb348ced0577263d09a6b8e1,2024-02-27T16:51:44.013000
|
||||
CVE-2024-22448,0,0,8e90df505cef41effc57c679101495cb231edb0790ae704dce635c915090456b,2024-04-10T13:23:38.787000
|
||||
CVE-2024-22449,0,0,f33d4db580b05ecc377b9d7d6de8d5383f1a67c4e1bbff2a1ad282c40aa707a2,2024-02-03T00:30:30.737000
|
||||
@ -245485,7 +245487,7 @@ CVE-2024-24498,0,0,0aa227dc68d56b6857000c562a4cac27071ca2f47030d798b9bd4912ab131
|
||||
CVE-2024-24499,0,0,e4ff37cd2db9d4d32f1157041bef41498f67a3696e29884293222c73e4e39b9b,2024-04-24T21:15:47.147000
|
||||
CVE-2024-2450,0,0,755e866a7b0db6589d3e0a883887ca70c54bd78a033c510c6d171025dcde46e1,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24506,0,0,352f7b438b05b4fbf04fde226f661101b73c52d15d081ca65fec9f440b295fc5,2024-04-03T12:38:04.840000
|
||||
CVE-2024-24507,0,1,db6d74810f343dc9083835da56a72771c241b14db21b5bd25cdd0f323d95a56d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-24507,0,0,db6d74810f343dc9083835da56a72771c241b14db21b5bd25cdd0f323d95a56d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-2451,0,0,ed8963260b73d0c2914199c7ccad86d4c10e40338037d43fae0b6a4b737eaa20,2024-05-28T17:11:55.903000
|
||||
CVE-2024-24511,0,0,eae91992a4f8ae9aeded116229f78eeb98fc9499dd99da81c095e8822d970bce,2024-03-04T13:58:23.447000
|
||||
CVE-2024-24512,0,0,5297ae1840ce088f7a7ad9c82816ab5d47fccf4784d399ef43fa4059b97a6a10,2024-03-04T13:58:23.447000
|
||||
@ -246216,7 +246218,7 @@ CVE-2024-25634,0,0,a6c0976398d76132e45109770c34649b9cd1b53574ce636d0b3d3dba0d5b6
|
||||
CVE-2024-25635,0,0,0396aede9a718a4992e7575bb30a0d211bf1d85759070350344147d63377b4eb,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25636,0,0,4e6fd7db5d6991432a0fc47bea99f1bd82ebb492967965ed027d0a8cefe8402e,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25637,0,0,6b107052af4924b87ae030a7574b9b21f62a146f03952919ea9b1d4b0e21ed3d,2024-06-27T12:47:19.847000
|
||||
CVE-2024-25638,0,1,7f8f1079c160060a16106452028dd7eb9ccdcd50bb3965ebe5b6b12548db2abe,2024-07-24T12:55:13.223000
|
||||
CVE-2024-25638,0,0,7f8f1079c160060a16106452028dd7eb9ccdcd50bb3965ebe5b6b12548db2abe,2024-07-24T12:55:13.223000
|
||||
CVE-2024-25639,0,0,2e0133ad446d332cd68f57f778e89c8682ede3319349a698b825e88d07ce11db,2024-07-08T15:49:22.437000
|
||||
CVE-2024-2564,0,0,6b3fd70d19edcd290602091f68cfa932af4444200d4de70b2e0360193173678c,2024-05-17T02:38:19.517000
|
||||
CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef455,2024-02-20T19:50:53.960000
|
||||
@ -246479,7 +246481,7 @@ CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cda
|
||||
CVE-2024-26018,0,0,504335bbc761c181e6e0e6311b5c9a67674f4d2e194452a2b54f2b4e56156748,2024-03-26T12:55:05.010000
|
||||
CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000
|
||||
CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000
|
||||
CVE-2024-26020,0,1,c3af68fd4e405a95ac1ee216ac5199ad392060554e72b2c1dedcf9e863dfab9a,2024-07-24T12:55:13.223000
|
||||
CVE-2024-26020,0,0,c3af68fd4e405a95ac1ee216ac5199ad392060554e72b2c1dedcf9e863dfab9a,2024-07-24T12:55:13.223000
|
||||
CVE-2024-26023,0,0,670e783dc656d270b96b38e7fba1adff0be56adda08591c41f9bc61ed8e8e6a6,2024-04-15T13:15:31.997000
|
||||
CVE-2024-26024,0,0,3ab60f6be938f975935e53b7a80711b98fe8d56f189e7148a76008394bc4ac8a,2024-05-29T13:02:09.280000
|
||||
CVE-2024-26026,0,0,9489dfd8cfaf84cc429afc6dedc0bc5efa9a938711a5b920a49c5eb5da48c8dd,2024-05-08T17:05:24.083000
|
||||
@ -248454,7 +248456,7 @@ CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70d
|
||||
CVE-2024-28682,0,0,02be1c405dc5aebe82585b37c498baa25485b44921e1eb4fbc423effbc8757f7,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28683,0,0,a4d093be60b3c2d6b460f6a76cb45ebc186bb3e16caaa646235de3d01aeda1d8,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28684,0,0,dfd73b6865a99ea6334fc6b8649a9d09bd29a09bbb6221cc4e10b05f5c40ada5,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28698,0,1,6629faaa6dc4486898bcd56bcd2d9c071f21f9cd7af286acc070a1d3c8580cbd,2024-07-24T12:55:13.223000
|
||||
CVE-2024-28698,0,0,6629faaa6dc4486898bcd56bcd2d9c071f21f9cd7af286acc070a1d3c8580cbd,2024-07-24T12:55:13.223000
|
||||
CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000
|
||||
CVE-2024-2870,0,0,101cdd5ef34ec78aee7279476042f6231ac50ceb8dcc24da905d675c6dbc10c3,2024-07-15T13:00:34.853000
|
||||
CVE-2024-2871,0,0,a7a747cc7e44787061231b304b7fa297ab3e10c5c0c5d67f97a2b8176c2eaee9,2024-04-10T13:23:38.787000
|
||||
@ -248722,10 +248724,10 @@ CVE-2024-29063,0,0,a8033ce9e699f35cb65dc8d63268bfdd99aa16f594ad08413d90e8003a22b
|
||||
CVE-2024-29064,0,0,88daf3a7de89b464600feb0ee044529e05b02bc2ba2ebf4683d236ef22e3a252,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29066,0,0,b57916d53c87b911e1996a4619a92f6e3a854e8931117c8efeb51360c73379e4,2024-04-10T13:24:00.070000
|
||||
CVE-2024-2907,0,0,bd4e59455721fd47a3f3bf4cc54009a430bac090133efd0393d311456e4d173d,2024-04-25T13:18:13.537000
|
||||
CVE-2024-29070,0,1,9bb8fc70fcc7f2f8368c3f24ea4c3b75c88f99fe4e019835c530d2dc358d46c3,2024-07-24T12:55:13.223000
|
||||
CVE-2024-29070,0,0,9bb8fc70fcc7f2f8368c3f24ea4c3b75c88f99fe4e019835c530d2dc358d46c3,2024-07-24T12:55:13.223000
|
||||
CVE-2024-29071,0,0,06a4c013d7966a06671f5afa3de9f823a9a7634e70711b0ea0f16d92c424f917,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29072,0,0,50e2db556663c43fd665c3ae801a5bd36f73f0e7479a230bf4ff9553f9fcd995,2024-06-10T18:15:30.110000
|
||||
CVE-2024-29073,0,1,edd87d03e74abbe3093f937688b072e38c5d4ed0ca6dad718f63073566a86616,2024-07-24T12:55:13.223000
|
||||
CVE-2024-29073,0,0,edd87d03e74abbe3093f937688b072e38c5d4ed0ca6dad718f63073566a86616,2024-07-24T12:55:13.223000
|
||||
CVE-2024-29074,0,0,dae045c5f696de776b77da3987f8405651ce1bf4fa99e4d5313acc43e5165076,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29078,0,0,a4fab3b35091f8fd08881f2bf49d899dc5478faeb8df15472b3560684c1a5420,2024-05-28T12:39:28.377000
|
||||
CVE-2024-2908,0,0,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000
|
||||
@ -250683,7 +250685,9 @@ CVE-2024-31965,0,0,c4b61ad2f9eef097e0954fa70290fdb78da64c708fb57d0eafd0380254742
|
||||
CVE-2024-31966,0,0,e813fbcff3c742b22ff3620e22028114e0bd0dc18f84922743926ac1c55086d9,2024-07-03T01:55:39.753000
|
||||
CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb91b0,2024-07-03T01:55:40.527000
|
||||
CVE-2024-3197,0,0,324c7a8dc9ccea612ec0432519a90414016d01b55429c0b6dc09fc2cc5af230b,2024-05-02T18:00:37.360000
|
||||
CVE-2024-31971,1,1,e2121020620557c865365d45102e5f7e3aa59a18c45691113423d61bf40dddfd,2024-07-24T15:15:11.800000
|
||||
CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000
|
||||
CVE-2024-31977,1,1,812bd7554fd0faf55826b3105255d7f8b8a5d40ef8a9119a114c67ab274c2e30,2024-07-24T15:15:11.863000
|
||||
CVE-2024-31978,0,0,e4cc4367e420e8dcd4ef937e3967f9710a2baec19b8785bc53e2d6ca59645c6f,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31979,0,0,f9deec5ae1bbbfb21f2bdc6463cb5006e2e3b0c363609d81cd2769fd53ba3bc0,2024-07-17T13:34:20.520000
|
||||
CVE-2024-3198,0,0,1f0d31c07f6270b253d2bb83c7332c7bc9f718736230fc6377e93749d92894d3,2024-05-22T12:46:53.887000
|
||||
@ -250830,7 +250834,7 @@ CVE-2024-32147,0,0,ed14700cccfb0cda87a633109f0f7bc757ba5c2081f42bfda22f3a7feb6f7
|
||||
CVE-2024-32148,0,0,22eaa682ca57be740d99255c2e5fbd248f14af606d84d6d3c9100973529ff0b8,2024-06-13T18:36:45.417000
|
||||
CVE-2024-32149,0,0,b2b226678f5b6fc3063af16db3df1b1f5beae60c5b5de2cd72494f3a01514fcc,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3215,0,0,e5fb2a5f0603876a47fbaf0581a5b0a27f3e787377440e3d933b055fa124676e,2024-05-02T18:00:37.360000
|
||||
CVE-2024-32152,0,1,a8965bd98aaf555e9ed23e2749d018dcc788d77b05f790c2a8051b506ebc5a9c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-32152,0,0,a8965bd98aaf555e9ed23e2749d018dcc788d77b05f790c2a8051b506ebc5a9c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-3216,0,0,36d9056f12425336af262dd787bf04647621823ca6d005690ab6601a9ec48458,2024-04-08T18:49:25.863000
|
||||
CVE-2024-32161,0,0,aa486a10e1c1e1d4ce96087862c0685a8206cb453d4b368274ea4d3fc4398d92,2024-07-03T01:55:49.600000
|
||||
CVE-2024-32162,0,0,25479e1427613088330b7423836da6b673acaf22cdb31bae36970ab530a99a28,2024-04-17T20:08:21.887000
|
||||
@ -250978,7 +250982,7 @@ CVE-2024-32456,0,0,d14077b9c0d3fd624bb090c8902408112668af5dcd1ec1392b17398cab655
|
||||
CVE-2024-32457,0,0,e19d3294c5bd0f5932cb781ff1a6aaf0ad9675f665e5d230b25da52c6eb0ab24,2024-04-17T12:48:07.510000
|
||||
CVE-2024-32458,0,0,61e534ffc05a2fd1f0c764d7b2f3b2dc812bdfe09bd360efea2bba78b4568568,2024-06-10T18:15:32.790000
|
||||
CVE-2024-32459,0,0,565c2820f9f40b3ae7ac4380cb45711f29b0c6684b22418bec49fb00db4f3c9e,2024-06-10T18:15:32.940000
