Auto-Update: 2024-01-13T05:00:25.073681+00:00

This commit is contained in:
cad-safe-bot 2024-01-13 05:00:28 +00:00
parent 1a9d9897b0
commit 3e4fd98225
29 changed files with 1224 additions and 995 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-12880",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-07-27T23:15:12.497",
"lastModified": "2021-07-21T11:39:23.747",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -153,61 +153,61 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.0",
"matchCriteriaId": "B031D2AE-70BE-48BB-A9E9-0A0DAAAFF55F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-15352",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-10-27T05:15:12.787",
"lastModified": "2020-11-02T16:35:38.253",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -168,66 +168,66 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.0",
"matchCriteriaId": "B031D2AE-70BE-48BB-A9E9-0A0DAAAFF55F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8204",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-07-30T13:15:11.470",
"lastModified": "2020-07-31T18:25:38.737",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -163,6 +163,56 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
@ -173,56 +223,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8206",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-07-30T13:15:11.533",
"lastModified": "2020-08-20T15:38:20.810",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -163,6 +163,56 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
@ -173,56 +223,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8216",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-07-30T13:15:11.707",
"lastModified": "2021-09-23T13:59:12.387",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -163,6 +163,56 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
@ -173,56 +223,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8217",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-07-30T13:15:11.783",
"lastModified": "2020-07-31T18:22:50.983",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -163,6 +163,56 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
@ -173,56 +223,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8218",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-07-30T13:15:11.847",
"lastModified": "2022-12-13T20:14:45.523",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2022-03-07",
"cisaActionDue": "2022-09-07",
@ -167,6 +167,56 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
@ -177,56 +227,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8219",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-07-30T13:15:11.907",
"lastModified": "2020-08-05T13:34:18.300",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -163,6 +163,56 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
@ -173,56 +223,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8220",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-07-30T13:15:11.987",
"lastModified": "2020-08-04T20:13:29.833",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -163,6 +163,56 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
@ -173,56 +223,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8221",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-07-30T13:15:12.063",
"lastModified": "2020-08-04T20:22:59.603",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -163,6 +163,56 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
@ -173,56 +223,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8222",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-07-30T13:15:12.157",
"lastModified": "2020-08-04T20:23:29.477",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -163,6 +163,56 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
@ -173,56 +223,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8238",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-09-30T18:15:28.990",
"lastModified": "2022-12-13T15:52:17.497",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,6 +92,61 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.1:*:*:*:*:*:*",
"matchCriteriaId": "CCE2E1C0-680F-4EFF-ACE6-A1DAFA209D24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*",
@ -174,65 +229,10 @@
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.3:*:*:*:*:*:*",
"matchCriteriaId": "3573BE86-7BCE-41A4-92F7-C1A0DBEB2672"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.1:*:*:*:*:*:*",
"matchCriteriaId": "6ADA12DC-C223-4037-92B9-70C385B52A6D"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2020-8243",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-09-30T18:15:29.070",
"lastModified": "2020-10-07T13:37:18.500",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-04-23",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Pulse Connect Secure Arbitrary Code Execution",
"cisaVulnerabilityName": "Ivanti Pulse Connect Secure Code Execution Vulnerability",
"descriptions": [
{
"lang": "en",
@ -96,6 +96,61 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.1:*:*:*:*:*:*",
"matchCriteriaId": "CCE2E1C0-680F-4EFF-ACE6-A1DAFA209D24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*",
@ -178,65 +233,10 @@
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.3:*:*:*:*:*:*",
"matchCriteriaId": "3573BE86-7BCE-41A4-92F7-C1A0DBEB2672"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.1:*:*:*:*:*:*",
"matchCriteriaId": "6ADA12DC-C223-4037-92B9-70C385B52A6D"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8261",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-10-28T13:15:13.137",
"lastModified": "2020-11-03T15:12:56.317",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,6 +92,46 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*",
@ -143,46 +183,6 @@
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.1",
"matchCriteriaId": "45F30A80-665D-4726-983C-36FED0CBF6E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-8262",
"sourceIdentifier": "support@hackerone.com",
"published": "2020-10-28T13:15:13.213",
"lastModified": "2020-11-03T15:12:30.877",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,6 +92,46 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*",
@ -143,46 +183,6 @@
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.1",
"matchCriteriaId": "45F30A80-665D-4726-983C-36FED0CBF6E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-35254",
"sourceIdentifier": "support@hackerone.com",
"published": "2022-12-05T22:15:10.457",
"lastModified": "2022-12-08T19:20:50.723",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1."
