diff --git a/CVE-2020/CVE-2020-128xx/CVE-2020-12880.json b/CVE-2020/CVE-2020-128xx/CVE-2020-12880.json index 5b639ba1caa..072b6542cda 100644 --- a/CVE-2020/CVE-2020-128xx/CVE-2020-12880.json +++ b/CVE-2020/CVE-2020-128xx/CVE-2020-12880.json @@ -2,7 +2,7 @@ "id": "CVE-2020-12880", "sourceIdentifier": "cve@mitre.org", "published": "2020-07-27T23:15:12.497", - "lastModified": "2021-07-21T11:39:23.747", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -153,61 +153,61 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", "versionEndIncluding": "9.0", "matchCriteriaId": "B031D2AE-70BE-48BB-A9E9-0A0DAAAFF55F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" } ] } diff --git a/CVE-2020/CVE-2020-153xx/CVE-2020-15352.json b/CVE-2020/CVE-2020-153xx/CVE-2020-15352.json index 92b726c1e29..dfdff66555b 100644 --- a/CVE-2020/CVE-2020-153xx/CVE-2020-15352.json +++ b/CVE-2020/CVE-2020-153xx/CVE-2020-15352.json @@ -2,7 +2,7 @@ "id": "CVE-2020-15352", "sourceIdentifier": "cve@mitre.org", "published": "2020-10-27T05:15:12.787", - "lastModified": "2020-11-02T16:35:38.253", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -168,66 +168,66 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*", + "matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", "versionEndIncluding": "9.0", "matchCriteriaId": "B031D2AE-70BE-48BB-A9E9-0A0DAAAFF55F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*", - "matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8204.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8204.json index 872fa9e0807..bf9b2d20ac3 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8204.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8204.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8204", "sourceIdentifier": "support@hackerone.com", "published": "2020-07-30T13:15:11.470", - "lastModified": "2020-07-31T18:25:38.737", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -163,6 +163,56 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", @@ -173,56 +223,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8206.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8206.json index b3468906e5d..0a3166467bf 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8206.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8206.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8206", "sourceIdentifier": "support@hackerone.com", "published": "2020-07-30T13:15:11.533", - "lastModified": "2020-08-20T15:38:20.810", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -163,6 +163,56 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", @@ -173,56 +223,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8216.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8216.json index baa7f018460..6c0905957a4 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8216.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8216.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8216", "sourceIdentifier": "support@hackerone.com", "published": "2020-07-30T13:15:11.707", - "lastModified": "2021-09-23T13:59:12.387", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -163,6 +163,56 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", @@ -173,56 +223,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8217.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8217.json index 22d747c2d9f..681def585a1 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8217.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8217.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8217", "sourceIdentifier": "support@hackerone.com", "published": "2020-07-30T13:15:11.783", - "lastModified": "2020-07-31T18:22:50.983", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -163,6 +163,56 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", @@ -173,56 +223,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8218.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8218.json index 3846bb72c20..753c560e985 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8218.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8218.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8218", "sourceIdentifier": "support@hackerone.com", "published": "2020-07-30T13:15:11.847", - "lastModified": "2022-12-13T20:14:45.523", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "cisaExploitAdd": "2022-03-07", "cisaActionDue": "2022-09-07", @@ -167,6 +167,56 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", @@ -177,56 +227,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8219.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8219.json index ce8ae4c00b5..47b8f4a6d75 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8219.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8219.