|
||||
CVE-2024-3246,0,1,c79fd28ca59ab763673faa857c0bce8ace903e0e33808dbfea5f83a6b45b9730,2024-07-24T12:55:13.223000
|
||||
CVE-2024-3246,0,0,c79fd28ca59ab763673faa857c0bce8ace903e0e33808dbfea5f83a6b45b9730,2024-07-24T12:55:13.223000
|
||||
CVE-2024-32460,0,0,791d6f5eece9c40a7a8e9bf5719f0d21a50aef5a23765ed0735f0298c727e1a8,2024-06-10T18:15:33.033000
|
||||
CVE-2024-32461,0,0,7a7784b51f232219ca425c17e34b523d7eced76a74e448dd98d2af59b52810da,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32462,0,0,3d3d05bcc9e36c0ca38630e8f66ae4fc7d4ac5c6b704d1bc0d85811d4a35b050,2024-05-01T18:15:24.140000
|
||||
@ -251002,7 +251006,7 @@ CVE-2024-3248,0,0,250b2dbd79112a5c409f75ad686b891df81af7a505fb4de44a036ccb0053b1
|
||||
CVE-2024-32480,0,0,19c71cf4b4927bc3b3fafd8de700ee992dac8872f5c7a42dd66fe5bbf9c168fa,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32481,0,0,c54808d23bab7c98fa436bfac9ea5eb550592b31e4fb9b6afe22c10c85cad030,2024-04-25T17:24:59.967000
|
||||
CVE-2024-32482,0,0,5a4b91f74f5513de658c6d05ee36d1ae3d22e82071be37fe63fc64fe4f8fa23a,2024-04-24T13:39:42.883000
|
||||
CVE-2024-32484,0,1,afbf3ac48d40767c4826dc7dad5b75d298e5e40ad07f8bc177a6c0da4211d395,2024-07-24T12:55:13.223000
|
||||
CVE-2024-32484,0,0,afbf3ac48d40767c4826dc7dad5b75d298e5e40ad07f8bc177a6c0da4211d395,2024-07-24T12:55:13.223000
|
||||
CVE-2024-32487,0,0,9b75323b8c9e4bc0024b685cf9b8c4f1bcf527dbb8fcae997b90b5ab98a4af95,2024-07-08T14:18:29.363000
|
||||
CVE-2024-32488,0,0,81a2243b5e2ca5f70c6717b1a678a8acd8bc42e42f87de6777fd53420c26e9da,2024-04-15T13:15:31.997000
|
||||
CVE-2024-32489,0,0,353f93b44cffff0cad2c885ce60dc0501a49e1b91044e82681218ae35f05717b,2024-04-15T13:15:31.997000
|
||||
@ -251447,7 +251451,7 @@ CVE-2024-32964,0,0,b623874e6a0274971696b1b7da0d2f443f746dffed315cb1a514ae93f0a27
|
||||
CVE-2024-32966,0,0,c438f55196809bbbc973f729157ff8c0c6df1250009855187f1fc3a5f9a87d17,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32967,0,0,edb16c37f9c2fc6d1e9a47803a7b1119309dad5cfcac07761a5d0ee65a1bacec,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32969,0,0,6ef0f8d88265e6683965945b29c1106dae41ceee98d494ed8c3a06c6d351066c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3297,0,1,1d78b9b9ec8cf08b428212aae468d0b6a6340efa6b238bd5187fbcecf64d21ad,2024-07-24T12:55:13.223000
|
||||
CVE-2024-3297,0,0,1d78b9b9ec8cf08b428212aae468d0b6a6340efa6b238bd5187fbcecf64d21ad,2024-07-24T12:55:13.223000
|
||||
CVE-2024-32970,0,0,5a01359cfb986ee6b849bc2a7e60567b8f37d4b5ce19db35dccc9f7464a14062,2024-05-01T13:02:20.750000
|
||||
CVE-2024-32971,0,0,ab8a148088c73648f89e5b394dd5a94a547e8c2e4b0230a8c2d6e56a7f3b753a,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32972,0,0,dc515bb8aec39a31fdf47e578fc51873affc085f71d155b12852513b737283e1,2024-05-06T16:00:59.253000
|
||||
@ -251836,7 +251840,7 @@ CVE-2024-33690,0,0,4b29f1b23343d6476122e2f5112d67e141fec47450a53b37809de490be0e7
|
||||
CVE-2024-33691,0,0,7fa17e89474a428bd3b5a341299c8cc0c50cc153606034879e45b72571e897f6,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33692,0,0,97b5d1f12ede19049bdbc2db3c53260a1d741e9a16eb8c174f95526ae9e59e76,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33693,0,0,190d9a78cd7779696a616357d6435d56405026304697bd024b7e6884645f2e68,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33694,0,0,ac99f5ee77dc812ba34292ee6f93028a29102eefcfcf60729d5a53d296a6315d,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33694,0,1,26d440cb75dcd86544ffadb69d95d3097f1e6a23ac05fe9a05fb2494be46df95,2024-07-24T15:15:11.927000
|
||||
CVE-2024-33695,0,0,496bc8a3b6cc06e0f2cb2ff5ef3180780eefdd07d63e68d063cf97ba79dd8598,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33696,0,0,8adc0db7b8cce33b994e835fa3f282e25f1f4ef5644a2aed7cd50d800fe731e7,2024-04-26T15:32:22.523000
|
||||
CVE-2024-33697,0,0,4a571113caa6ccf495d29be30608c42f9dddf9084d1562bed260e698c04aae88,2024-04-26T15:32:22.523000
|
||||
@ -252094,7 +252098,7 @@ CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c1
|
||||
CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000
|
||||
CVE-2024-34122,0,0,1f1afdb8bcd7920872d40bc049791e258094ad813a8f738f73973f16e8f185df,2024-07-02T17:44:45.700000
|
||||
CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000
|
||||
CVE-2024-34128,0,1,c97915102dfd0e38974bf97aab68fa646e656f1eb3dd71f8dec0f1259a6cd8d8,2024-07-24T12:55:13.223000
|
||||
CVE-2024-34128,0,0,c97915102dfd0e38974bf97aab68fa646e656f1eb3dd71f8dec0f1259a6cd8d8,2024-07-24T12:55:13.223000
|
||||
CVE-2024-34129,0,0,4b371bd2ce78a755ab5bce8486ffc40418a5eef964d8e637f4bd806924a46c43,2024-07-19T17:30:15.177000
|
||||
CVE-2024-3413,0,0,393490437f33ce616f0a6848540c1c0d3eed8ed2038327f28efd50e305f3828b,2024-05-17T02:39:54.073000
|
||||
CVE-2024-34130,0,0,39c33a1c2e45222da36d81ad20fcf2f2dae4088c0999d560d63f2526f4c81a40,2024-07-19T17:28:29.150000
|
||||
@ -252181,7 +252185,7 @@ CVE-2024-34313,0,0,5e7685d85b9be01539c2df2509259cab02217b4b071e1347f30175d5b9d70
|
||||
CVE-2024-34314,0,0,229621e4389765698bde4ee87838cb1f181d4467573c64759d3cb34848f22f9d,2024-05-07T20:07:58.737000
|
||||
CVE-2024-34315,0,0,2da9a3f01679d1f45f0bab05fdfd699ff25c9ffa82f02a145c0a3654a4071435,2024-07-03T01:59:52.883000
|
||||
CVE-2024-3432,0,0,e551b49681f8859ae36cb659ecb1c23b498009c34da11d9120924e791a83c404,2024-05-17T02:39:55.693000
|
||||
CVE-2024-34329,0,1,55e441069bbbc6aee815994671546edad2f026f6f85fc0fafecd140bdb4cb47a,2024-07-24T12:55:13.223000
|
||||
CVE-2024-34329,0,0,55e441069bbbc6aee815994671546edad2f026f6f85fc0fafecd140bdb4cb47a,2024-07-24T12:55:13.223000
|
||||
CVE-2024-3433,0,0,edcd29ee74449d6852e66c4b5448756dccce5e71a9bad9a5025cf08aebadb09b,2024-05-17T02:39:55.780000
|
||||
CVE-2024-34332,0,0,8f6c683335644bc93205234e59c96ea37a2e6389fa2dea8d8666173975a538e9,2024-07-03T01:59:53.650000
|
||||
CVE-2024-34338,0,0,0b7082b91aa78856b4b16b824fb5642c1377f61ea50b332ded8dd5ce396d2aa9,2024-07-03T01:59:54.407000
|
||||
@ -252351,7 +252355,7 @@ CVE-2024-34533,0,0,8566d0e8dbd9cd4017bd3a534ac0fd9822a90bf76d2b3f6401a871fd79682
|
||||
CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87cc4,2024-07-03T02:00:34.370000
|
||||
CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000
|
||||
CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000
|
||||
CVE-2024-3454,0,1,7dc4bcdd2a945b795b21148e6388bc0be4868de234be8b0b4ce54b7e0cd35a3a,2024-07-24T12:55:13.223000
|
||||
CVE-2024-3454,0,0,7dc4bcdd2a945b795b21148e6388bc0be4868de234be8b0b4ce54b7e0cd35a3a,2024-07-24T12:55:13.223000
|
||||
CVE-2024-34546,0,0,8800da10c69fec688483057d2cb770a66eb40079057655e7555d9e5ef263c46b,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34547,0,0,823aa1b861a91366dddc57a5e7dd1048515142481ea3eeb344f690ed0a7ca84c,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34548,0,0,8caa33bdc3c5be33f667017355107b8d8cdf99ab7255d3c04528b6e278893606,2024-05-08T13:15:00.690000
|
||||
@ -254175,7 +254179,7 @@ CVE-2024-3737,0,0,26f370727648bebdbdb4484feb8794c0f4f6f501db44738bd488af3fc5030b
|
||||
CVE-2024-37370,0,0,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767bad,2024-07-01T12:37:24.220000
|
||||
CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000
|
||||
CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000
|
||||
CVE-2024-37380,0,1,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000
|
||||
CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000
|
||||
CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000
|
||||
CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000
|
||||
CVE-2024-37385,0,0,1af5dbf4fe496116fcfe8797458a2e9292fd2ddec99a563e5137c9d207fb12bc,2024-06-07T14:56:05.647000
|
||||
@ -254505,7 +254509,7 @@ CVE-2024-37989,0,0,3b94113ccd1695e55c704a3f38d763d5ec54c44f354e4b1fe1efc7884dacd
|
||||
CVE-2024-3799,0,0,099fb34e0ee28d9311fbf29cfaad6b5950bd5e198b1ff9c15d8b2a88d4538973,2024-07-12T10:15:02.353000
|
||||
CVE-2024-37996,0,0,e39e1581961cad8f5d5dd910100078a11657ad2090cbed7264c9a8bad1310bf5,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37997,0,0,880ea769e8919f97f57b9878ce449ed40b5cbca31c8883be4629ac4f6a893243,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37998,0,1,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000
|
||||
CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000
|
||||
CVE-2024-37999,0,0,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000
|
||||
CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000
|
||||
CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000
|
||||
@ -254598,9 +254602,9 @@ CVE-2024-3814,0,0,af559420ce1e3044689136ce469515a498db3d8c3f527cd805c49729f88c5c
|
||||