},
{
"lang": "es",
"value": "Un atacante no autenticado puede provocar una Denegaci\u00f3n de Servicio (DoS) a los siguientes productos: \nIvanti Connect Secure (ICS) en versiones anteriores a 9.1R14.3, 9.1R15.2, 9.1R16.2 y 22.2R4, \nIvanti Policy Secure (IPS ) en versiones anteriores a 9.1R17 y 22.3R1,\ne Ivanti Neurons for Zero-Trust Access en versiones anteriores a 22.3R1."
}
],
"metrics": {
@ -120,6 +124,41 @@
"versionEndExcluding": "9.1",
"matchCriteriaId": "368E8A56-50E4-4400-8C18-B7426B112FFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r10:*:*:*:*:*:*",
"matchCriteriaId": "BF767F07-2E9F-4099-829D-2F70E85D8A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r11:*:*:*:*:*:*",
"matchCriteriaId": "B994E22B-8FA5-4510-82F6-7820BDA7C307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r12:*:*:*:*:*:*",
"matchCriteriaId": "FE5C4ABC-2BEB-4741-95B3-303903369818"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r13:*:*:*:*:*:*",
"matchCriteriaId": "D50C5526-F791-4C76-B5C0-DA2E1281C9E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r13.1:*:*:*:*:*:*",
"matchCriteriaId": "2CB8240E-7683-4C39-9654-4F8D1F682288"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r14:*:*:*:*:*:*",
"matchCriteriaId": "7A53C031-E7A5-47B6-BA4A-DD28432E743F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r15:*:*:*:*:*:*",
@ -130,6 +169,71 @@
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r16:*:*:*:*:*:*",
"matchCriteriaId": "B90687F3-A5C1-4706-AD66-D78EE512E4C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.1:*:*:*:*:*:*",
"matchCriteriaId": "CCE2E1C0-680F-4EFF-ACE6-A1DAFA209D24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.2:*:*:*:*:*:*",
"matchCriteriaId": "7ED1686B-2D80-4ECF-9F7A-AEA989E17C84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r9:*:*:*:*:*:*",
"matchCriteriaId": "092DA2A3-5CEF-433F-8E5B-4850E4095CC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.1:r1:*:*:*:*:*:*",
@ -344,106 +448,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r10:*:*:*:*:*:*",
"matchCriteriaId": "1BA55FFD-9A77-4EA1-B03C-A35294900E03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r11:*:*:*:*:*:*",
"matchCriteriaId": "42EB6416-1627-42B7-A829-E71F6A99FDE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r12:*:*:*:*:*:*",
"matchCriteriaId": "9187D4D3-EA76-4445-99BC-CF0D1EAF9B6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r13:*:*:*:*:*:*",
"matchCriteriaId": "CAEAE3E4-E8D2-4D62-9D2D-7F716B5AABD6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r13.1:*:*:*:*:*:*",
"matchCriteriaId": "CFC56796-7FE3-4E6A-BF0F-AC66A4E5367C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r14:*:*:*:*:*:*",
"matchCriteriaId": "DD18DECB-0500-41CD-9B15-34FCEEB9F762"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.1:*:*:*:*:*:*",
"matchCriteriaId": "6ADA12DC-C223-4037-92B9-70C385B52A6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.2:*:*:*:*:*:*",
"matchCriteriaId": "DFF39371-F9CE-437A-9720-CD6B2721968B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r9:*:*:*:*:*:*",
"matchCriteriaId": "7DF7ED4E-F2E6-4FB4-AE20-7E98EC5F9918"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-35258",
"sourceIdentifier": "support@hackerone.com",
"published": "2022-12-05T22:15:10.627",
"lastModified": "2022-12-09T00:33:47.967",
"lastModified": "2024-01-13T04:43:44.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1."
},
{
"lang": "es",
"value": "Un atacante no autenticado puede provocar una Denegaci\u00f3n de Servicio (DoS) a los siguientes productos: \nIvanti Connect Secure (ICS) en versiones anteriores a 9.1R14.3, 9.1R15.2, 9.1R16.2 y 22.2R4, \nIvanti Policy Secure (IPS ) en versiones anteriores a 9.1R17 y 22.3R1,\ne Ivanti Neurons for Zero-Trust Access en versiones anteriores a 22.3R1."
