From 609c02436e6154eaf079693a6b18c2991357367e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 22 Nov 2024 15:10:34 +0000 Subject: [PATCH] Auto-Update: 2024-11-22T15:07:26.368325+00:00 --- CVE-2012/CVE-2012-09xx/CVE-2012-0985.json | 47 +- CVE-2012/CVE-2012-09xx/CVE-2012-0990.json | 50 +- CVE-2012/CVE-2012-09xx/CVE-2012-0991.json | 64 +- CVE-2012/CVE-2012-09xx/CVE-2012-0992.json | 51 +- CVE-2012/CVE-2012-09xx/CVE-2012-0993.json | 59 +- CVE-2012/CVE-2012-09xx/CVE-2012-0994.json | 59 +- CVE-2012/CVE-2012-09xx/CVE-2012-0995.json | 59 +- CVE-2012/CVE-2012-09xx/CVE-2012-0996.json | 16 +- CVE-2012/CVE-2012-09xx/CVE-2012-0997.json | 16 +- CVE-2012/CVE-2012-09xx/CVE-2012-0998.json | 28 +- CVE-2012/CVE-2012-09xx/CVE-2012-0999.json | 28 +- CVE-2012/CVE-2012-10xx/CVE-2012-1000.json | 28 +- CVE-2012/CVE-2012-10xx/CVE-2012-1002.json | 23 +- CVE-2012/CVE-2012-10xx/CVE-2012-1003.json | 18 +- CVE-2012/CVE-2012-10xx/CVE-2012-1004.json | 39 +- CVE-2012/CVE-2012-10xx/CVE-2012-1005.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1006.json | 23 +- CVE-2012/CVE-2012-10xx/CVE-2012-1007.json | 34 +- CVE-2012/CVE-2012-10xx/CVE-2012-1008.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1009.json | 39 +- CVE-2012/CVE-2012-10xx/CVE-2012-1010.json | 40 +- CVE-2012/CVE-2012-10xx/CVE-2012-1011.json | 43 +- CVE-2012/CVE-2012-10xx/CVE-2012-1012.json | 25 +- CVE-2012/CVE-2012-10xx/CVE-2012-1013.json | 51 +- CVE-2012/CVE-2012-10xx/CVE-2012-1014.json | 23 +- CVE-2012/CVE-2012-10xx/CVE-2012-1015.json | 31 +- CVE-2012/CVE-2012-10xx/CVE-2012-1017.json | 29 +- CVE-2012/CVE-2012-10xx/CVE-2012-1018.json | 25 +- CVE-2012/CVE-2012-10xx/CVE-2012-1019.json | 34 +- CVE-2012/CVE-2012-10xx/CVE-2012-1020.json | 33 +- CVE-2012/CVE-2012-10xx/CVE-2012-1021.json | 39 +- CVE-2012/CVE-2012-10xx/CVE-2012-1022.json | 25 +- CVE-2012/CVE-2012-10xx/CVE-2012-1023.json | 32 +- CVE-2012/CVE-2012-10xx/CVE-2012-1024.json | 15 +- CVE-2012/CVE-2012-10xx/CVE-2012-1025.json | 16 +- CVE-2012/CVE-2012-10xx/CVE-2012-1026.json | 33 +- CVE-2012/CVE-2012-10xx/CVE-2012-1027.json | 44 +- CVE-2012/CVE-2012-10xx/CVE-2012-1028.json | 29 +- CVE-2012/CVE-2012-10xx/CVE-2012-1029.json | 44 +- CVE-2012/CVE-2012-10xx/CVE-2012-1030.json | 20 +- CVE-2012/CVE-2012-10xx/CVE-2012-1031.json | 29 +- CVE-2012/CVE-2012-10xx/CVE-2012-1033.json | 69 +- CVE-2012/CVE-2012-10xx/CVE-2012-1034.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1035.json | 28 +- CVE-2012/CVE-2012-10xx/CVE-2012-1036.json | 20 +- CVE-2012/CVE-2012-10xx/CVE-2012-1037.json | 29 +- CVE-2012/CVE-2012-10xx/CVE-2012-1039.json | 38 +- CVE-2012/CVE-2012-10xx/CVE-2012-1046.json | 40 +- CVE-2012/CVE-2012-10xx/CVE-2012-1047.json | 29 +- CVE-2012/CVE-2012-10xx/CVE-2012-1048.json | 29 +- CVE-2012/CVE-2012-10xx/CVE-2012-1049.json | 36 +- CVE-2012/CVE-2012-10xx/CVE-2012-1050.json | 60 +- CVE-2012/CVE-2012-10xx/CVE-2012-1051.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1052.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1053.json | 83 +- CVE-2012/CVE-2012-10xx/CVE-2012-1054.json | 81 +- CVE-2012/CVE-2012-10xx/CVE-2012-1055.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1056.json | 41 +- CVE-2012/CVE-2012-10xx/CVE-2012-1057.json | 45 +- CVE-2012/CVE-2012-10xx/CVE-2012-1058.json | 36 +- CVE-2012/CVE-2012-10xx/CVE-2012-1059.json | 37 +- CVE-2012/CVE-2012-10xx/CVE-2012-1060.json | 46 +- CVE-2012/CVE-2012-10xx/CVE-2012-1061.json | 30 +- CVE-2012/CVE-2012-10xx/CVE-2012-1062.json | 41 +- CVE-2012/CVE-2012-10xx/CVE-2012-1063.