CVE-2024-3815,0,0,b8c8a85ee4e0df355cab9e3d8b72a412d3d9d1a29cf1232bd66e69ecee9ede27,2024-06-17T12:42:04.623000
|
||||
CVE-2024-38156,0,0,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-3816,0,0,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000
|
||||
CVE-2024-38164,0,1,5b186cbc5566689f6db90fce6408389fb12c0a89114180da9a34ca4451572c56,2024-07-24T12:55:13.223000
|
||||
CVE-2024-38164,0,1,751c8badaae37724348a51d8acabc2d0f3d6291de1580308d22710bacf3d40a6,2024-07-24T15:15:12.270000
|
||||
CVE-2024-3817,0,0,4cefb34eb15d4ef81a2470a00ac0f43601ef6263c0fd4425e7542c27d02dfa54,2024-04-18T13:04:28.900000
|
||||
CVE-2024-38176,0,1,e3734105ed990bd245172ae5ed3a05cd363068cba1d963f987cf1be1d8483272,2024-07-24T12:55:13.223000
|
||||
CVE-2024-38176,0,1,c351263b567aeef878f2cf16b88ed589d8e08e5117ee540fb8a763d7eb37a708,2024-07-24T14:15:05.673000
|
||||
CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000
|
||||
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000
|
||||
@ -254992,7 +254996,7 @@ CVE-2024-3891,0,0,f9d0b3848969a1acfea7b9a20331b02cfc9759078e69f46c5576c9e3267f46
|
||||
CVE-2024-3892,0,0,635a0a9dff99d68a800a0815fade3930f3dac436f84c87dcff7c11db25dc6686,2024-05-15T18:35:11.453000
|
||||
CVE-2024-3893,0,0,8eb90c61219540666d23479f74a65575eaf5c1a0dbea88b697d9ac7cb634e024,2024-07-03T02:06:50.403000
|
||||
CVE-2024-3894,0,0,ca8cdba6c6957ab6848a65692183a74921d9acddfe51bc85133b173556c88ac8,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38944,0,1,948f3b1f9a16710c91801dcf50c7cb2e7491ae3c4a3615beac505b631b576a8f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-38944,0,0,948f3b1f9a16710c91801dcf50c7cb2e7491ae3c4a3615beac505b631b576a8f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-38949,0,0,f1b76a5b198d8cd8e7622b115a8855a4de307f59cefd5215d45fde9cfa0e8235,2024-07-08T14:18:46.730000
|
||||
CVE-2024-3895,0,0,f1c1a204b725be702c93f4b9fc036bb365050aae2160c5f507be071f13b94669,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38950,0,0,22d7d74f3fd2a34d71ced28539afa875128a0351336aca0ca02490a642cb6f36,2024-06-27T12:47:19.847000
|
||||
@ -255000,7 +255004,7 @@ CVE-2024-38951,0,0,68f3f4da755e62c58899a1c14a3bba19a0238b69cfd8361c9d435e588ebf0
|
||||
CVE-2024-38952,0,0,f3ef3fd79d2aa5fbb6eac9aa4ae095adbf433e668b0d02d175100cd59627c991,2024-06-25T18:50:42.040000
|
||||
CVE-2024-38953,0,0,dbde02c3cebb008392d98c40885c4b018b5aa478839fb4271aaec02242524f62,2024-07-01T16:37:39.040000
|
||||
CVE-2024-38959,0,0,cfec0ef25838165e6aeb5c8d3c664ec76927671369d600966c63c52c96a40800,2024-07-11T15:06:03.203000
|
||||
CVE-2024-3896,1,1,d41d5bc5495384182084b9ceaf0ce580d5fa4f1a6952dbc3dc4ad6e7d53b051e,2024-07-24T13:15:10.453000
|
||||
CVE-2024-3896,0,0,d41d5bc5495384182084b9ceaf0ce580d5fa4f1a6952dbc3dc4ad6e7d53b051e,2024-07-24T13:15:10.453000
|
||||
CVE-2024-38963,0,0,d6810e29d19f952e1613d829958cfc344b3c3660b4b5f6561b4ad90c435b0dfd,2024-07-11T13:05:54.930000
|
||||
CVE-2024-3897,0,0,5a8068a855e86bb89a1451de196d4bad1fbc355f1787f3259631c60aae1e07ca,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38970,0,0,eb04e06c9fbc74e88c4fcf5d6eeffbd442cec39d7eaf1361f68ecba935eabe9c,2024-07-12T14:51:48.070000
|
||||
@ -255107,7 +255111,7 @@ CVE-2024-39243,0,0,fee8e511adb87ecb7b795183c7c37e3d0b9c7f991b9b5a9484f2b183016c2
|
||||
CVE-2024-39248,0,0,7a563316fd3453bbdb2eea83c64c484bfa847d40ebdeede8de43d451f8cafde1,2024-07-05T12:55:51.367000
|
||||
CVE-2024-39249,0,0,a8f23e36f9dec7b6dd0c3ed6214de893182dd9a10ec50f4f0f0e7c02e4cdf075,2024-07-09T06:15:01.913000
|
||||
CVE-2024-3925,0,0,7eee90dddbc89d587d2add5ec583b68109d8e96ea070cac853f0344fab97474f,2024-06-13T18:36:09.010000
|
||||
CVE-2024-39250,0,1,206c1c0772f8b7974ecbc9b8c1cc32aa375c8a841d74a38d55059a2612fc1bb2,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39250,0,0,206c1c0772f8b7974ecbc9b8c1cc32aa375c8a841d74a38d55059a2612fc1bb2,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb519,2024-07-11T15:06:10.633000
|
||||
CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000
|
||||
CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000
|
||||
@ -255150,6 +255154,7 @@ CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a
|
||||
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
|
||||
CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000
|
||||
CVE-2024-39340,0,0,8a19ea0d82baf517391d74de09fe55b24d4bbbe3d357c771c961dd3f6f9df19c,2024-07-15T22:15:02.910000
|
||||
CVE-2024-39345,1,1,bb7b8df3c4b3cb1615c1a7f98c0147e7dd806ffb567c44eb18328f315a363124,2024-07-24T15:15:12.360000
|
||||
CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000
|
||||
CVE-2024-39348,0,0,798f996b4382b8a6e782460918b5005c42ce376a9b87c3209ffaa4789fe2c24c,2024-06-28T10:27:00.920000
|
||||
CVE-2024-39349,0,0,d94bdd4e2f366e0736711898b6f6670e30f7a98126cdfe514679d42f61eff674,2024-06-28T10:27:00.920000
|
||||
@ -255300,7 +255305,7 @@ CVE-2024-39597,0,0,df02a109c472b1bfeae3b55516c86c7132897faff9d94f70a126a46568b13
|
||||
CVE-2024-39598,0,0,565f2774e84c891d5996cf36fa669402a223a2e5a490f549b69365c6075a44b7,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39599,0,0,71c6e22ff50e3a1f14090d5ce5359c041b1ab088b8ff29fe36a33f35ff802136,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39600,0,0,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8aaa,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39601,0,1,7691c6b30f5986c79e8398298f8afaed5e766d08eb3fdbaa17ee23cfa6227202,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39601,0,0,7691c6b30f5986c79e8398298f8afaed5e766d08eb3fdbaa17ee23cfa6227202,2024-07-24T12:55:13.223000
|
||||
CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000
|
||||
CVE-2024-39614,0,0,26b2dcc9a6a6be274ddfdc54c9957bec272862e2ee62a7b674c4947a1cc7966c,2024-07-11T13:05:54.930000
|
||||
CVE-2024-3962,0,0,48687fe56cf9bd40f5a5971493143104fa6812806c2dc18cc2c914079c1544b9,2024-04-26T12:58:17.720000
|
||||
@ -255311,7 +255316,7 @@ CVE-2024-3966,0,0,73fb2ae6dbee87e9388d8eb74bc7dee75170ed92fa9ef996fc6e09e4c624ed
|
||||
CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000
|
||||
CVE-2024-3967,0,0,5862f1bd72fcf48f7d564d5c642edefacf28c5dccb3d99f9648feaeaf3e033bf,2024-05-15T18:35:11.453000
|
||||
CVE-2024-39675,0,0,324904789d577f8da38a1b1d1fcdf082a86fba9fd2cc1697c3fb80289cc5120e,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39676,0,1,e843e26a051fd9d7a6fa411a5b9172b50db33ad2a0459f672d5ecbe647af8405,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39676,0,0,e843e26a051fd9d7a6fa411a5b9172b50db33ad2a0459f672d5ecbe647af8405,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39677,0,0,c1a0d9a5a9ccbb7df09329c8ee16f641c4f9bc5f42ed88da1c64c5051e623648,2024-07-08T15:49:22.437000
|
||||
CVE-2024-39678,0,0,f0f13ad18e725d440582b3a4bbd425936455389008ece86cf58b8c9519b22e2a,2024-07-18T12:28:43.707000
|
||||
CVE-2024-39679,0,0,ce5bdc949f2b785748533e9e266e218a34e39cb3d0887231dc8fbb4c0a149bec,2024-07-18T12:28:43.707000
|
||||
@ -255321,10 +255326,10 @@ CVE-2024-39681,0,0,16309c066fda62bf8c08baf4cbed854332949a8e78f8b4fd38768b4f30a8c
|
||||
CVE-2024-39682,0,0,00b5f2210802f383ff7e836ad4fd745cef6dcd07875442cfb9d268b986c976d9,2024-07-18T12:28:43.707000
|
||||
CVE-2024-39683,0,0,50045bf714bd4fe128b5e5cfcc599ff1064b3297e6cc6d531afb9c370803dce0,2024-07-05T12:55:51.367000
|
||||
CVE-2024-39684,0,0,9d26c3e7317b12372df75a7602ccce6b06916da9f4cacf1feb034e7c487c35cc,2024-07-11T13:06:13.187000
|
||||
CVE-2024-39685,0,1,793d82d9e6c83e49017cbd37c6bfb6e785552239e80e193ddbdb27afd7b3870c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39686,0,1,90bba9a849faeafa6bf958c9488ad69e3e7383d5c997d965dd1b51974ece6a2d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39685,0,0,793d82d9e6c83e49017cbd37c6bfb6e785552239e80e193ddbdb27afd7b3870c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39686,0,0,90bba9a849faeafa6bf958c9488ad69e3e7383d5c997d965dd1b51974ece6a2d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39687,0,0,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251ad78,2024-07-08T15:49:22.437000
|
||||
CVE-2024-39688,0,1,dccea6cc179f4688243addc0514825c9dd13727763645739ebeb475d416db47a,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39688,0,0,dccea6cc179f4688243addc0514825c9dd13727763645739ebeb475d416db47a,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39689,0,0,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d29cb,2024-07-08T15:49:22.437000
|
||||
CVE-2024-3969,0,0,017089a8e0e25cc18c41dde22c453ecf92ec4c4a53bf3304535dbfbcbb40fc3d,2024-05-28T17:11:55.903000
|
||||
CVE-2024-39691,0,0,5b1b13e200d826d3f40f75a75371b183af197da1146b1c1721e666feddcea9c6,2024-07-08T15:49:22.437000
|
||||