}
],
"metrics": {
@ -120,6 +124,41 @@
"versionEndExcluding": "9.1",
"matchCriteriaId": "368E8A56-50E4-4400-8C18-B7426B112FFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r10:*:*:*:*:*:*",
"matchCriteriaId": "BF767F07-2E9F-4099-829D-2F70E85D8A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r11:*:*:*:*:*:*",
"matchCriteriaId": "B994E22B-8FA5-4510-82F6-7820BDA7C307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r12:*:*:*:*:*:*",
"matchCriteriaId": "FE5C4ABC-2BEB-4741-95B3-303903369818"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r13:*:*:*:*:*:*",
"matchCriteriaId": "D50C5526-F791-4C76-B5C0-DA2E1281C9E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r13.1:*:*:*:*:*:*",
"matchCriteriaId": "2CB8240E-7683-4C39-9654-4F8D1F682288"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r14:*:*:*:*:*:*",
"matchCriteriaId": "7A53C031-E7A5-47B6-BA4A-DD28432E743F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r15:*:*:*:*:*:*",
@ -130,6 +169,71 @@
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r16:*:*:*:*:*:*",
"matchCriteriaId": "B90687F3-A5C1-4706-AD66-D78EE512E4C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.1:*:*:*:*:*:*",
"matchCriteriaId": "CCE2E1C0-680F-4EFF-ACE6-A1DAFA209D24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.2:*:*:*:*:*:*",
"matchCriteriaId": "7ED1686B-2D80-4ECF-9F7A-AEA989E17C84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r9:*:*:*:*:*:*",
"matchCriteriaId": "092DA2A3-5CEF-433F-8E5B-4850E4095CC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.1:r1:*:*:*:*:*:*",
@ -344,106 +448,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*",
"matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r10:*:*:*:*:*:*",
"matchCriteriaId": "1BA55FFD-9A77-4EA1-B03C-A35294900E03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r11:*:*:*:*:*:*",
"matchCriteriaId": "42EB6416-1627-42B7-A829-E71F6A99FDE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r12:*:*:*:*:*:*",
"matchCriteriaId": "9187D4D3-EA76-4445-99BC-CF0D1EAF9B6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r13:*:*:*:*:*:*",
"matchCriteriaId": "CAEAE3E4-E8D2-4D62-9D2D-7F716B5AABD6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r13.1:*:*:*:*:*:*",
"matchCriteriaId": "CFC56796-7FE3-4E6A-BF0F-AC66A4E5367C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r14:*:*:*:*:*:*",
"matchCriteriaId": "DD18DECB-0500-41CD-9B15-34FCEEB9F762"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*",
"matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*",
"matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.1:*:*:*:*:*:*",
"matchCriteriaId": "6ADA12DC-C223-4037-92B9-70C385B52A6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.2:*:*:*:*:*:*",
"matchCriteriaId": "DFF39371-F9CE-437A-9720-CD6B2721968B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r9:*:*:*:*:*:*",
"matchCriteriaId": "7DF7ED4E-F2E6-4FB4-AE20-7E98EC5F9918"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51062",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-13T04:15:07.757",
"lastModified": "2024-01-13T04:15:07.757",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated log file read in the component log-smblog-save of QStar Archive Solutions RELEASE_3-0 Build 7 Patch 0 allows attackers to disclose the SMB Log contents via executing a crafted command."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51062.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51063",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-13T04:15:07.820",
"lastModified": "2024-01-13T04:15:07.820",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 was discovered to contain a DOM Based Reflected Cross Site Scripting (XSS) vulnerability within the component qnme-ajax?method=tree_level."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51063.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51064",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-13T04:15:07.870",
"lastModified": "2024-01-13T04:15:07.870",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 was discovered to contain a DOM Based reflected XSS vulnerability within the component qnme-ajax?method=tree_table."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51064.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51065",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-13T04:15:07.913",