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1065.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1066.json | 22 +- CVE-2012/CVE-2012-10xx/CVE-2012-1067.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1068.json | 34 +- CVE-2012/CVE-2012-10xx/CVE-2012-1069.json | 25 +- CVE-2012/CVE-2012-10xx/CVE-2012-1070.json | 31 +- CVE-2012/CVE-2012-10xx/CVE-2012-1071.json | 37 +- CVE-2012/CVE-2012-10xx/CVE-2012-1072.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1073.json | 23 +- CVE-2012/CVE-2012-10xx/CVE-2012-1074.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1075.json | 31 +- CVE-2012/CVE-2012-10xx/CVE-2012-1076.json | 34 +- CVE-2012/CVE-2012-10xx/CVE-2012-1077.json | 24 +- CVE-2012/CVE-2012-10xx/CVE-2012-1078.json | 30 +- CVE-2012/CVE-2012-10xx/CVE-2012-1079.json | 30 +- CVE-2012/CVE-2012-10xx/CVE-2012-1080.json | 24 +- CVE-2012/CVE-2012-10xx/CVE-2012-1081.json | 32 +- CVE-2012/CVE-2012-10xx/CVE-2012-1082.json | 24 +- CVE-2012/CVE-2012-10xx/CVE-2012-1083.json | 24 +- CVE-2012/CVE-2012-10xx/CVE-2012-1084.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1085.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1086.json | 24 +- CVE-2012/CVE-2012-10xx/CVE-2012-1087.json | 28 +- CVE-2012/CVE-2012-10xx/CVE-2012-1089.json | 26 +- CVE-2012/CVE-2012-10xx/CVE-2012-1090.json | 94 +- CVE-2012/CVE-2012-10xx/CVE-2012-1097.json | 103 +- CVE-2012/CVE-2012-10xx/CVE-2012-1098.json | 31 +- CVE-2012/CVE-2012-10xx/CVE-2012-1099.json | 39 +- CVE-2012/CVE-2012-11xx/CVE-2012-1106.json | 27 +- CVE-2012/CVE-2012-11xx/CVE-2012-1107.json | 61 +- CVE-2012/CVE-2012-11xx/CVE-2012-1108.json | 61 +- CVE-2012/CVE-2012-11xx/CVE-2012-1110.json | 54 +- CVE-2012/CVE-2012-11xx/CVE-2012-1112.json | 46 +- CVE-2012/CVE-2012-11xx/CVE-2012-1113.json | 51 +- CVE-2012/CVE-2012-11xx/CVE-2012-1118.json | 69 +- CVE-2012/CVE-2012-11xx/CVE-2012-1119.json | 76 +- CVE-2012/CVE-2012-11xx/CVE-2012-1120.json | 68 +- CVE-2012/CVE-2012-11xx/CVE-2012-1121.json | 58 +- CVE-2012/CVE-2012-11xx/CVE-2012-1122.json | 69 +- CVE-2012/CVE-2012-11xx/CVE-2012-1123.json | 71 +- CVE-2012/CVE-2012-11xx/CVE-2012-1126.json | 102 +- CVE-2012/CVE-2012-11xx/CVE-2012-1127.json | 102 +- CVE-2012/CVE-2012-11xx/CVE-2012-1128.json | 74 +- CVE-2012/CVE-2012-11xx/CVE-2012-1129.json | 94 +- CVE-2012/CVE-2012-11xx/CVE-2012-1130.json | 102 +- CVE-2012/CVE-2012-11xx/CVE-2012-1131.json | 102 +- CVE-2012/CVE-2012-11xx/CVE-2012-1132.json | 102 +- CVE-2012/CVE-2012-11xx/CVE-2012-1133.json | 102 +- CVE-2012/CVE-2012-11xx/CVE-2012-1134.json | 110 +- CVE-2012/CVE-2012-11xx/CVE-2012-1135.json | 94 +- CVE-2012/CVE-2012-11xx/CVE-2012-1136.json | 110 +- CVE-2012/CVE-2012-11xx/CVE-2012-1137.json | 94 +- CVE-2012/CVE-2012-11xx/CVE-2012-1138.json | 94 +- CVE-2012/CVE-2012-11xx/CVE-2012-1139.json | 102 +- CVE-2012/CVE-2012-11xx/CVE-2012-1140.json | 82 +- CVE-2012/CVE-2012-11xx/CVE-2012-1141.json | 102 +- CVE-2012/CVE-2012-11xx/CVE-2012-1142.json | 110 +- CVE-2012/CVE-2012-11xx/CVE-2012-1143.json | 102 +- CVE-2012/CVE-2012-11xx/CVE-2012-1144.json | 90 +- CVE-2012/CVE-2012-11xx/CVE-2012-1145.json | 54 +- CVE-2012/CVE-2012-11xx/CVE-2012-1146.json | 93 +- CVE-2012/CVE-2012-11xx/CVE-2012-1147.json | 49 +- CVE-2012/CVE-2012-11xx/CVE-2012-1148.json | 85 +- CVE-2012/CVE-2012-11xx/CVE-2012-1149.json | 150 +- CVE-2012/CVE-2012-11xx/CVE-2012-1151.json | 73 +- CVE-2012/CVE-2012-11xx/CVE-2012-1152.json | 74 +- CVE-2012/CVE-2012-11xx/CVE-2012-1162.json | 39 +- CVE-2012/CVE-2012-11xx/CVE-2012-1163.json | 33 +- CVE-2012/CVE-2012-11xx/CVE-2012-1164.json | 60 +- CVE-2012/CVE-2012-11xx/CVE-2012-1165.json | 135 +- CVE-2012/CVE-2012-11xx/CVE-2012-1172.json | 113 +- CVE-2012/CVE-2012-11xx/CVE-2012-1173.json | 130 +- CVE-2012/CVE-2012-11xx/CVE-2012-1174.json | 31 +- CVE-2012/CVE-2012-11xx/CVE-2012-1175.json | 41 +- CVE-2012/CVE-2012-11xx/CVE-2012-1176.json | 59 +- CVE-2012/CVE-2012-11xx/CVE-2012-1177.json | 55 +- CVE-2012/CVE-2012-11xx/CVE-2012-1178.json | 46 +- CVE-2012/CVE-2012-11xx/CVE-2012-1179.json | 51 +- CVE-2012/CVE-2012-11xx/CVE-2012-1180.json | 169 +- CVE-2012/CVE-2012-11xx/CVE-2012-1181.json | 38 +- CVE-2012/CVE-2012-11xx/CVE-2012-1182.json | 134 +- CVE-2012/CVE-2012-11xx/CVE-2012-1185.json | 118 +- CVE-2012/CVE-2012-11xx/CVE-2012-1186.json | 111 +- CVE-2012/CVE-2012-11xx/CVE-2012-1190.json | 47 +- CVE-2012/CVE-2012-11xx/CVE-2012-1191.json | 16 +- CVE-2012/CVE-2012-11xx/CVE-2012-1192.json | 13 +- CVE-2012/CVE-2012-11xx/CVE-2012-1193.json | 26 +- CVE-2012/CVE-2012-11xx/CVE-2012-1194.json | 16 +- CVE-2012/CVE-2012-11xx/CVE-2012-1195.json | 44 +- CVE-2012/CVE-2012-11xx/CVE-2012-1196.json | 44 +- CVE-2012/CVE-2012-11xx/CVE-2012-1197.json | 26 +- CVE-2012/CVE-2012-11xx/CVE-2012-1198.json | 25 +- CVE-2012/CVE-2012-11xx/CVE-2012-1199.json | 25 +- CVE-2012/CVE-2012-12xx/CVE-2012-1200.json | 25 +- CVE-2012/CVE-2012-12xx/CVE-2012-1205.json | 42 +- CVE-2012/CVE-2012-12xx/CVE-2012-1206.json | 38 +- CVE-2012/CVE-2012-12xx/CVE-2012-1207.json | 36 +- CVE-2012/CVE-2012-12xx/CVE-2012-1208.json | 58 +- CVE-2012/CVE-2012-12xx/CVE-2012-1209.json | 31 +- CVE-2012/CVE-2012-12xx/CVE-2012-1210.json | 25 +- CVE-2012/CVE-2012-12xx/CVE-2012-1211.json | 25 +- CVE-2012/CVE-2012-12xx/CVE-2012-1212.json | 39 +- CVE-2012/CVE-2012-12xx/CVE-2012-1213.json | 36 +- CVE-2012/CVE-2012-12xx/CVE-2012-1214.json | 29 +- CVE-2012/CVE-2012-12xx/CVE-2012-1215.json | 33 +- CVE-2012/CVE-2012-12xx/CVE-2012-1216.json | 23 +- CVE-2012/CVE-2012-12xx/CVE-2012-1217.json | 32 +- CVE-2012/CVE-2012-12xx/CVE-2012-1218.json | 26 +- CVE-2012/CVE-2012-12xx/CVE-2012-1219.json | 26 +- CVE-2012/CVE-2012-12xx/CVE-2012-1220.json | 25 +- CVE-2012/CVE-2012-12xx/CVE-2012-1221.json | 33 +- CVE-2012/CVE-2012-12xx/CVE-2012-1222.json | 33 +- CVE-2012/CVE-2012-12xx/CVE-2012-1223.json | 29 +- CVE-2012/CVE-2012-12xx/CVE-2012-1224.json | 20 +- CVE-2012/CVE-2012-12xx/CVE-2012-1225.json | 34 +- CVE-2012/CVE-2012-12xx/CVE-2012-1226.json | 41 +- CVE-2012/CVE-2012-12xx/CVE-2012-1227.json | 27 +- CVE-2012/CVE-2012-12xx/CVE-2012-1234.json | 17 +- CVE-2012/CVE-2012-12xx/CVE-2012-1235.json | 17 +- CVE-2012/CVE-2012-12xx/CVE-2012-1236.json | 27 +- CVE-2012/CVE-2012-12xx/CVE-2012-1237.json | 26 +- CVE-2012/CVE-2012-12xx/CVE-2012-1238.json | 34 +- CVE-2012/CVE-2012-12xx/CVE-2012-1239.json | 21 +- CVE-2012/CVE-2012-12xx/CVE-2012-1240.json | 31 +- CVE-2012/CVE-2012-12xx/CVE-2012-1241.json | 31 +- CVE-2012/CVE-2012-12xx/CVE-2012-1242.json | 30 +- CVE-2012/CVE-2012-12xx/CVE-2012-1243.json | 35 +- CVE-2012/CVE-2012-12xx/CVE-2012-1244.json | 31 +- CVE-2012/CVE-2012-12xx/CVE-2012-1245.json | 27 +- CVE-2012/CVE-2012-12xx/CVE-2012-1246.json | 27 +- CVE-2012/CVE-2012-12xx/CVE-2012-1247.json | 27 +- CVE-2012/CVE-2012-12xx/CVE-2012-1248.json | 47 +- CVE-2012/CVE-2012-12xx/CVE-2012-1249.json | 31 +- CVE-2012/CVE-2012-12xx/CVE-2012-1250.json | 46 +- CVE-2012/CVE-2012-12xx/CVE-2012-1251.json | 29 +- CVE-2012/CVE-2012-12xx/CVE-2012-1252.json | 17 +- CVE-2012/CVE-2012-12xx/CVE-2012-1253.json | 21 +- CVE-2012/CVE-2012-12xx/CVE-2012-1254.json | 25 +- CVE-2012/CVE-2012-12xx/CVE-2012-1255.json | 25 +- CVE-2012/CVE-2012-12xx/CVE-2012-1256.json | 18 +- CVE-2012/CVE-2012-12xx/CVE-2012-1262.json | 70 +- CVE-2012/CVE-2012-12xx/CVE-2012-1264.json | 18 +- CVE-2012/CVE-2012-12xx/CVE-2012-1288.json | 16 +- CVE-2012/CVE-2012-12xx/CVE-2012-1289.json | 44 +- CVE-2012/CVE-2012-12xx/CVE-2012-1290.json | 32 +- CVE-2012/CVE-2012-12xx/CVE-2012-1291.json | 32 +- CVE-2012/CVE-2012-12xx/CVE-2012-1292.json | 32 +- CVE-2012/CVE-2012-12xx/CVE-2012-1294.json | 22 +- CVE-2012/CVE-2012-12xx/CVE-2012-1296.json | 37 +- CVE-2012/CVE-2012-12xx/CVE-2012-1297.json | 36 +- CVE-2012/CVE-2012-13xx/CVE-2012-1310.json | 30 +- CVE-2012/CVE-2012-13xx/CVE-2012-1311.json | 34 +- CVE-2012/CVE-2012-13xx/CVE-2012-1312.json | 34 +- CVE-2012/CVE-2012-13xx/CVE-2012-1314.json | 34 +- CVE-2012/CVE-2012-13xx/CVE-2012-1315.json | 34 +- CVE-2012/CVE-2012-13xx/CVE-2012-1324.json | 15 +- CVE-2012/CVE-2012-13xx/CVE-2012-1327.json | 19 +- CVE-2012/CVE-2012-13xx/CVE-2012-1328.json | 15 +- CVE-2012/CVE-2012-13xx/CVE-2012-1335.json | 24 +- CVE-2012/CVE-2012-13xx/CVE-2012-1336.json | 24 +- CVE-2012/CVE-2012-13xx/CVE-2012-1337.json | 31 +- CVE-2012/CVE-2012-13xx/CVE-2012-1338.json | 18 +- CVE-2012/CVE-2012-13xx/CVE-2012-1339.json | 18 +- CVE-2012/CVE-2012-13xx/CVE-2012-1340.json | 18 +- CVE-2012/CVE-2012-13xx/CVE-2012-1342.json | 22 +- CVE-2012/CVE-2012-13xx/CVE-2012-1344.json | 18 +- CVE-2012/CVE-2012-13xx/CVE-2012-1346.json | 16 +- CVE-2012/CVE-2012-13xx/CVE-2012-1348.json | 16 +- CVE-2012/CVE-2012-13xx/CVE-2012-1350.json | 16 +- CVE-2012/CVE-2012-13xx/CVE-2012-1357.json | 16 +- CVE-2012/CVE-2012-13xx/CVE-2012-1361.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1364.json | 16 +- CVE-2012/CVE-2012-13xx/CVE-2012-1365.json | 16 +- CVE-2012/CVE-2012-13xx/CVE-2012-1367.json | 17 +- CVE-2012/CVE-2012-13xx/CVE-2012-1370.json | 16 +- CVE-2012/CVE-2012-13xx/CVE-2012-1380.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1381.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1382.json | 15 +- CVE-2012/CVE-2012-13xx/CVE-2012-1383.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1384.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1385.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1386.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1387.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1388.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1389.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1390.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1391.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1392.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1393.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1394.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1395.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1396.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1397.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1398.json | 13 +- CVE-2012/CVE-2012-13xx/CVE-2012-1399.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1400.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1401.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1402.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1403.