@ -255337,7 +255342,7 @@ CVE-2024-39699,0,0,711bdc17f9c229479a79abf16418d6f303c1d2fb494a38a72ece58a870304
|
||||
CVE-2024-3970,0,0,91552b239fa9d8e00e56c74ece4dae5720fa4dc9c44897dc0454091791cfe152,2024-05-15T18:35:11.453000
|
||||
CVE-2024-39700,0,0,c0797f3628df13d0523a3968cdcee9fc6d1644740c750ed207d822c73c9030ad,2024-07-17T13:34:20.520000
|
||||
CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8189,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39702,0,1,26972dcfed4a9e2d13857f82734cd85677a01fa267564ba6286c42935ec6e373,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39702,0,0,26972dcfed4a9e2d13857f82734cd85677a01fa267564ba6286c42935ec6e373,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000
|
||||
CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000
|
||||
CVE-2024-39708,0,0,000cfabacce752db3861ff9f8f3b1c505cd90f739471d05927bcaf43cab3bb6e,2024-06-28T10:27:00.920000
|
||||
@ -255406,7 +255411,7 @@ CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb83
|
||||
CVE-2024-39887,0,0,bcab76b5e08590d7913c7572e3483924f579ce0c6c9a43158866e543d2bd0484,2024-07-16T14:15:04.380000
|
||||
CVE-2024-39888,0,0,12ac4fc0e9c84bce2da7114954ff2c2a0c7f51f26f043191b5bde403ad5b0bce,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3989,0,0,05ae590a507d36950ff969d05988ddbd0846a5630f6cd12721f077e7e440e592,2024-05-14T16:11:39.510000
|
||||
CVE-2024-39891,0,0,fae4e79d06b3e21a3b7ca5b1bb301050245746259b0662a858e757a209dc9a66,2024-07-24T01:00:02.087000
|
||||
CVE-2024-39891,0,1,ac2498d43f524f93e5f6e3f84469838d6683dcf3baf4e057e1f4845ec04c137a,2024-07-24T14:38:43.270000
|
||||
CVE-2024-39894,0,0,34c636819842924262f04e0f8b1b3e5fee76dc937e3dec2bd58ccf156475d6d9,2024-07-23T22:15:08.883000
|
||||
CVE-2024-39895,0,0,81e277926f04a447fa0edae3630d7dab6d337a392b69cef51e67fcc762844274,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39896,0,0,aac3b3aa468382be89710a9d4924b439b2a50e399515ea32a798074da07af274,2024-07-09T18:19:14.047000
|
||||
@ -255415,7 +255420,7 @@ CVE-2024-39899,0,0,b9c786cfcd500686022cf562103fb3c46b8e02e37e407feef62bff9a568df
|
||||
CVE-2024-3990,0,0,4df49f2d1a20d6484a35480ddf93415ea905230fdfd638f023a4d51fb9f2296c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-39900,0,0,e5fa3498f347fb7ae36ea3c567d86ef714b8b4ea1b9fce0392081ed142cad041,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39901,0,0,2e70a8f9f46cc19984c51f63370a0f8333bfb1ff58b809a78b0486415e619ed2,2024-07-18T15:15:03.243000
|
||||
CVE-2024-39902,0,1,155ca5aa0932cd5e0c0d95f40d78b8f94c26287cf5e699a0e85b11c2bd47887d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39902,0,0,155ca5aa0932cd5e0c0d95f40d78b8f94c26287cf5e699a0e85b11c2bd47887d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39903,0,0,935910cac822f79a3bb483747c1709796e1f1686797cd50661d012bb05061bf3,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39904,0,0,12dfcb7489fbbc04166f8899b5558b4641d719eb33eca1dcad68903cd7888843,2024-07-11T18:09:58.777000
|
||||
CVE-2024-39905,0,0,80f913a61cef6f1c2b28da4a228824e63a50833144469e0ed56e623dda317247,2024-07-11T18:09:58.777000
|
||||
@ -255462,11 +255467,11 @@ CVE-2024-40037,0,0,a1e4fa50992969a69ef78238be5cac21afb6cd0a6f24b8f0651228dd966ce
|
||||
CVE-2024-40038,0,0,ecdf63429f82782f035ce89230520009ed797d648fa3a25bb6b29a0e8623d9cb,2024-07-11T15:06:19.697000
|
||||
CVE-2024-40039,0,0,e210b5ff95f4cbe50930111bbfa1727a53319595db825c61fbcbca8d251a4c44,2024-07-22T20:03:06.900000
|
||||
CVE-2024-4005,0,0,980f25dcabac4666d2a5ebf5d973009bd7c7226dd4f2e01aee26b530adf5da1a,2024-06-17T12:42:04.623000
|
||||
CVE-2024-40051,0,1,75fd7f2906c40209756954dd66b5f5cee33a2db6630cc09e906c96ebd33a611b,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40051,0,0,75fd7f2906c40209756954dd66b5f5cee33a2db6630cc09e906c96ebd33a611b,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4006,0,0,94faf2d168fb54b3d152844d072ec60ae7893cacd318e45ba2a9ad56b250c9d0,2024-04-25T17:25:05.903000
|
||||
CVE-2024-40060,0,1,85f874f5d021af4dd22e5ffaf10dbd36a63e3c57527b1715c493b27582208cca,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40060,0,0,85f874f5d021af4dd22e5ffaf10dbd36a63e3c57527b1715c493b27582208cca,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000
|
||||
CVE-2024-40075,0,1,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000
|
||||
CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2f5,2024-06-18T17:01:19.897000
|
||||
CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000
|
||||
@ -255529,7 +255534,7 @@ CVE-2024-40455,0,0,31e25278556a7a569f6d48ca8afce7491b76507f09027ad01ea2eacbbf9dd
|
||||
CVE-2024-40456,0,0,b69676c819bae5d36b3537137bd74debeb1a273fb95e8271fb39d39294f7a466,2024-07-17T13:34:20.520000
|
||||
CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40492,0,0,18603dc677df2f037c3e12bbfcb2354793a3ae9660f3df13b65361dfae39cba9,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40502,0,1,80ad739d30245682b2de314d0692efbae6d0a48cd212ab5565e45a2b6c762b58,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40502,0,0,80ad739d30245682b2de314d0692efbae6d0a48cd212ab5565e45a2b6c762b58,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40503,0,0,b7b74c3ecc2e3dadce6e3ea76ca2bffcfa4a5e02454bb102e0ec56df0b252cc5,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40505,0,0,a786b0d0057f0bbe60b81b592bc5adaae8e017b897b7a005a6c8b1ead930e40f,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40515,0,0,aa3af036b6952485bf51fdea15dd678b9b42e4cd0dbbfc73284a7100fad8108a,2024-07-17T13:34:20.520000
|
||||
@ -255591,7 +255596,7 @@ CVE-2024-40630,0,0,7de2616afe35fe6a2f4466f98346fd28ee106a7dd06220a48b0a183cb2c5c
|
||||
CVE-2024-40631,0,0,e76fc6e49d84a60697f94ea752f6e05b7f5417e39730b8ace11ee475f8eb8441,2024-07-16T13:43:58.773000
|
||||
CVE-2024-40632,0,0,e6e0d67d4d0269bad5508951d35718e2d8be48cd6b922ab10030a5117e405f96,2024-07-16T13:43:58.773000
|
||||
CVE-2024-40633,0,0,cb8b1e46d2fb0350ee65397b524eda33b035785c4ff54d8f631326909af07b87,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40634,0,1,f0b1b04d49b6a98a87295b9d83a3ab2b8cbfe90c15ea00701d78a02066d0251e,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40634,0,0,f0b1b04d49b6a98a87295b9d83a3ab2b8cbfe90c15ea00701d78a02066d0251e,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40636,0,0,98744b954b3d196b3f10d684008952126f958b809a4f56d792514a1180b74df0,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40637,0,0,8f01e513c3194bcf30056752321b26e2f21549acaed31b1fc0f5890d359b45ae,2024-07-19T14:37:17.863000
|
||||
CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000
|
||||
@ -255634,14 +255639,14 @@ CVE-2024-40741,0,0,ddd0ff9476ed1ff47a6c6ea90383139e3fceeb76685fa77b077d9f9786ebe
|
||||
CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000
|
||||
CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000
|
||||
CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000
|
||||
CVE-2024-4076,0,1,e0e2b007c1440dbf9672681a5eff521aa004949693c7d660a7d1e4ee3ddd4740,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4076,0,0,e0e2b007c1440dbf9672681a5eff521aa004949693c7d660a7d1e4ee3ddd4740,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40764,0,0,31190fa168623fbefe72005739844174b20afc4fdab83062110ac517be35c6d0,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40767,0,1,9740acbc39a8ac904449fe819056cf1ca38febd48badc3555fe4572da26d47f5,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40767,0,0,9740acbc39a8ac904449fe819056cf1ca38febd48badc3555fe4572da26d47f5,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4078,0,0,4f6a573d2d42430a81000704c37318a2f1d7afadf71bcba45d97fec5f925233f,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4079,0,1,77480512c155cc1ba9c6d21d28dd3b07d5f78d0d04ff147411735ae27b258bce,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4080,0,1,6e71df6568bf77146867d1944749c9d0835b7b19c10d04222a53e49f387410f0,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4081,0,1,ec57e0133e64417322d14482f588518f8d5e70bfac2335ec1d22f99346ae0a79,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4079,0,0,77480512c155cc1ba9c6d21d28dd3b07d5f78d0d04ff147411735ae27b258bce,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4080,0,0,6e71df6568bf77146867d1944749c9d0835b7b19c10d04222a53e49f387410f0,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4081,0,0,ec57e0133e64417322d14482f588518f8d5e70bfac2335ec1d22f99346ae0a79,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4082,0,0,02264cef46dbd3bc30b90eb0e358643df5f32c233cd928965c67d2a95fa3306a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4083,0,0,1cd1c6384007aa9a5a8af9731386deec2b0818df508019e87115186ced7033b5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000