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8219", "sourceIdentifier": "support@hackerone.com", "published": "2020-07-30T13:15:11.907", - "lastModified": "2020-08-05T13:34:18.300", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -163,6 +163,56 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", @@ -173,56 +223,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8220.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8220.json index e7b4da00944..aa3e8986adc 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8220.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8220.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8220", "sourceIdentifier": "support@hackerone.com", "published": "2020-07-30T13:15:11.987", - "lastModified": "2020-08-04T20:13:29.833", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -163,6 +163,56 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", @@ -173,56 +223,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8221.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8221.json index 0544b490a60..adaaa340bea 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8221.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8221.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8221", "sourceIdentifier": "support@hackerone.com", "published": "2020-07-30T13:15:12.063", - "lastModified": "2020-08-04T20:22:59.603", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -163,6 +163,56 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", @@ -173,56 +223,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8222.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8222.json index caa0d9b5b6f..b555d1becbb 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8222.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8222.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8222", "sourceIdentifier": "support@hackerone.com", "published": "2020-07-30T13:15:12.157", - "lastModified": "2020-08-04T20:23:29.477", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -163,6 +163,56 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", @@ -173,56 +223,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8238.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8238.json index 384296e47e5..15a35a7cc3e 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8238.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8238.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8238", "sourceIdentifier": "support@hackerone.com", "published": "2020-09-30T18:15:28.990", - "lastModified": "2022-12-13T15:52:17.497", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,6 +92,61 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*", + "matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.1:*:*:*:*:*:*", + "matchCriteriaId": "CCE2E1C0-680F-4EFF-ACE6-A1DAFA209D24" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*", @@ -174,65 +229,10 @@ "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.3:*:*:*:*:*:*", "matchCriteriaId": "3573BE86-7BCE-41A4-92F7-C1A0DBEB2672" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*", - "matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.1:*:*:*:*:*:*", - "matchCriteriaId": "6ADA12DC-C223-4037-92B9-70C385B52A6D" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8243.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8243.json index 9b5dccaa1e0..8b62284671e 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8243.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8243.json @@ -2,12 +2,12 @@ "id": "CVE-2020-8243", "sourceIdentifier": "support@hackerone.com", "published": "2020-09-30T18:15:29.070", - "lastModified": "2020-10-07T13:37:18.500", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-04-23", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Pulse Connect Secure Arbitrary Code Execution", + "cisaVulnerabilityName": "Ivanti Pulse Connect Secure Code Execution Vulnerability", "descriptions": [ { "lang": "en", @@ -96,6 +96,61 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*", + "matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.1:*:*:*:*:*:*", + "matchCriteriaId": "CCE2E1C0-680F-4EFF-ACE6-A1DAFA209D24" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*", @@ -178,65 +233,10 @@ "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.3:*:*:*:*:*:*", "matchCriteriaId": "3573BE86-7BCE-41A4-92F7-C1A0DBEB2672" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*", - "matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.1:*:*:*:*:*:*", - "matchCriteriaId": "6ADA12DC-C223-4037-92B9-70C385B52A6D" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8261.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8261.json index c5e9386e0da..3492a0352ba 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8261.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8261.