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1404.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1405.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1406.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1407.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1408.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1409.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1410.json | 64 +- CVE-2012/CVE-2012-14xx/CVE-2012-1413.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1418.json | 16 +- CVE-2012/CVE-2012-14xx/CVE-2012-1419.json | 23 +- CVE-2012/CVE-2012-14xx/CVE-2012-1420.json | 31 +- CVE-2012/CVE-2012-14xx/CVE-2012-1421.json | 21 +- CVE-2012/CVE-2012-14xx/CVE-2012-1422.json | 23 +- CVE-2012/CVE-2012-14xx/CVE-2012-1423.json | 35 +- CVE-2012/CVE-2012-14xx/CVE-2012-1424.json | 31 +- CVE-2012/CVE-2012-14xx/CVE-2012-1425.json | 43 +- CVE-2012/CVE-2012-14xx/CVE-2012-1426.json | 35 +- CVE-2012/CVE-2012-14xx/CVE-2012-1427.json | 31 +- CVE-2012/CVE-2012-14xx/CVE-2012-1428.json | 31 +- CVE-2012/CVE-2012-14xx/CVE-2012-1429.json | 19 +- CVE-2012/CVE-2012-14xx/CVE-2012-1430.json | 17 +- CVE-2012/CVE-2012-14xx/CVE-2012-1431.json | 17 +- CVE-2012/CVE-2012-14xx/CVE-2012-1432.json | 17 +- CVE-2012/CVE-2012-14xx/CVE-2012-1433.json | 17 +- CVE-2012/CVE-2012-14xx/CVE-2012-1434.json | 17 +- CVE-2012/CVE-2012-14xx/CVE-2012-1435.json | 17 +- CVE-2012/CVE-2012-14xx/CVE-2012-1436.json | 17 +- CVE-2012/CVE-2012-14xx/CVE-2012-1437.json | 19 +- CVE-2012/CVE-2012-14xx/CVE-2012-1438.json | 17 +- CVE-2012/CVE-2012-14xx/CVE-2012-1439.json | 19 +- CVE-2012/CVE-2012-14xx/CVE-2012-1440.json | 17 +- CVE-2012/CVE-2012-14xx/CVE-2012-1441.json | 17 +- CVE-2012/CVE-2012-14xx/CVE-2012-1442.json | 31 +- CVE-2012/CVE-2012-14xx/CVE-2012-1443.json | 75 +- CVE-2012/CVE-2012-14xx/CVE-2012-1444.json | 23 +- CVE-2012/CVE-2012-14xx/CVE-2012-1445.json | 19 +- CVE-2012/CVE-2012-14xx/CVE-2012-1446.json | 39 +- CVE-2012/CVE-2012-14xx/CVE-2012-1447.json | 23 +- CVE-2012/CVE-2012-14xx/CVE-2012-1448.json | 19 +- CVE-2012/CVE-2012-14xx/CVE-2012-1449.json | 19 +- CVE-2012/CVE-2012-14xx/CVE-2012-1450.json | 19 +- CVE-2012/CVE-2012-14xx/CVE-2012-1451.json | 17 +- CVE-2012/CVE-2012-14xx/CVE-2012-1452.json | 19 +- CVE-2012/CVE-2012-14xx/CVE-2012-1453.json | 51 +- CVE-2012/CVE-2012-14xx/CVE-2012-1454.json | 19 +- CVE-2012/CVE-2012-14xx/CVE-2012-1455.json | 19 +- CVE-2012/CVE-2012-14xx/CVE-2012-1456.json | 55 +- CVE-2012/CVE-2012-14xx/CVE-2012-1457.json | 71 +- CVE-2012/CVE-2012-14xx/CVE-2012-1458.json | 39 +- CVE-2012/CVE-2012-14xx/CVE-2012-1459.json | 75 +- CVE-2012/CVE-2012-14xx/CVE-2012-1460.json | 23 +- CVE-2012/CVE-2012-14xx/CVE-2012-1461.json | 51 +- CVE-2012/CVE-2012-14xx/CVE-2012-1462.json | 23 +- CVE-2012/CVE-2012-14xx/CVE-2012-1463.json | 31 +- CVE-2012/CVE-2012-14xx/CVE-2012-1464.json | 48 +- CVE-2012/CVE-2012-14xx/CVE-2012-1465.json | 61 +- CVE-2012/CVE-2012-14xx/CVE-2012-1466.json | 51 +- CVE-2012/CVE-2012-14xx/CVE-2012-1467.json | 20 +- CVE-2012/CVE-2012-14xx/CVE-2012-1468.json | 28 +- CVE-2012/CVE-2012-14xx/CVE-2012-1469.json | 71 +- CVE-2012/CVE-2012-14xx/CVE-2012-1472.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1474.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1475.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1476.