|
||||
@ -255770,7 +255775,7 @@ CVE-2024-41008,0,0,86de6e2be092cac70f5596fb96d0253f26291855f34ae4ddc015775261181
|
||||
CVE-2024-41009,0,0,b973764a3f5390614759bf6dad52e86dad86b20c98263f759698c0703f8fb179,2024-07-19T15:06:23.827000
|
||||
CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000
|
||||
CVE-2024-41011,0,0,4c2c460e7d99f33158a9c285f2b0882c56a6716b8d689bc4bd4c6463e3fba1ea,2024-07-18T12:28:43.707000
|
||||
CVE-2024-41012,0,1,98ac685beec3c2bc99dfb952de6ca6d29eb3b71fe5532ae565f113eafbf11346,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41012,0,0,98ac685beec3c2bc99dfb952de6ca6d29eb3b71fe5532ae565f113eafbf11346,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4102,0,0,1b0aaa7efbf772a3034d5138f2cde018af6a8f41a0229b0c5f36e4d66092a2a3,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4103,0,0,ff27f3988e30e41f465bfc5b7800f7ae2f96b1e2cd71c1414de16617b75fe4fe,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4104,0,0,069e7afb1610585640d00d566d3fc4756dff3571ed269cd2ef1d63c8e8ce45e5,2024-05-14T16:11:39.510000
|
||||
@ -255784,17 +255789,17 @@ CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6c
|
||||
CVE-2024-41121,0,0,91cb53bc29963f11fdf64645513c1c2c3bf3f9456a5f423e3cb1f394f830e271,2024-07-22T13:00:53.287000
|
||||
CVE-2024-41122,0,0,a6a8383a81cf09c9b153a0323d2516ac8ce416bc61d76a25c8333778bb40d081,2024-07-22T13:00:53.287000
|
||||
CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000
|
||||
CVE-2024-41129,0,1,49760c4facba24da14310a8aaec7d506bc9460cea62e06abe7615580f897df69,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41129,0,0,49760c4facba24da14310a8aaec7d506bc9460cea62e06abe7615580f897df69,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b54476531329,2024-05-17T02:40:15.830000
|
||||
CVE-2024-41130,0,1,3261a584e7edf3f3595234f8eb2bc4cb2240cd20df8deb4c9a02d301bb600580,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41131,0,1,a469b327dab2c70b64323f08923a0a3cc6492c0286887e2f02007c413d21dc21,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41132,0,1,059caff7cce7231a7c76b300becd4e4b27d779e1effce439666ebf7a5ba8a7a0,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41130,0,0,3261a584e7edf3f3595234f8eb2bc4cb2240cd20df8deb4c9a02d301bb600580,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41131,0,0,a469b327dab2c70b64323f08923a0a3cc6492c0286887e2f02007c413d21dc21,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41132,0,0,059caff7cce7231a7c76b300becd4e4b27d779e1effce439666ebf7a5ba8a7a0,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4114,0,0,387f9ca6df27ba000d0f44d990ccd6bb074258bb946c87938379db9652dc0a14,2024-05-17T02:40:15.917000
|
||||
CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000
|
||||
CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000
|
||||
CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000
|
||||
CVE-2024-41172,0,0,aff170553f604e0c7275db2adb45c6ecf8207e69e7b01abeab9ae04e85025c2a,2024-07-19T13:01:44.567000
|
||||
CVE-2024-41178,0,1,eb51e130885af676333dba0cb4c99b4a91672c03f3463e8d2a02df03e636c643,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41178,0,0,eb51e130885af676333dba0cb4c99b4a91672c03f3463e8d2a02df03e636c643,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000
|
||||
CVE-2024-41184,0,0,5632ca1fe6b4d580f96d1889964128d406f3b607849d31bde6a0492547023118,2024-07-18T14:15:05.137000
|
||||
CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000
|
||||
@ -255809,13 +255814,13 @@ CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ec
|
||||
CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000
|
||||
CVE-2024-41281,0,0,67d3a54ff6c69e817d1c4d3304511fe0d1b87ffa7ae182f6c630038b3326bf87,2024-07-22T13:00:53.287000
|
||||
CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41314,0,1,b51b0e3a4e5d4ef00805134d9c64392d4de8d2322e969183a3b6dc33816f9694,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41315,0,1,a68e90aec55f0c153342e794139e84a95b20ef3a1a126ec70584092245e39d47,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41316,0,1,c9274bb79d4ba765ad537ccc2706ac76777f5e15d362d310fbcad6af2fafb632,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41317,0,1,5f2fa7a3fdee051d8d33c14a57cfa0a14785eb3306635111cfe4d986a4c4b209,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41318,0,1,43716bdb586662299e765abf70504c39aeb4e8f84836a086e46d45893e9363c9,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41319,0,1,9ed7dbbc6270be6f827714a032ea704fb49466783bc5f7a869b9586ff0a3bf38,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41320,0,1,c5a875fc50e40098ff2c260c87b7011f6622e714e9083a176560d9c8c9a46cbe,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41314,0,0,b51b0e3a4e5d4ef00805134d9c64392d4de8d2322e969183a3b6dc33816f9694,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41315,0,0,a68e90aec55f0c153342e794139e84a95b20ef3a1a126ec70584092245e39d47,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41316,0,0,c9274bb79d4ba765ad537ccc2706ac76777f5e15d362d310fbcad6af2fafb632,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41317,0,0,5f2fa7a3fdee051d8d33c14a57cfa0a14785eb3306635111cfe4d986a4c4b209,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41318,0,0,43716bdb586662299e765abf70504c39aeb4e8f84836a086e46d45893e9363c9,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41319,0,0,9ed7dbbc6270be6f827714a032ea704fb49466783bc5f7a869b9586ff0a3bf38,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41320,0,0,c5a875fc50e40098ff2c260c87b7011f6622e714e9083a176560d9c8c9a46cbe,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4135,0,0,3adddfced77f8fc8630aec5e175734a40783e3f6b247cb0614a312485a8097a3,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4138,0,0,0f7c3171dd014e7915cab9bf533b57ef231d5c30c6ae20f761b745c0767014ec,2024-05-14T19:17:55.627000
|
||||
@ -255852,14 +255857,14 @@ CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc
|
||||
CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000
|
||||
CVE-2024-4164,0,0,5c582c5408e712b207393008a4bc438580820bad61af8c831d6d320440184b2c,2024-05-17T02:40:17.710000
|
||||
CVE-2024-4165,0,0,1335796556da8c6a778d77814a8f1d84d8c2dc18b70d9de88815783ed1aa0d77,2024-06-04T19:20:31.500000
|
||||
CVE-2024-41655,0,1,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41656,0,1,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b6db,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000
|
||||
CVE-2024-41661,0,1,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41663,0,1,2b5ce53141b2de9b74a60e92e3f30deaac3830f3d557479059cba8f6054aac58,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41664,0,1,968689d7fd6f27159fff0941cd7d62708c912d0aa7f698a223c6de5e87e7791e,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41665,0,1,abaea4fdc3c53915a3209a944b40b8fe3a83fdbd0827e5893c651a4d0f6386e2,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41668,0,1,d649a2a5c90e957bfc9f2698aae879b13d0f5f730255ef5d13e3e5f57ca747be,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41661,0,0,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41663,0,0,2b5ce53141b2de9b74a60e92e3f30deaac3830f3d557479059cba8f6054aac58,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41664,0,0,968689d7fd6f27159fff0941cd7d62708c912d0aa7f698a223c6de5e87e7791e,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41665,0,0,abaea4fdc3c53915a3209a944b40b8fe3a83fdbd0827e5893c651a4d0f6386e2,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41668,0,0,d649a2a5c90e957bfc9f2698aae879b13d0f5f730255ef5d13e3e5f57ca747be,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d50708861e,2024-06-04T19:20:31.593000
|
||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||
CVE-2024-4169,0,0,c62ff626929882f5d2c6f5c5b02ad92c379b5b400e34f72b774f8d063efba0f1,2024-06-04T19:20:31.780000
|
||||
@ -255877,19 +255882,20 @@ CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca
|
||||