"lastModified": "2024-01-13T04:15:07.913",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to obtain system backups and other sensitive information from the QStar Server."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51065.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51066",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-13T04:15:07.957",
"lastModified": "2024-01-13T04:15:07.957",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An authenticated remote code execution vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows attackers to arbitrarily execute commands."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51066.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51067",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-13T04:15:08.000",
"lastModified": "2024-01-13T04:15:08.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated reflected cross-site scripting (XSS) vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 allows attackers to execute arbitrary javascript on a victim's browser via a crafted link."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51067.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51068",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-13T04:15:08.053",
"lastModified": "2024-01-13T04:15:08.053",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An authenticated reflected cross-site scripting (XSS) vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 allows attackers to execute arbitrary javascript on a victim's browser via a crafted link."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51068.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51070",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-13T04:15:08.100",
"lastModified": "2024-01-13T04:15:08.100",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An access control issue in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to arbitrarily adjust sensitive SMB settings on the QStar Server."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51070.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51071",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-13T04:15:08.143",
"lastModified": "2024-01-13T04:15:08.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An access control issue in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to arbitrarily disable the SMB service on a victim's Qstar instance by executing a specific command in a link."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51071.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-52288",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-13T04:15:08.193",
"lastModified": "2024-01-13T04:15:08.193",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a GET request to a /resource-data/<file_path>.txt URI (from views.py), allows attackers to read arbitrary files."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-52289",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-13T04:15:08.240",
"lastModified": "2024-01-13T04:15:08.240",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/<file_path> URI (from views.py), allows attackers to write to arbitrary files."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-01-13T03:00:25.159356+00:00
2024-01-13T05:00:25.073681+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-01-13T02:15:07.303000+00:00
2024-01-13T04:43:44.307000+00:00
```
### Last Data Feed Release
@ -29,46 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
235821
235832
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `11`
* [CVE-2023-50072](CVE-2023/CVE-2023-500xx/CVE-2023-50072.json) (`2024-01-13T01:15:38.663`)
* [CVE-2023-33472](CVE-2023/CVE-2023-334xx/CVE-2023-33472.json) (`2024-01-13T02:15:07.060`)
* [CVE-2023-46942](CVE-2023/CVE-2023-469xx/CVE-2023-46942.json) (`2024-01-13T02:15:07.153`)
* [CVE-2023-46943](CVE-2023/CVE-2023-469xx/CVE-2023-46943.json) (`2024-01-13T02:15:07.200`)
* [CVE-2023-51804](CVE-2023/CVE-2023-518xx/CVE-2023-51804.json) (`2024-01-13T02:15:07.257`)
* [CVE-2023-51805](CVE-2023/CVE-2023-518xx/CVE-2023-51805.json) (`2024-01-13T02:15:07.303`)
* [CVE-2023-51062](CVE-2023/CVE-2023-510xx/CVE-2023-51062.json) (`2024-01-13T04:15:07.757`)
* [CVE-2023-51063](CVE-2023/CVE-2023-510xx/CVE-2023-51063.json) (`2024-01-13T04:15:07.820`)
* [CVE-2023-51064](CVE-2023/CVE-2023-510xx/CVE-2023-51064.json) (`2024-01-13T04:15:07.870`)