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8261", "sourceIdentifier": "support@hackerone.com", "published": "2020-10-28T13:15:13.137", - "lastModified": "2020-11-03T15:12:56.317", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,6 +92,46 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*", + "matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*", @@ -143,46 +183,6 @@ "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.1", "matchCriteriaId": "45F30A80-665D-4726-983C-36FED0CBF6E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*", - "matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A" } ] } diff --git a/CVE-2020/CVE-2020-82xx/CVE-2020-8262.json b/CVE-2020/CVE-2020-82xx/CVE-2020-8262.json index 55019f78a8d..ec0f0509324 100644 --- a/CVE-2020/CVE-2020-82xx/CVE-2020-8262.json +++ b/CVE-2020/CVE-2020-82xx/CVE-2020-8262.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8262", "sourceIdentifier": "support@hackerone.com", "published": "2020-10-28T13:15:13.213", - "lastModified": "2020-11-03T15:12:30.877", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,6 +92,46 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*", + "matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*", @@ -143,46 +183,6 @@ "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*", "versionEndExcluding": "9.1", "matchCriteriaId": "45F30A80-665D-4726-983C-36FED0CBF6E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*", - "matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A" } ] } diff --git a/CVE-2022/CVE-2022-352xx/CVE-2022-35254.json b/CVE-2022/CVE-2022-352xx/CVE-2022-35254.json index 5f2e713ec18..5567143443d 100644 --- a/CVE-2022/CVE-2022-352xx/CVE-2022-35254.json +++ b/CVE-2022/CVE-2022-352xx/CVE-2022-35254.json @@ -2,12 +2,16 @@ "id": "CVE-2022-35254", "sourceIdentifier": "support@hackerone.com", "published": "2022-12-05T22:15:10.457", - "lastModified": "2022-12-08T19:20:50.723", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1." + }, + { + "lang": "es", + "value": "Un atacante no autenticado puede provocar una Denegaci\u00f3n de Servicio (DoS) a los siguientes productos: \nIvanti Connect Secure (ICS) en versiones anteriores a 9.1R14.3, 9.1R15.2, 9.1R16.2 y 22.2R4, \nIvanti Policy Secure (IPS ) en versiones anteriores a 9.1R17 y 22.3R1,\ne Ivanti Neurons for Zero-Trust Access en versiones anteriores a 22.3R1." } ], "metrics": { @@ -120,6 +124,41 @@ "versionEndExcluding": "9.1", "matchCriteriaId": "368E8A56-50E4-4400-8C18-B7426B112FFC" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r10:*:*:*:*:*:*", + "matchCriteriaId": "BF767F07-2E9F-4099-829D-2F70E85D8A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r11:*:*:*:*:*:*", + "matchCriteriaId": "B994E22B-8FA5-4510-82F6-7820BDA7C307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r12:*:*:*:*:*:*", + "matchCriteriaId": "FE5C4ABC-2BEB-4741-95B3-303903369818" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r13:*:*:*:*:*:*", + "matchCriteriaId": "D50C5526-F791-4C76-B5C0-DA2E1281C9E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r13.1:*:*:*:*:*:*", + "matchCriteriaId": "2CB8240E-7683-4C39-9654-4F8D1F682288" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r14:*:*:*:*:*:*", + "matchCriteriaId": "7A53C031-E7A5-47B6-BA4A-DD28432E743F" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r15:*:*:*:*:*:*", @@ -130,6 +169,71 @@ "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r16:*:*:*:*:*:*", "matchCriteriaId": "B90687F3-A5C1-4706-AD66-D78EE512E4C9" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*", + "matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.1:*:*:*:*:*:*", + "matchCriteriaId": "CCE2E1C0-680F-4EFF-ACE6-A1DAFA209D24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.2:*:*:*:*:*:*", + "matchCriteriaId": "7ED1686B-2D80-4ECF-9F7A-AEA989E17C84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r9:*:*:*:*:*:*", + "matchCriteriaId": "092DA2A3-5CEF-433F-8E5B-4850E4095CC4" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:ivanti:policy_secure:22.1:r1:*:*:*:*:*:*", @@ -344,106 +448,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r10:*:*:*:*:*:*", - "matchCriteriaId": "1BA55FFD-9A77-4EA1-B03C-A35294900E03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r11:*:*:*:*:*:*", - "matchCriteriaId": "42EB6416-1627-42B7-A829-E71F6A99FDE2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r12:*:*:*:*:*:*", - "matchCriteriaId": "9187D4D3-EA76-4445-99BC-CF0D1EAF9B6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r13:*:*:*:*:*:*", - "matchCriteriaId": "CAEAE3E4-E8D2-4D62-9D2D-7F716B5AABD6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r13.1:*:*:*:*:*:*", - "matchCriteriaId": "CFC56796-7FE3-4E6A-BF0F-AC66A4E5367C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r14:*:*:*:*:*:*", - "matchCriteriaId": "DD18DECB-0500-41CD-9B15-34FCEEB9F762" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*", - "matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.1:*:*:*:*:*:*", - "matchCriteriaId": "6ADA12DC-C223-4037-92B9-70C385B52A6D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.2:*:*:*:*:*:*", - "matchCriteriaId": "DFF39371-F9CE-437A-9720-CD6B2721968B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r9:*:*:*:*:*:*", - "matchCriteriaId": "7DF7ED4E-F2E6-4FB4-AE20-7E98EC5F9918" } ] } diff --git a/CVE-2022/CVE-2022-352xx/CVE-2022-35258.json b/CVE-2022/CVE-2022-352xx/CVE-2022-35258.json index cc7a07d002c..904d81333e0 100644 --- a/CVE-2022/CVE-2022-352xx/CVE-2022-35258.json +++ b/CVE-2022/CVE-2022-352xx/CVE-2022-35258.json @@ -2,12 +2,16 @@ "id": "CVE-2022-35258", "sourceIdentifier": "support@hackerone.com", "published": "2022-12-05T22:15:10.627", - "lastModified": "2022-12-09T00:33:47.967", + "lastModified": "2024-01-13T04:43:44.307", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1." + }, + { + "lang": "es", + "value": "Un atacante no autenticado puede provocar una Denegaci\u00f3n de Servicio (DoS) a los siguientes productos: \nIvanti Connect Secure (ICS) en versiones anteriores a 9.1R14.3, 9.1R15.2, 9.1R16.2 y 22.2R4, \nIvanti Policy Secure (IPS ) en versiones anteriores a 9.1R17 y 22.3R1,\ne Ivanti Neurons for Zero-Trust Access en versiones anteriores a 22.3R1." } ], "metrics": { @@ -120,6 +124,41 @@ "versionEndExcluding": "9.1", "matchCriteriaId": "368E8A56-50E4-4400-8C18-B7426B112FFC" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "A07B66E0-A679-4912-8CB1-CD134713EDC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r10:*:*:*:*:*:*", + "matchCriteriaId": "BF767F07-2E9F-4099-829D-2F70E85D8A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r11:*:*:*:*:*:*", + "matchCriteriaId": "B994E22B-8FA5-4510-82F6-7820BDA7C307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r12:*:*:*:*:*:*", + "matchCriteriaId": "FE5C4ABC-2BEB-4741-95B3-303903369818" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r13:*:*:*:*:*:*", + "matchCriteriaId": "D50C5526-F791-4C76-B5C0-DA2E1281C9E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r13.1:*:*:*:*:*:*", + "matchCriteriaId": "2CB8240E-7683-4C39-9654-4F8D1F682288" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r14:*:*:*:*:*:*", + "matchCriteriaId": "7A53C031-E7A5-47B6-BA4A-DD28432E743F" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r15:*:*:*:*:*:*", @@ -130,6 +169,71 @@ "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r16:*:*:*:*:*:*", "matchCriteriaId": "B90687F3-A5C1-4706-AD66-D78EE512E4C9" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "6D37A6E4-D58E-444D-AF6A-15461F38E81A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "FC2B9DA0-E32B-4125-9986-F0D3814C66E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*", + "matchCriteriaId": "38A0D7CF-7D55-4933-AE8C-36006D6779E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*", + "matchCriteriaId": "C9A5BA3E-D6B3-453D-8DDF-FF16859FD0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*", + "matchCriteriaId": "BAFDA618-D15D-401D-AC68-0020259FEC57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*", + "matchCriteriaId": "D55AB5F0-132F-4C40-BF4F-684E139B774B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*", + "matchCriteriaId": "6BE937D2-8BEE-4E64-8738-F550EAD00F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*", + "matchCriteriaId": "9C753520-1BC6-4980-AFC9-4C2FDDF2FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*", + "matchCriteriaId": "AC3863BC-3B9A-402B-A74A-149CDF717EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*", + "matchCriteriaId": "E3C09D51-FDA0-4D07-87D8-F527C8CBDAFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.1:*:*:*:*:*:*", + "matchCriteriaId": "CCE2E1C0-680F-4EFF-ACE6-A1DAFA209D24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r8.2:*:*:*:*:*:*", + "matchCriteriaId": "7ED1686B-2D80-4ECF-9F7A-AEA989E17C84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:9.1:r9:*:*:*:*:*:*", + "matchCriteriaId": "092DA2A3-5CEF-433F-8E5B-4850E4095CC4" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:ivanti:policy_secure:22.1:r1:*:*:*:*:*:*", @@ -344,106 +448,6 @@ "vulnerable": true, "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:-:*:*:*:*:*:*", "matchCriteriaId": "937A242A-0134-47B2-802C-894AFDC20A48" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r1:*:*:*:*:*:*", - "matchCriteriaId": "1A99A84F-1E38-4B2E-B482-41E975D2B992" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r10:*:*:*:*:*:*", - "matchCriteriaId": "1BA55FFD-9A77-4EA1-B03C-A35294900E03" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r11:*:*:*:*:*:*", - "matchCriteriaId": "42EB6416-1627-42B7-A829-E71F6A99FDE2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r12:*:*:*:*:*:*", - "matchCriteriaId": "9187D4D3-EA76-4445-99BC-CF0D1EAF9B6F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r13:*:*:*:*:*:*", - "matchCriteriaId": "CAEAE3E4-E8D2-4D62-9D2D-7F716B5AABD6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r13.1:*:*:*:*:*:*", - "matchCriteriaId": "CFC56796-7FE3-4E6A-BF0F-AC66A4E5367C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r14:*:*:*:*:*:*", - "matchCriteriaId": "DD18DECB-0500-41CD-9B15-34FCEEB9F762" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r2:*:*:*:*:*