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-41824,0,1,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41825,0,1,6aad2331189a4332679fd93c0cdd3f8949299f242c1480d90e032f6f8578050d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41826,0,1,30e6a9ff82392f979a18e92490fd49ed5b724f02d886364de06b9ec807958da8,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41827,0,1,1133639557cfa92d8abf13d7529bc58f97726211543f6d207d6917f4579b173f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41828,0,1,cd8ccf5286135e13986bdc75d7a7e18ecf358d7e53494c275564839c7a6450bc,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41829,0,1,5ad52158012623eac040e55f03fc0f37d505417ba3c9906fa85371f094eea3e0,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41824,0,0,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41825,0,0,6aad2331189a4332679fd93c0cdd3f8949299f242c1480d90e032f6f8578050d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41826,0,0,30e6a9ff82392f979a18e92490fd49ed5b724f02d886364de06b9ec807958da8,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41827,0,0,1133639557cfa92d8abf13d7529bc58f97726211543f6d207d6917f4579b173f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41828,0,0,cd8ccf5286135e13986bdc75d7a7e18ecf358d7e53494c275564839c7a6450bc,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41829,0,0,5ad52158012623eac040e55f03fc0f37d505417ba3c9906fa85371f094eea3e0,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4183,0,0,c95eeb02531c25674be296e55025a1bd3e47bb47f078fa8bff79c7eea74c4268,2024-04-26T12:58:17.720000
|
||||
CVE-2024-41836,0,1,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41839,0,1,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a9459138645a8,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41839,0,0,5fe8ccf2e82b1dbd1e8f5be23a4b35f149d0ed119de3feeae98a9459138645a8,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc18,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000
|
||||
CVE-2024-41880,0,1,2045bc24fb104b692bbe32c5951eb01a25f3639f665062ea76ff47318e893861,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41880,0,0,2045bc24fb104b692bbe32c5951eb01a25f3639f665062ea76ff47318e893861,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
|
||||
CVE-2024-41914,1,1,cebf5100d857c2fc535606c79b230b729d85a50b5b307078e45057511dec27a6,2024-07-24T15:15:12.437000
|
||||
CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000
|
||||
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
|
||||
@ -255950,7 +255956,7 @@ CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7ed
|
||||
CVE-2024-4256,0,0,2885dad709315de5112b738946979afcb06c4d717b1b754bf7bfd87477f08c3d,2024-06-04T19:20:34.517000
|
||||
CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000
|
||||
CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392d8,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4260,0,1,f504c88df229dc577663728ede510f6bee2dbfbf4e978429e1f1b8f63d1071c2,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4260,0,0,f504c88df229dc577663728ede510f6bee2dbfbf4e978429e1f1b8f63d1071c2,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000
|
||||
CVE-2024-4262,0,0,eb43fbaec8efb92a09683be8d89079c39bc088d0014f0d5047c7a435bf15c8e4,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb40c,2024-05-16T13:03:05.353000
|
||||
@ -257083,7 +257089,7 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c
|
||||
CVE-2024-5599,0,0,e2a52dc8fb81a6d016503d8fbd621cff191add725c15ae779eff77632921d437,2024-06-11T18:24:39.057000
|
||||
CVE-2024-5600,0,0,cbb44154b53a9ff19bb9b8607051bff7897a220aae51af46369a9f79546fe419,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000
|
||||
CVE-2024-5602,0,1,c64891ac2cd85f56d91d08925d6ceddbdd889440170bfa961976b5a31d8fb155,2024-07-24T12:55:13.223000
|
||||
CVE-2024-5602,0,0,c64891ac2cd85f56d91d08925d6ceddbdd889440170bfa961976b5a31d8fb155,2024-07-24T12:55:13.223000
|
||||
CVE-2024-5604,0,0,3fc5f4822707c10b93ac858cb809bfd200b008140e07ef20d84f7ed8208c8435,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5605,0,0,e4ab13f44aee681834db0b09d11c486a794d1d811bed7db97810cd3bad2b3e86,2024-07-17T14:02:16.537000
|
||||
CVE-2024-5606,0,0,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000
|
||||
@ -257240,7 +257246,7 @@ CVE-2024-5813,0,0,2236ff95e00a2589bc00dc67452394d14ab32423646c535c5a19397b653232
|
||||
CVE-2024-5815,0,0,9c0e5d25f32c2dbefca23815fc2b16e88ce81dd54b9a22e21c721a2b2a9cb1cc,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5816,0,0,3d67952ce4a1b2b1ece947260f0beee9de9f9da521a3f15a0343c5e1d47b81ea,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5817,0,0,e05abd62bd06ccb376baea6b1d5f924e4e6fb0941dae50b59d4aa5f4c769fe7a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5818,1,1,1f85f94f56b5648beb516de29d3772b29eb0b5481d5510a9e032d508b1fed7bf,2024-07-24T13:15:10.680000
|
||||
CVE-2024-5818,0,0,1f85f94f56b5648beb516de29d3772b29eb0b5481d5510a9e032d508b1fed7bf,2024-07-24T13:15:10.680000
|
||||
CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000
|
||||
CVE-2024-5820,0,0,4c9e3224ff2f58cd9b00410a197234419444c7f4cb436de63372b9de4c6303c2,2024-07-12T08:15:11.560000
|
||||
CVE-2024-5821,0,0,14c66e5b9fe266ccf4bf59e0254237da8c439f65c9de7d774ed6c1950ac6b04a,2024-07-12T08:15:11.640000
|
||||
@ -257276,7 +257282,7 @@ CVE-2024-5856,0,0,6c7682487972a7913d7724c221dec1f8cbbbfbf7a2635cc868862316d948dc
|
||||
CVE-2024-5858,0,0,63cb7f6cd58686ca5ad3c57990888086a18b2814d4915e424991a00332eb64f9,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5859,0,0,72e4b113c686d9a3109f00890cd02d7c66daeaf956171b1cfade7c196becbe2c,2024-06-24T19:21:07.943000
|
||||
CVE-2024-5860,0,0,56b79e1c6d22cf1e6319b4d2696b988928a56f1c09b2a292e92b44a530d0359a,2024-07-05T13:52:14.463000
|
||||
CVE-2024-5861,0,1,1d74fe74389b9598033eff341da450e597684505adf6e35011c7758d1b79715d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-5861,0,0,1d74fe74389b9598033eff341da450e597684505adf6e35011c7758d1b79715d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-5862,0,0,441ab26bc80ed7c87de8e4be62f6bf1c86b995270dbb376cc8e089e80e683161,2024-06-24T19:26:47.037000
|
||||
CVE-2024-5863,0,0,8eb388b46dfdca7ac79f7a3487053af7c103c168da16a20899b575731960eec2,2024-06-28T10:27:00.920000
|
||||
CVE-2024-5864,0,0,539f12905317a790a13c7190e3394133674affd0cb1690d81cb0d56c8ad41bb1,2024-06-28T10:27:00.920000
|
||||
@ -257425,8 +257431,9 @@ CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f65
|
||||
CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000
|
||||
CVE-2024-6089,0,0,2e36ec68c046c195b7c2f86ee35013ba223063fb476a7c2f6d245a7b85cc69f4,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6094,0,1,d7f2cdb304cc396e64e032d9bb4fe0d71d15cb3ae6b14e9986dd1176fe25d9f4,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6094,0,0,d7f2cdb304cc396e64e032d9bb4fe0d71d15cb3ae6b14e9986dd1176fe25d9f4,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000
|
||||
CVE-2024-6096,1,1,9f0bf3893c5d050e926943f2f628458201abe76e8985c0cc3074307586ccef32,2024-07-24T14:15:06.070000
|
||||
CVE-2024-6099,0,0,122ce35d776bcd880891466a825515ec577be2ec80ec19c4510dcdd6af223974,2024-07-02T18:08:53.233000
|
||||
CVE-2024-6100,0,0,22a1633b125d31ae1c260507b63f1a44d0021fa11eedbf918d3886af2f39e630,2024-07-03T02:09:40.497000
|
||||
CVE-2024-6101,0,0,aeaca54f07e7b493faae55d17ed3267b0a1d9b8a80e43a682711cd93d1a2da27,2024-07-03T02:09:41.493000
|
||||
@ -257443,8 +257450,8 @@ CVE-2024-6114,0,0,1d496eb490a052b12517f100a93bb767cf2cf15a2c008e0693dc387c679adb
|
||||
CVE-2024-6115,0,0,b78a8bc77e5cbf73cf04c74141f6177c3ffa0587a4a1d2d98ad3bfe6bcce3476,2024-06-25T18:15:11.857000
|
||||
CVE-2024-6116,0,0,a6d83e3fcdc09a0a6cf307cbc9b62cfd655f854315f6260ca3a48d86acd6c58e,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6120,0,0,887a4e2aeba7d554804c74306237ee98da6982710d9ab44cbcf47e59767187c6,2024-06-24T20:03:04.363000
|
||||
CVE-2024-6121,0,1,ca3a4df866c04d91a8299ec9d7d3d482d90a57c7a8dc29a6fa55ffef02eccb66,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6122,0,1,c8077cf11281a520f9cddc1bada37060f1a2aaa357eb2389fb60e2b645640b0c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6121,0,0,ca3a4df866c04d91a8299ec9d7d3d482d90a57c7a8dc29a6fa55ffef02eccb66,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6122,0,0,c8077cf11281a520f9cddc1bada37060f1a2aaa357eb2389fb60e2b645640b0c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6123,0,0,75695c59d88081a795c134128ddb6cd1415db185318a55dfce97b139d1d4e40d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6125,0,0,dcd2ab56787ddae0f7c175c392cba81a8765f3e4738004aeecc40e1ed002ca73,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6126,0,0,fe32d1d72ee98dda5ecd99b3a7a2dd6c7f2499fcdf431273ff58d6a25ff8ecce,2024-07-05T12:55:51.367000
|
||||
@ -257501,7 +257508,7 @@ CVE-2024-6193,0,0,00fd76685b00c66c75878efc81598a588f58971e8df576cbee2d630c4caeff
|
||||
CVE-2024-6194,0,0,2fd14db6633e624a38e90bae695b4c4d57fa0e3aaeb642623d447d03f1402676,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6195,0,0,6a062efe55296f0b78677192fb0a748b37d8f49a4a61cffdf8e5d965a387b28b,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6196,0,0,ee53490a34820f9c77a5a8ca54b2af4db4b9298e709dd53453d8c4a657cc2768,2024-06-21T17:15:11.350000
|
||||