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1477.json | 13 +- CVE-2012/CVE-2012-14xx/CVE-2012-1478.json | 15 +- CVE-2012/CVE-2012-14xx/CVE-2012-1479.json | 15 +- CVE-2012/CVE-2012-14xx/CVE-2012-1480.json | 15 +- CVE-2012/CVE-2012-14xx/CVE-2012-1481.json | 23 +- CVE-2012/CVE-2012-14xx/CVE-2012-1482.json | 23 +- CVE-2012/CVE-2012-14xx/CVE-2012-1483.json | 23 +- CVE-2012/CVE-2012-14xx/CVE-2012-1484.json | 23 +- CVE-2012/CVE-2012-14xx/CVE-2012-1485.json | 27 +- CVE-2012/CVE-2012-14xx/CVE-2012-1493.json | 32 +- CVE-2012/CVE-2012-14xx/CVE-2012-1497.json | 27 +- CVE-2012/CVE-2012-14xx/CVE-2012-1498.json | 47 +- CVE-2012/CVE-2012-14xx/CVE-2012-1499.json | 39 +- CVE-2012/CVE-2012-15xx/CVE-2012-1502.json | 59 +- CVE-2012/CVE-2012-15xx/CVE-2012-1508.json | 53 +- CVE-2012/CVE-2012-15xx/CVE-2012-1509.json | 43 +- CVE-2012/CVE-2012-15xx/CVE-2012-1510.json | 57 +- CVE-2012/CVE-2012-15xx/CVE-2012-1511.json | 38 +- CVE-2012/CVE-2012-15xx/CVE-2012-1512.json | 34 +- CVE-2012/CVE-2012-15xx/CVE-2012-1513.json | 34 +- CVE-2012/CVE-2012-15xx/CVE-2012-1514.json | 34 +- CVE-2012/CVE-2012-15xx/CVE-2012-1515.json | 45 +- CVE-2012/CVE-2012-15xx/CVE-2012-1516.json | 52 +- CVE-2012/CVE-2012-15xx/CVE-2012-1517.json | 34 +- CVE-2012/CVE-2012-15xx/CVE-2012-1518.json | 38 +- CVE-2012/CVE-2012-15xx/CVE-2012-1520.json | 37 +- CVE-2012/CVE-2012-15xx/CVE-2012-1521.json | 121 +- CVE-2012/CVE-2012-15xx/CVE-2012-1522.json | 22 +- CVE-2012/CVE-2012-15xx/CVE-2012-1523.json | 22 +- CVE-2012/CVE-2012-15xx/CVE-2012-1524.json | 22 +- CVE-2012/CVE-2012-15xx/CVE-2012-1525.json | 23 +- CVE-2012/CVE-2012-15xx/CVE-2012-1526.json | 22 +- CVE-2012/CVE-2012-15xx/CVE-2012-1535.json | 69 +- CVE-2012/CVE-2012-15xx/CVE-2012-1545.json | 25 +- CVE-2012/CVE-2012-15xx/CVE-2012-1557.json | 57 +- CVE-2012/CVE-2012-15xx/CVE-2012-1558.json | 23 +- CVE-2012/CVE-2012-15xx/CVE-2012-1569.json | 148 +- CVE-2012/CVE-2012-15xx/CVE-2012-1570.json | 71 +- CVE-2012/CVE-2012-15xx/CVE-2012-1571.json | 42 +- CVE-2012/CVE-2012-15xx/CVE-2012-1573.json | 121 +- CVE-2012/CVE-2012-15xx/CVE-2012-1574.json | 38 +- CVE-2012/CVE-2012-15xx/CVE-2012-1575.json | 47 +- CVE-2012/CVE-2012-15xx/CVE-2012-1578.json | 49 +- CVE-2012/CVE-2012-15xx/CVE-2012-1579.json | 49 +- CVE-2012/CVE-2012-15xx/CVE-2012-1580.json | 52 +- CVE-2012/CVE-2012-15xx/CVE-2012-1581.json | 48 +- CVE-2012/CVE-2012-15xx/CVE-2012-1582.json | 52 +- CVE-2012/CVE-2012-15xx/CVE-2012-1583.json | 55 +- CVE-2012/CVE-2012-15xx/CVE-2012-1584.json | 65 +- CVE-2012/CVE-2012-15xx/CVE-2012-1585.json | 31 +- CVE-2012/CVE-2012-15xx/CVE-2012-1586.json | 29 +- CVE-2012/CVE-2012-15xx/CVE-2012-1589.json | 38 +- CVE-2012/CVE-2012-15xx/CVE-2012-1593.json | 66 +- CVE-2012/CVE-2012-15xx/CVE-2012-1594.json | 50 +- CVE-2012/CVE-2012-15xx/CVE-2012-1595.json | 70 +- CVE-2012/CVE-2012-15xx/CVE-2012-1596.json | 62 +- CVE-2012/CVE-2012-15xx/CVE-2012-1597.json | 25 +- CVE-2012/CVE-2012-16xx/CVE-2012-1601.json | 51 +- CVE-2012/CVE-2012-16xx/CVE-2012-1605.json | 28 +- CVE-2012/CVE-2012-16xx/CVE-2012-1606.json | 46 +- CVE-2012/CVE-2012-16xx/CVE-2012-1607.json | 46 +- CVE-2012/CVE-2012-16xx/CVE-2012-1608.json | 39 +- CVE-2012/CVE-2012-16xx/CVE-2012-1610.json | 114 +- CVE-2012/CVE-2012-16xx/CVE-2012-1611.json | 31 +- CVE-2012/CVE-2012-16xx/CVE-2012-1612.json | 39 +- CVE-2012/CVE-2012-16xx/CVE-2012-1613.json | 73 +- CVE-2012/CVE-2012-16xx/CVE-2012-1614.json | 93 +- CVE-2012/CVE-2012-16xx/CVE-2012-1616.json | 49 +- CVE-2012/CVE-2012-16xx/CVE-2012-1620.json | 56 +- CVE-2012/CVE-2012-16xx/CVE-2012-1635.json | 28 +- CVE-2012/CVE-2012-16xx/CVE-2012-1641.json | 71 +- CVE-2012/CVE-2012-16xx/CVE-2012-1642.json | 46 +- CVE-2012/CVE-2012-16xx/CVE-2012-1643.json | 46 +- CVE-2012/CVE-2012-16xx/CVE-2012-1644.json | 46 +- CVE-2012/CVE-2012-16xx/CVE-2012-1645.json | 57 +- CVE-2012/CVE-2012-16xx/CVE-2012-1647.json | 61 +- CVE-2012/CVE-2012-16xx/CVE-2012-1648.json | 41 +- CVE-2012/CVE-2012-16xx/CVE-2012-1649.json | 44 +- CVE-2012/CVE-2012-16xx/CVE-2012-1650.json | 45 +- CVE-2012/CVE-2012-16xx/CVE-2012-1661.json | 48 +- CVE-2012/CVE-2012-16xx/CVE-2012-1662.json | 38 +- CVE-2012/CVE-2012-16xx/CVE-2012-1663.json | 22 +- CVE-2012/CVE-2012-16xx/CVE-2012-1666.json | 21 +- CVE-2012/CVE-2012-16xx/CVE-2012-1667.json | 85 +- CVE-2012/CVE-2012-16xx/CVE-2012-1670.json | 41 +- CVE-2012/CVE-2012-16xx/CVE-2012-1672.json | 22 +- CVE-2012/CVE-2012-16xx/CVE-2012-1673.json | 22 +- CVE-2012/CVE-2012-16xx/CVE-2012-1674.json | 30 +- CVE-2012/CVE-2012-16xx/CVE-2012-1675.json | 87 +- CVE-2012/CVE-2012-16xx/CVE-2012-1676.json | 22 +- CVE-2012/CVE-2012-16xx/CVE-2012-1679.json | 22 +- CVE-2012/CVE-2012-16xx/CVE-2012-1681.json | 30 +- CVE-2012/CVE-2012-16xx/CVE-2012-1682.json | 70 +- CVE-2012/CVE-2012-16xx/CVE-2012-1683.json | 30 +- CVE-2012/CVE-2012-16xx/CVE-2012-1684.json | 30 +- CVE-2012/CVE-2012-16xx/CVE-2012-1687.json | 46 +- CVE-2012/CVE-2012-16xx/CVE-2012-1688.json | 82 +- CVE-2012/CVE-2012-16xx/CVE-2012-1689.json | 83 +- CVE-2012/CVE-2012-16xx/CVE-2012-1690.json | 82 +- CVE-2012/CVE-2012-16xx/CVE-2012-1691.json | 38 +- CVE-2012/CVE-2012-16xx/CVE-2012-1692.json | 52 +- CVE-2012/CVE-2012-16xx/CVE-2012-1693.json | 30 +- CVE-2012/CVE-2012-16xx/CVE-2012-1694.json | 23 +- CVE-2012/CVE-2012-16xx/CVE-2012-1695.json | 36 +- CVE-2012/CVE-2012-16xx/CVE-2012-1696.json | 42 +- CVE-2012/CVE-2012-16xx/CVE-2012-1697.json | 68 +- CVE-2012/CVE-2012-16xx/CVE-2012-1698.json | 30 +- CVE-2012/CVE-2012-17xx/CVE-2012-1703.json | 86 +- CVE-2012/CVE-2012-17xx/CVE-2012-1704.json | 40 +- CVE-2012/CVE-2012-17xx/CVE-2012-1706.json | 26 +- CVE-2012/CVE-2012-17xx/CVE-2012-1707.json | 40 +- CVE-2012/CVE-2012-17xx/CVE-2012-1708.json | 26 +- CVE-2012/CVE-2012-17xx/CVE-2012-1709.json | 26 +- CVE-2012/CVE-2012-17xx/CVE-2012-1710.json | 47 +- CVE-2012/CVE-2012-17xx/CVE-2012-1711.json | 50 +- CVE-2012/CVE-2012-17xx/CVE-2012-1713.json | 98 +- CVE-2012/CVE-2012-17xx/CVE-2012-1715.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1716.json | 78 +- CVE-2012/CVE-2012-17xx/CVE-2012-1717.json | 147 +- CVE-2012/CVE-2012-17xx/CVE-2012-1718.json | 110 +- CVE-2012/CVE-2012-17xx/CVE-2012-1719.json | 90 +- CVE-2012/CVE-2012-17xx/CVE-2012-1720.json | 50 +- CVE-2012/CVE-2012-17xx/CVE-2012-1721.json | 54 +- CVE-2012/CVE-2012-17xx/CVE-2012-1722.json | 54 +- CVE-2012/CVE-2012-17xx/CVE-2012-1723.json | 109 +- CVE-2012/CVE-2012-17xx/CVE-2012-1724.json | 58 +- CVE-2012/CVE-2012-17xx/CVE-2012-1725.json | 78 +- CVE-2012/CVE-2012-17xx/CVE-2012-1726.json | 42 +- CVE-2012/CVE-2012-17xx/CVE-2012-1727.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1728.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1729.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1730.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1731.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1732.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1733.json | 38 +- CVE-2012/CVE-2012-17xx/CVE-2012-1734.json | 83 +- CVE-2012/CVE-2012-17xx/CVE-2012-1735.json | 55 +- CVE-2012/CVE-2012-17xx/CVE-2012-1736.