:*", - "matchCriteriaId": "6A1B7EB7-57CA-4578-8F95-6FE90C41C70A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3:*:*:*:*:*:*", - "matchCriteriaId": "3CA870E8-C3B6-49AC-8905-B747B97E17B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r3.1:*:*:*:*:*:*", - "matchCriteriaId": "F620CA05-5DD2-4307-AA90-479BA9859A60" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4:*:*:*:*:*:*", - "matchCriteriaId": "4C37ACCA-84F7-4D20-9695-2B028791967A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.1:*:*:*:*:*:*", - "matchCriteriaId": "38A0D053-0AE0-410C-82F1-577C1E8E3913" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r4.2:*:*:*:*:*:*", - "matchCriteriaId": "2C415B9E-F65C-4189-8AA6-DE39A0DE33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r5:*:*:*:*:*:*", - "matchCriteriaId": "2D91B4D9-54B5-4D5D-BC11-D5A9E2A8E518" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r6:*:*:*:*:*:*", - "matchCriteriaId": "C768F191-8685-4723-B0B4-5D6DA97318DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r7:*:*:*:*:*:*", - "matchCriteriaId": "CF6EB502-E2B1-4D8B-ACE7-6C998D29DBE8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8:*:*:*:*:*:*", - "matchCriteriaId": "1EE141EA-2EF9-4229-B618-59853628743A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.1:*:*:*:*:*:*", - "matchCriteriaId": "6ADA12DC-C223-4037-92B9-70C385B52A6D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r8.2:*:*:*:*:*:*", - "matchCriteriaId": "DFF39371-F9CE-437A-9720-CD6B2721968B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.1:r9:*:*:*:*:*:*", - "matchCriteriaId": "7DF7ED4E-F2E6-4FB4-AE20-7E98EC5F9918" } ] } diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51062.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51062.json new file mode 100644 index 00000000000..570b87720dc --- /dev/null +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51062.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-51062", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-13T04:15:07.757", + "lastModified": "2024-01-13T04:15:07.757", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated log file read in the component log-smblog-save of QStar Archive Solutions RELEASE_3-0 Build 7 Patch 0 allows attackers to disclose the SMB Log contents via executing a crafted command." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51062.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51063.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51063.json new file mode 100644 index 00000000000..03df203dfbc --- /dev/null +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51063.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-51063", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-13T04:15:07.820", + "lastModified": "2024-01-13T04:15:07.820", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 was discovered to contain a DOM Based Reflected Cross Site Scripting (XSS) vulnerability within the component qnme-ajax?method=tree_level." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51063.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51064.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51064.json new file mode 100644 index 00000000000..1ff05d52ea1 --- /dev/null +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51064.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-51064", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-13T04:15:07.870", + "lastModified": "2024-01-13T04:15:07.870", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 was discovered to contain a DOM Based reflected XSS vulnerability within the component qnme-ajax?method=tree_table." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51064.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51065.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51065.json new file mode 100644 index 00000000000..9b8fe149691 --- /dev/null +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51065.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-51065", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-13T04:15:07.913", + "lastModified": "2024-01-13T04:15:07.913", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect access control in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to obtain system backups and other sensitive information from the QStar Server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51065.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51066.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51066.json new file mode 100644 index 00000000000..c748be4e3b5 --- /dev/null +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51066.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-51066", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-13T04:15:07.957", + "lastModified": "2024-01-13T04:15:07.957", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An authenticated remote code execution vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows attackers to arbitrarily execute commands." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51066.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51067.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51067.json new file mode 100644 index 00000000000..683041af5fd --- /dev/null +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51067.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-51067", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-13T04:15:08.000", + "lastModified": "2024-01-13T04:15:08.000", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated reflected cross-site scripting (XSS) vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 allows attackers to execute arbitrary javascript on a victim's browser via a crafted link." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51067.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51068.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51068.json new file mode 100644 index 00000000000..c12d6428cec --- /dev/null +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51068.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-51068", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-13T04:15:08.053", + "lastModified": "2024-01-13T04:15:08.053", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An authenticated reflected cross-site scripting (XSS) vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 allows attackers to execute arbitrary javascript on a victim's browser via a crafted link." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51068.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51070.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51070.json new file mode 100644 index 00000000000..b0e845ad6c9 --- /dev/null +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51070.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-51070", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-13T04:15:08.100", + "lastModified": "2024-01-13T04:15:08.100", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An access control issue in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to arbitrarily adjust sensitive SMB settings on the QStar Server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51070.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-510xx/CVE-2023-51071.json b/CVE-2023/CVE-2023-510xx/CVE-2023-51071.json new file mode 100644 index 00000000000..1874bd66455 --- /dev/null +++ b/CVE-2023/CVE-2023-510xx/CVE-2023-51071.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-51071", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-13T04:15:08.143", + "lastModified": "2024-01-13T04:15:08.143", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An access control issue in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to arbitrarily disable the SMB service on a victim's Qstar instance by executing a specific command in a link." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51071.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52288.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52288.json new file mode 100644 index 00000000000..5e614d24884 --- /dev/null +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52288.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-52288", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-13T04:15:08.193", + "lastModified": "2024-01-13T04:15:08.193", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a GET request to a /resource-data/.txt URI (from views.py), allows attackers to read arbitrary files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52289.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52289.json new file mode 100644 index 00000000000..89ef07ed0c3 --- /dev/null +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52289.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-52289", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-13T04:15:08.240", + "lastModified": "2024-01-13T04:15:08.240", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/ URI (from views.py), allows attackers to write to arbitrary files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 923792a04c1..93dc64763ba 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-13T03:00:25.159356+00:00 +2024-01-13T05:00:25.073681+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-13T02:15:07.303000+00:00 +2024-01-13T04:43:44.307000+00:00 ``` ### Last Data Feed Release @@ -29,46 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -235821 +235832 