CVE-2024-6197,0,1,e0b58408ac40be5512926b212b0be03b25cd3d3ae991c0850a1ebc2e8cb8b37b,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6197,0,0,e0b58408ac40be5512926b212b0be03b25cd3d3ae991c0850a1ebc2e8cb8b37b,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6205,0,0,113d559849ca9c5bf761a83fad7d31b96491373e555c09e3fa45e37c92251187,2024-07-19T20:23:18.960000
|
||||
CVE-2024-6206,0,0,7ae31b087265fa68705a3f153945ecef18a4fdd89eba1b0f5f6a9be630fb6cf5,2024-06-26T12:44:29.693000
|
||||
CVE-2024-6209,0,0,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000
|
||||
@ -257518,7 +257525,7 @@ CVE-2024-6222,0,0,7da69ce6fbc5989cf8dc00c0967cc47c0670f03447330ea36d4de40ed4ce08
|
||||
CVE-2024-6225,0,0,510a69cec2d5d6c6d036e0951030f27f3f34bcc77e3448a2bbf2dbc18120fe93,2024-06-24T19:21:28.450000
|
||||
CVE-2024-6227,0,0,6448b237469b4af8add5bea6ce3efd3ec79e9126dca5090705d4ceeb86be54e2,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6229,0,0,54fd6bf3998b843838fdb7fbe8cf0772e5599fcd948d9cf2d47de13f2ccb011e,2024-07-11T15:03:15.233000
|
||||
CVE-2024-6231,0,1,95e641648a5be9f88ed3da19269ca6779e176bc3a9b366661acbe85f1cf6d0c5,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6231,0,0,95e641648a5be9f88ed3da19269ca6779e176bc3a9b366661acbe85f1cf6d0c5,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3c4,2024-07-11T15:06:34.163000
|
||||
CVE-2024-6236,0,0,294d07111f47e2594afccb77d041edde3630ac9799928242bfa797180655c347,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6237,0,0,46541712e840180b3223b10d698baa69ce4ae4ad2290c1cfff1ca39481f71f37,2024-07-12T17:14:19.130000
|
||||
@ -257590,6 +257597,7 @@ CVE-2024-6321,0,0,23af826e4693bc2738f8ec7dcb0f933eeef79b645dd2f2305f1f94359ced50
|
||||
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
|
||||
CVE-2024-6325,0,0,3ea6578ebdd2a7633259d686c429ab9b3e7708f0e981d10184478f4442c00880,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6326,0,0,e689387b2cb49e7365da7fd7c751e52e0ede20a7a6c6966f5f5b92a6b53089de,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6327,1,1,c52db96993475da3817400d1963e8c77cf1647474f943e885c0ca393b477d473,2024-07-24T14:15:06.283000
|
||||
CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6336,0,0,1df5fc72f07b093cfd11ea9b65ef147e8130715026fca7ff47fd924988f45532,2024-07-17T13:34:20.520000
|
||||
@ -257639,7 +257647,7 @@ CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d0
|
||||
CVE-2024-6417,0,0,29f9a4ce41522fa0140910babecf0fc99e85f4d49ac0eb1b6a99dc830b0f22e3,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede3c,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6420,0,1,06795481fea0947553364f5cea974cb639ce643ade0fa4994a441e094e065f9d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6420,0,0,06795481fea0947553364f5cea974cb639ce643ade0fa4994a441e094e065f9d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6421,0,0,2fe6e0b05086ec8fe1614a33f3714b1b7412a68316b06964410d48a53c099378,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6422,0,0,55d1b4b5125b3e6420c56faceebe4743e983319ac647dfed74960e28bff876d9,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6424,0,0,a4271c75a6c97806333e2d8d45edb2537cf0684790d84aeb8788fc5848fb2e64,2024-07-01T16:37:39.040000
|
||||
@ -257695,7 +257703,7 @@ CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d8
|
||||
CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000
|
||||
CVE-2024-6542,0,0,54f8a75473ca23470adff5375410f0163accbe3baf07cee08839e7a197565332,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6550,0,0,6c4bb046e65a00df1f67c81af4edc0fc3847fdca60c1beea606bf943b5851318,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6553,0,1,8a5d95f9a9340732b68e040cf34cd3feae3ce046430b36cadf8644d55781cab3,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6553,0,0,8a5d95f9a9340732b68e040cf34cd3feae3ce046430b36cadf8644d55781cab3,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce662,2024-07-12T17:01:48.353000
|
||||
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
|
||||
@ -257706,7 +257714,7 @@ CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb
|
||||
CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000
|
||||
CVE-2024-6565,0,0,43def900ab0d6afe7974c0f6bcdb1952d3f11b54fce1bb808ab6238edf9d39c2,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6570,0,0,1c2083317d49d5094b93c672429fe80fa3944fba8c36de7f1f2403e55beb6b46,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6571,0,1,99e28e1eec016aa2ea1a00034153b94fa7a8f3552e46398f5643f95dd38cab4e,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6571,0,0,99e28e1eec016aa2ea1a00034153b94fa7a8f3552e46398f5643f95dd38cab4e,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6574,0,0,63009fc3946aa6aa37035c823fc25710c373929512d42b52b922f4cc721537b8,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
|
||||
@ -257733,12 +257741,12 @@ CVE-2024-6615,0,0,21e70ce6d005932fad51efb1cef43277a3ff57e367ed55aea5460b226c9f9b
|
||||
CVE-2024-6621,0,0,245e22cf8c695e01e46245f83baf1a8e74fd9ede2206edccd3aaa25f1c00ba0d,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6624,0,0,d641d0598d5f0d62f69b2f0bb30153f1263b9aa17a64dd7567b42517a1bc6027,2024-07-12T16:51:31.487000
|
||||
CVE-2024-6625,0,0,b913737eefce9f28c47dc537f0edd398b1eeb297cd2eb30c69b59c3401317130,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6629,0,1,0264a6ecc734e6bba34d74cdd2b710d65bfa2f35085e88ade8ee0f09f00a5520,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6629,0,0,0264a6ecc734e6bba34d74cdd2b710d65bfa2f35085e88ade8ee0f09f00a5520,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
|
||||
CVE-2024-6635,0,0,97d6e55960f6f2e5010584395fc193a0feb186e4d795b57d89159c3132b84fff,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6636,0,0,b927f4aba2100824a9064e3c9444e3f54a47671d743161ced3b5a100a38b49ab,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6637,0,0,59f76fa21430fd2f815d25b14c560949a8f50f1f9b39a99ada5c48c5c42ab47c,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6638,0,1,e1ef78f4a331a1760f078cffbff2fa855ff8b1eb633d9ef9812bbb8cfee1af62,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6638,0,0,e1ef78f4a331a1760f078cffbff2fa855ff8b1eb633d9ef9812bbb8cfee1af62,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6642,0,0,8d96c1180af1047f7b667e53dd25106a95583c9fef6033b783f527ef0b9e4e6b,2024-07-10T13:15:11.140000
|
||||
CVE-2024-6643,0,0,c4eab211147138bb5613809a885f81bacb4eb0fc3c1e7955b1f331b632c0ef4a,2024-07-11T10:15:02.650000
|
||||
CVE-2024-6644,0,0,0f2d20ba591a113ddb0330b932f8a246adf881e1931b22ed31564a539ff168f9,2024-07-11T13:05:54.930000
|
||||
@ -257755,7 +257763,7 @@ CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf
|
||||
CVE-2024-6664,0,0,7dcdbd9efac1143da422ef778b0a605b2e75ff3874c65ca5b8e519e1d8523278,2024-07-10T21:15:11.520000
|
||||
CVE-2024-6666,0,0,6ade2353732c66fc20367582756530c33ec26bf7f6989700bd337bd969227f22,2024-07-12T16:46:48.387000
|
||||
CVE-2024-6669,0,0,87233746e73dcd3cc336669e330764691e93b16935dab43ac512a989f6e36eb0,2024-07-19T15:56:47.190000
|
||||
CVE-2024-6675,0,1,efdcf1bd038d8c9716519636ba8adbdaf757c6f9212f3c0c6f277c3b8045a346,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6675,0,0,efdcf1bd038d8c9716519636ba8adbdaf757c6f9212f3c0c6f277c3b8045a346,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c81272,2024-07-11T18:09:58.777000
|
||||
@ -257764,9 +257772,9 @@ CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf820
|
||||
CVE-2024-6689,0,0,d40d4a6e022419e83ed34bb3a74eb0d24556e6d76f7b0a592f90775a9d52873c,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6694,0,0,7d61bbb6e4266a8c90354c9d0cb6da1ede156f667671ed3e7d5507b5e685e063,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6714,0,1,11b717ebe6f787348133e2783f9d140b140bb610f91df0dde9f6c41f4dbdce83,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6714,0,0,11b717ebe6f787348133e2783f9d140b140bb610f91df0dde9f6c41f4dbdce83,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6716,0,0,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c07,2024-07-17T14:15:04.210000
|
||||
CVE-2024-6717,0,1,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75be1,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6717,0,0,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75be1,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
|
||||
CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6729,0,0,b413856446136980bf68a32632989cec2f558712dbc6c4470999a635b3ec5394,2024-07-21T06:15:02.240000
|
||||
@ -257787,13 +257795,13 @@ CVE-2024-6743,0,0,d20423ae34ef7edd843a6cb67ab6563bdeae21fb73206254415d2c0219c744
|
||||