* [CVE-2023-51065](CVE-2023/CVE-2023-510xx/CVE-2023-51065.json) (`2024-01-13T04:15:07.913`)
* [CVE-2023-51066](CVE-2023/CVE-2023-510xx/CVE-2023-51066.json) (`2024-01-13T04:15:07.957`)
* [CVE-2023-51067](CVE-2023/CVE-2023-510xx/CVE-2023-51067.json) (`2024-01-13T04:15:08.000`)
* [CVE-2023-51068](CVE-2023/CVE-2023-510xx/CVE-2023-51068.json) (`2024-01-13T04:15:08.053`)
* [CVE-2023-51070](CVE-2023/CVE-2023-510xx/CVE-2023-51070.json) (`2024-01-13T04:15:08.100`)
* [CVE-2023-51071](CVE-2023/CVE-2023-510xx/CVE-2023-51071.json) (`2024-01-13T04:15:08.143`)
* [CVE-2023-52288](CVE-2023/CVE-2023-522xx/CVE-2023-52288.json) (`2024-01-13T04:15:08.193`)
* [CVE-2023-52289](CVE-2023/CVE-2023-522xx/CVE-2023-52289.json) (`2024-01-13T04:15:08.240`)
### CVEs modified in the last Commit
Recently modified CVEs: `21`
Recently modified CVEs: `17`
* [CVE-2023-51969](CVE-2023/CVE-2023-519xx/CVE-2023-51969.json) (`2024-01-13T01:36:31.257`)
* [CVE-2023-51970](CVE-2023/CVE-2023-519xx/CVE-2023-51970.json) (`2024-01-13T01:36:40.447`)
* [CVE-2023-51968](CVE-2023/CVE-2023-519xx/CVE-2023-51968.json) (`2024-01-13T01:36:42.873`)
* [CVE-2023-51967](CVE-2023/CVE-2023-519xx/CVE-2023-51967.json) (`2024-01-13T01:36:44.320`)
* [CVE-2023-51962](CVE-2023/CVE-2023-519xx/CVE-2023-51962.json) (`2024-01-13T01:36:45.693`)
* [CVE-2023-51961](CVE-2023/CVE-2023-519xx/CVE-2023-51961.json) (`2024-01-13T01:36:47.613`)
* [CVE-2023-51966](CVE-2023/CVE-2023-519xx/CVE-2023-51966.json) (`2024-01-13T01:36:48.990`)
* [CVE-2023-51965](CVE-2023/CVE-2023-519xx/CVE-2023-51965.json) (`2024-01-13T01:36:50.583`)
* [CVE-2023-51964](CVE-2023/CVE-2023-519xx/CVE-2023-51964.json) (`2024-01-13T01:36:52.113`)
* [CVE-2023-51963](CVE-2023/CVE-2023-519xx/CVE-2023-51963.json) (`2024-01-13T01:36:53.490`)
* [CVE-2023-51960](CVE-2023/CVE-2023-519xx/CVE-2023-51960.json) (`2024-01-13T01:36:54.740`)
* [CVE-2023-51959](CVE-2023/CVE-2023-519xx/CVE-2023-51959.json) (`2024-01-13T01:36:56.537`)
* [CVE-2023-51958](CVE-2023/CVE-2023-519xx/CVE-2023-51958.json) (`2024-01-13T01:36:59.057`)
* [CVE-2023-51956](CVE-2023/CVE-2023-519xx/CVE-2023-51956.json) (`2024-01-13T01:37:00.747`)
* [CVE-2023-51957](CVE-2023/CVE-2023-519xx/CVE-2023-51957.json) (`2024-01-13T01:37:02.417`)
* [CVE-2023-51955](CVE-2023/CVE-2023-519xx/CVE-2023-51955.json) (`2024-01-13T01:37:05.593`)
* [CVE-2023-51954](CVE-2023/CVE-2023-519xx/CVE-2023-51954.json) (`2024-01-13T01:37:07.867`)
* [CVE-2023-51953](CVE-2023/CVE-2023-519xx/CVE-2023-51953.json) (`2024-01-13T01:37:10.030`)
* [CVE-2023-51952](CVE-2023/CVE-2023-519xx/CVE-2023-51952.json) (`2024-01-13T01:37:13.637`)
* [CVE-2023-46805](CVE-2023/CVE-2023-468xx/CVE-2023-46805.json) (`2024-01-13T02:00:00.970`)
* [CVE-2024-21887](CVE-2024/CVE-2024-218xx/CVE-2024-21887.json) (`2024-01-13T02:00:00.970`)
* [CVE-2020-12880](CVE-2020/CVE-2020-128xx/CVE-2020-12880.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8204](CVE-2020/CVE-2020-82xx/CVE-2020-8204.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8206](CVE-2020/CVE-2020-82xx/CVE-2020-8206.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8216](CVE-2020/CVE-2020-82xx/CVE-2020-8216.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8217](CVE-2020/CVE-2020-82xx/CVE-2020-8217.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8218](CVE-2020/CVE-2020-82xx/CVE-2020-8218.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8219](CVE-2020/CVE-2020-82xx/CVE-2020-8219.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8220](CVE-2020/CVE-2020-82xx/CVE-2020-8220.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8221](CVE-2020/CVE-2020-82xx/CVE-2020-8221.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8222](CVE-2020/CVE-2020-82xx/CVE-2020-8222.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8238](CVE-2020/CVE-2020-82xx/CVE-2020-8238.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8243](CVE-2020/CVE-2020-82xx/CVE-2020-8243.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-15352](CVE-2020/CVE-2020-153xx/CVE-2020-15352.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8261](CVE-2020/CVE-2020-82xx/CVE-2020-8261.json) (`2024-01-13T04:43:44.307`)
* [CVE-2020-8262](CVE-2020/CVE-2020-82xx/CVE-2020-8262.json) (`2024-01-13T04:43:44.307`)
* [CVE-2022-35254](CVE-2022/CVE-2022-352xx/CVE-2022-35254.json) (`2024-01-13T04:43:44.307`)
* [CVE-2022-35258](CVE-2022/CVE-2022-352xx/CVE-2022-35258.json) (`2024-01-13T04:43:44.307`)
## Download and Usage