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `11` -* [CVE-2023-50072](CVE-2023/CVE-2023-500xx/CVE-2023-50072.json) (`2024-01-13T01:15:38.663`) -* [CVE-2023-33472](CVE-2023/CVE-2023-334xx/CVE-2023-33472.json) (`2024-01-13T02:15:07.060`) -* [CVE-2023-46942](CVE-2023/CVE-2023-469xx/CVE-2023-46942.json) (`2024-01-13T02:15:07.153`) -* [CVE-2023-46943](CVE-2023/CVE-2023-469xx/CVE-2023-46943.json) (`2024-01-13T02:15:07.200`) -* [CVE-2023-51804](CVE-2023/CVE-2023-518xx/CVE-2023-51804.json) (`2024-01-13T02:15:07.257`) -* [CVE-2023-51805](CVE-2023/CVE-2023-518xx/CVE-2023-51805.json) (`2024-01-13T02:15:07.303`) +* [CVE-2023-51062](CVE-2023/CVE-2023-510xx/CVE-2023-51062.json) (`2024-01-13T04:15:07.757`) +* [CVE-2023-51063](CVE-2023/CVE-2023-510xx/CVE-2023-51063.json) (`2024-01-13T04:15:07.820`) +* [CVE-2023-51064](CVE-2023/CVE-2023-510xx/CVE-2023-51064.json) (`2024-01-13T04:15:07.870`) +* [CVE-2023-51065](CVE-2023/CVE-2023-510xx/CVE-2023-51065.json) (`2024-01-13T04:15:07.913`) +* [CVE-2023-51066](CVE-2023/CVE-2023-510xx/CVE-2023-51066.json) (`2024-01-13T04:15:07.957`) +* [CVE-2023-51067](CVE-2023/CVE-2023-510xx/CVE-2023-51067.json) (`2024-01-13T04:15:08.000`) +* [CVE-2023-51068](CVE-2023/CVE-2023-510xx/CVE-2023-51068.json) (`2024-01-13T04:15:08.053`) +* [CVE-2023-51070](CVE-2023/CVE-2023-510xx/CVE-2023-51070.json) (`2024-01-13T04:15:08.100`) +* [CVE-2023-51071](CVE-2023/CVE-2023-510xx/CVE-2023-51071.json) (`2024-01-13T04:15:08.143`) +* [CVE-2023-52288](CVE-2023/CVE-2023-522xx/CVE-2023-52288.json) (`2024-01-13T04:15:08.193`) +* [CVE-2023-52289](CVE-2023/CVE-2023-522xx/CVE-2023-52289.json) (`2024-01-13T04:15:08.240`) ### CVEs modified in the last Commit -Recently modified CVEs: `21` +Recently modified CVEs: `17` -* [CVE-2023-51969](CVE-2023/CVE-2023-519xx/CVE-2023-51969.json) (`2024-01-13T01:36:31.257`) -* [CVE-2023-51970](CVE-2023/CVE-2023-519xx/CVE-2023-51970.json) (`2024-01-13T01:36:40.447`) -* [CVE-2023-51968](CVE-2023/CVE-2023-519xx/CVE-2023-51968.json) (`2024-01-13T01:36:42.873`) -* [CVE-2023-51967](CVE-2023/CVE-2023-519xx/CVE-2023-51967.json) (`2024-01-13T01:36:44.320`) -* [CVE-2023-51962](CVE-2023/CVE-2023-519xx/CVE-2023-51962.json) (`2024-01-13T01:36:45.693`) -* [CVE-2023-51961](CVE-2023/CVE-2023-519xx/CVE-2023-51961.json) (`2024-01-13T01:36:47.613`) -* [CVE-2023-51966](CVE-2023/CVE-2023-519xx/CVE-2023-51966.json) (`2024-01-13T01:36:48.990`) -* [CVE-2023-51965](CVE-2023/CVE-2023-519xx/CVE-2023-51965.json) (`2024-01-13T01:36:50.583`) -* [CVE-2023-51964](CVE-2023/CVE-2023-519xx/CVE-2023-51964.json) (`2024-01-13T01:36:52.113`) -* [CVE-2023-51963](CVE-2023/CVE-2023-519xx/CVE-2023-51963.json) (`2024-01-13T01:36:53.490`) -* [CVE-2023-51960](CVE-2023/CVE-2023-519xx/CVE-2023-51960.json) (`2024-01-13T01:36:54.740`) -* [CVE-2023-51959](CVE-2023/CVE-2023-519xx/CVE-2023-51959.json) (`2024-01-13T01:36:56.537`) -* [CVE-2023-51958](CVE-2023/CVE-2023-519xx/CVE-2023-51958.json) (`2024-01-13T01:36:59.057`) -* [CVE-2023-51956](CVE-2023/CVE-2023-519xx/CVE-2023-51956.json) (`2024-01-13T01:37:00.747`) -* [CVE-2023-51957](CVE-2023/CVE-2023-519xx/CVE-2023-51957.json) (`2024-01-13T01:37:02.417`) -* [CVE-2023-51955](CVE-2023/CVE-2023-519xx/CVE-2023-51955.json) (`2024-01-13T01:37:05.593`) -* [CVE-2023-51954](CVE-2023/CVE-2023-519xx/CVE-2023-51954.json) (`2024-01-13T01:37:07.867`) -* [CVE-2023-51953](CVE-2023/CVE-2023-519xx/CVE-2023-51953.json) (`2024-01-13T01:37:10.030`) -* [CVE-2023-51952](CVE-2023/CVE-2023-519xx/CVE-2023-51952.json) (`2024-01-13T01:37:13.637`) -* [CVE-2023-46805](CVE-2023/CVE-2023-468xx/CVE-2023-46805.json) (`2024-01-13T02:00:00.970`) -* [CVE-2024-21887](CVE-2024/CVE-2024-218xx/CVE-2024-21887.json) (`2024-01-13T02:00:00.970`) +* [CVE-2020-12880](CVE-2020/CVE-2020-128xx/CVE-2020-12880.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8204](CVE-2020/CVE-2020-82xx/CVE-2020-8204.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8206](CVE-2020/CVE-2020-82xx/CVE-2020-8206.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8216](CVE-2020/CVE-2020-82xx/CVE-2020-8216.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8217](CVE-2020/CVE-2020-82xx/CVE-2020-8217.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8218](CVE-2020/CVE-2020-82xx/CVE-2020-8218.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8219](CVE-2020/CVE-2020-82xx/CVE-2020-8219.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8220](CVE-2020/CVE-2020-82xx/CVE-2020-8220.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8221](CVE-2020/CVE-2020-82xx/CVE-2020-8221.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8222](CVE-2020/CVE-2020-82xx/CVE-2020-8222.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8238](CVE-2020/CVE-2020-82xx/CVE-2020-8238.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8243](CVE-2020/CVE-2020-82xx/CVE-2020-8243.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-15352](CVE-2020/CVE-2020-153xx/CVE-2020-15352.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8261](CVE-2020/CVE-2020-82xx/CVE-2020-8261.json) (`2024-01-13T04:43:44.307`) +* [CVE-2020-8262](CVE-2020/CVE-2020-82xx/CVE-2020-8262.json) (`2024-01-13T04:43:44.307`) +* [CVE-2022-35254](CVE-2022/CVE-2022-352xx/CVE-2022-35254.json) (`2024-01-13T04:43:44.307`) +* [CVE-2022-35258](CVE-2022/CVE-2022-352xx/CVE-2022-35258.json) (`2024-01-13T04:43:44.307`) ## Download and Usage