CVE-2024-6744,0,0,db4e7b937d3d03ea3e3b2b15edbfe780a0b875b3fdcc47905faa685f3164112e,2024-07-16T18:06:51.390000
|
||||
CVE-2024-6745,0,0,1617c1b62a6985e7cfd1493a4e6106081b5b226c76f4caaa1064224772ef702b,2024-07-19T18:04:47.363000
|
||||
CVE-2024-6746,0,0,a07904c7ab441e8aefcdf67187efe0701752648d282a9adf495048d9805d0f66,2024-07-19T18:02:29.417000
|
||||
CVE-2024-6750,0,1,bd50438b7fed43c146b767dfe0e34210e750447bcd6a7bde4d43ce21e2127394,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6751,0,1,c5b2d82b144e56bdf50cec013d15c657693aebc5f36f3d508d0fe5c46c32db28,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6752,0,1,c03cb1f23047a6fd5fa3f7adfd588ecceef1fa572948bd4ddcb122d0d89110a4,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6753,0,1,79cd533ef788d1e388d91ad96dd06c23d644eb06446486c79597aa813abb65c6,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6754,0,1,bc8cde0e84d8997b1c75c8ce06ab5236a2f6d5b64ebe5ed2b11b2213361d556f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6755,0,1,ab1b630d4d60f43a14793abf6a91e747f24cf32e85dd2f18d0c7fae990d4845c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6756,0,1,f587e50343ba8d4d9984018181e54a04ca58befeaa1fc8ceb12c6bae56622e09,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6750,0,0,bd50438b7fed43c146b767dfe0e34210e750447bcd6a7bde4d43ce21e2127394,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6751,0,0,c5b2d82b144e56bdf50cec013d15c657693aebc5f36f3d508d0fe5c46c32db28,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6752,0,0,c03cb1f23047a6fd5fa3f7adfd588ecceef1fa572948bd4ddcb122d0d89110a4,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6753,0,0,79cd533ef788d1e388d91ad96dd06c23d644eb06446486c79597aa813abb65c6,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6754,0,0,bc8cde0e84d8997b1c75c8ce06ab5236a2f6d5b64ebe5ed2b11b2213361d556f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6755,0,0,ab1b630d4d60f43a14793abf6a91e747f24cf32e85dd2f18d0c7fae990d4845c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6756,0,0,f587e50343ba8d4d9984018181e54a04ca58befeaa1fc8ceb12c6bae56622e09,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
|
||||
CVE-2024-6772,0,0,cc08723700878586fe2b2cb702b9aeb8e7ff85837a231851739a99e842cb1c05,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6773,0,0,a5867869124c1a4b8949c923d047a73abaebfa5c6d8b0baadecd79e09f60d48f,2024-07-17T13:34:20.520000
|
||||
@ -257804,28 +257812,28 @@ CVE-2024-6777,0,0,1b2f8bc7483fbfc540bfc78d70c330a5b3bd55e3e3b550b722254066c080b4
|
||||
CVE-2024-6778,0,0,4b9f54a1ab5418724c8d4d40b1c3b12f937747d49588cc60e2bad6855d8270bc,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6779,0,0,eb8d5debe3ae4525916f27034d3cd0e49a98090896d6ba5d8c5bcdb0d54820b6,2024-07-17T13:34:20.520000
|
||||
CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a83,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6783,0,1,02ffa81303e2d0b2c8d5ada15cd1c5a0e17971825cf42319819acea737c80823,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6791,0,1,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6793,0,1,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6794,0,1,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6783,0,0,02ffa81303e2d0b2c8d5ada15cd1c5a0e17971825cf42319819acea737c80823,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6799,0,0,d264d144b11594f6ded9670466775d4f3f4cc730c0f4ee32dd0c581019252c1d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000
|
||||
CVE-2024-6802,0,0,0911fc614ea139d423cd023a1b26ff351c1061407fddd3917beb9c821ca9c47f,2024-07-21T15:15:02.190000
|
||||
CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000
|
||||
CVE-2024-6805,0,1,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d9704,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6806,0,1,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6805,0,0,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d9704,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6806,0,0,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6807,0,0,36a1bf799eb85168b836021ed001160a7d96eb0cb1f17f7dd33adcef058c2a69,2024-07-21T13:15:02.420000
|
||||
CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000
|
||||
CVE-2024-6828,0,1,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6834,0,0,9b06026f568f95c4c2a4be9208340b1bc5ab27fea601ce9296ee0a0b671ec68d,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6836,0,1,e390cd7e31e7aaebb0300f845059693a0906a0a80bba3b00492cbc2a5c299f21,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6836,0,0,e390cd7e31e7aaebb0300f845059693a0906a0a80bba3b00492cbc2a5c299f21,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6874,0,1,6fdb828244d0878bf4334f6c8b61a3ad657fa405006bc4b1bc91d03b240bfdb1,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6885,0,1,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6874,0,0,6fdb828244d0878bf4334f6c8b61a3ad657fa405006bc4b1bc91d03b240bfdb1,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6896,0,1,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6896,0,0,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6899,0,0,397359020457c655f416abd05bdc982e2cbc9cd703cb46d21be66b71a5df8e91,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6900,0,0,97b5312c98326af5c30c0e6b9075f0ed6d8f0745860573a3aeb28716ac20b0e4,2024-07-19T19:54:20.537000
|
||||
@ -257837,11 +257845,11 @@ CVE-2024-6905,0,0,8fc776bf9fa4350104cb7a97d75c3f12956fd9d4638b78f2d808e195f39911
|
||||
CVE-2024-6906,0,0,9e40f187cd4da90adccf007ba1893c4ad127ba3945e95eb45170fe5a98bef8ec,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6907,0,0,c55cb1bfd6264ab1ebd6c18009f9792c2ff1421cf59514ea0dbe50319b330c95,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6908,0,0,39238ceecec75ca0113efef9ebf9de02325a2ecd066a43e78f16c4451849b776,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6911,0,1,46d89096f6e412b4d1b26c4491b89cca1edef35f1edb197cda4640c904cf9862,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6912,0,1,b579ffc43dbaf89f50f93b1659dc012bb7b84a2d36bcb32b984560565416f527,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6913,0,1,a7b65a58f468735b3782ca0a056db617c72da8825fc6f7975e6b5a68a6fa7e93,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6911,0,0,46d89096f6e412b4d1b26c4491b89cca1edef35f1edb197cda4640c904cf9862,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6912,0,0,b579ffc43dbaf89f50f93b1659dc012bb7b84a2d36bcb32b984560565416f527,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6913,0,0,a7b65a58f468735b3782ca0a056db617c72da8825fc6f7975e6b5a68a6fa7e93,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6916,0,0,1d247ae867be71d9af12779cc6db2629ce2403155b9fbbc87b676a3b33127b65,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6930,0,1,de9484f0df1ac338aa3b09c73b4d890cbda7e2129d6e265be8ed1831a07d234d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6930,0,0,de9484f0df1ac338aa3b09c73b4d890cbda7e2129d6e265be8ed1831a07d234d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6932,0,0,67a8aa74150c82de9338c7f5e13237de6a0b3fc058478249ab687a9bbea18d6e,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6934,0,0,2773a2900bf573ac6cdadde3da52af842db87181b62c4a3816dd0aac8b92139a,2024-07-22T13:00:31.330000
|
||||
@ -257880,7 +257888,9 @@ CVE-2024-6967,0,0,5f19e165dee42428e0d969fa8fc5f74084843adc50630c62175a00d155773d
|
||||
CVE-2024-6968,0,0,8e5752619c85b26bba4ce547fa3d54bdd5591cb73642b239c05438d96051005a,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6969,0,0,b23347441c89b903c83a899acb9bf7f48b605b0728961bbb1ac995d86a8850d6,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6970,0,0,521037b9963b74c39659cf9df97626ee5f8ca87b48a1750eb71f414432d46515,2024-07-22T13:00:31.330000
|
||||
CVE-2024-7014,0,1,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7027,0,1,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7065,0,1,861ad9f4a94f327ec6cfd0f89d5da23664e863601bc1e4fe87c301d15a9d3692,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7066,0,1,f0b9597030c216e17a91b9bbd330c3ccd1220fd3a9abefaf98fb6df981dc96f4,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7065,0,0,861ad9f4a94f327ec6cfd0f89d5da23664e863601bc1e4fe87c301d15a9d3692,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7066,0,0,f0b9597030c216e17a91b9bbd330c3ccd1220fd3a9abefaf98fb6df981dc96f4,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7067,1,1,bc741ded18e6a4832b8ea8127bf3a5138b091332435a8aef4e4fd1a7874052c5,2024-07-24T14:15:06.593000
|
||||
CVE-2024-7068,1,1,abfa06d46ca0a323a1225fe6bfd5c7cdab97a28adbee918f9a0de2ea063e9411,2024-07-24T15:15:12.750000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user