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1737.json | 38 +- CVE-2012/CVE-2012-17xx/CVE-2012-1738.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1739.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1740.json | 30 +- CVE-2012/CVE-2012-17xx/CVE-2012-1741.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1742.json | 46 +- CVE-2012/CVE-2012-17xx/CVE-2012-1743.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1744.json | 38 +- CVE-2012/CVE-2012-17xx/CVE-2012-1745.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1746.json | 30 +- CVE-2012/CVE-2012-17xx/CVE-2012-1747.json | 30 +- CVE-2012/CVE-2012-17xx/CVE-2012-1748.json | 50 +- CVE-2012/CVE-2012-17xx/CVE-2012-1749.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1750.json | 30 +- CVE-2012/CVE-2012-17xx/CVE-2012-1752.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1753.json | 38 +- CVE-2012/CVE-2012-17xx/CVE-2012-1754.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1756.json | 55 +- CVE-2012/CVE-2012-17xx/CVE-2012-1757.json | 55 +- CVE-2012/CVE-2012-17xx/CVE-2012-1758.json | 46 +- CVE-2012/CVE-2012-17xx/CVE-2012-1759.json | 49 +- CVE-2012/CVE-2012-17xx/CVE-2012-1760.json | 46 +- CVE-2012/CVE-2012-17xx/CVE-2012-1761.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1762.json | 38 +- CVE-2012/CVE-2012-17xx/CVE-2012-1764.json | 38 +- CVE-2012/CVE-2012-17xx/CVE-2012-1765.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1766.json | 65 +- CVE-2012/CVE-2012-17xx/CVE-2012-1767.json | 65 +- CVE-2012/CVE-2012-17xx/CVE-2012-1768.json | 65 +- CVE-2012/CVE-2012-17xx/CVE-2012-1769.json | 65 +- CVE-2012/CVE-2012-17xx/CVE-2012-1770.json | 65 +- CVE-2012/CVE-2012-17xx/CVE-2012-1771.json | 65 +- CVE-2012/CVE-2012-17xx/CVE-2012-1772.json | 65 +- CVE-2012/CVE-2012-17xx/CVE-2012-1773.json | 65 +- CVE-2012/CVE-2012-17xx/CVE-2012-1774.json | 23 +- CVE-2012/CVE-2012-17xx/CVE-2012-1775.json | 34 +- CVE-2012/CVE-2012-17xx/CVE-2012-1776.json | 30 +- CVE-2012/CVE-2012-17xx/CVE-2012-1777.json | 45 +- CVE-2012/CVE-2012-17xx/CVE-2012-1778.json | 18 +- CVE-2012/CVE-2012-17xx/CVE-2012-1779.json | 33 +- CVE-2012/CVE-2012-17xx/CVE-2012-1780.json | 40 +- CVE-2012/CVE-2012-17xx/CVE-2012-1781.json | 33 +- CVE-2012/CVE-2012-17xx/CVE-2012-1782.json | 27 +- CVE-2012/CVE-2012-17xx/CVE-2012-1783.json | 18 +- CVE-2012/CVE-2012-17xx/CVE-2012-1784.json | 36 +- CVE-2012/CVE-2012-17xx/CVE-2012-1785.json | 33 +- CVE-2012/CVE-2012-17xx/CVE-2012-1786.json | 22 +- CVE-2012/CVE-2012-17xx/CVE-2012-1787.json | 43 +- CVE-2012/CVE-2012-17xx/CVE-2012-1788.json | 40 +- CVE-2012/CVE-2012-17xx/CVE-2012-1789.json | 19 +- CVE-2012/CVE-2012-17xx/CVE-2012-1790.json | 47 +- CVE-2012/CVE-2012-17xx/CVE-2012-1792.json | 16 +- CVE-2012/CVE-2012-17xx/CVE-2012-1795.json | 27 +- CVE-2012/CVE-2012-17xx/CVE-2012-1796.json | 29 +- CVE-2012/CVE-2012-17xx/CVE-2012-1797.json | 23 +- CVE-2012/CVE-2012-17xx/CVE-2012-1798.json | 111 +- CVE-2012/CVE-2012-17xx/CVE-2012-1799.json | 29 +- CVE-2012/CVE-2012-18xx/CVE-2012-1800.json | 29 +- CVE-2012/CVE-2012-18xx/CVE-2012-1801.json | 26 +- CVE-2012/CVE-2012-18xx/CVE-2012-1802.json | 25 +- CVE-2012/CVE-2012-18xx/CVE-2012-1803.json | 105 +- CVE-2012/CVE-2012-18xx/CVE-2012-1804.json | 28 +- CVE-2012/CVE-2012-18xx/CVE-2012-1805.json | 18 +- CVE-2012/CVE-2012-18xx/CVE-2012-1806.json | 18 +- CVE-2012/CVE-2012-18xx/CVE-2012-1807.json | 16 +- CVE-2012/CVE-2012-18xx/CVE-2012-1808.json | 18 +- CVE-2012/CVE-2012-18xx/CVE-2012-1809.json | 16 +- CVE-2012/CVE-2012-18xx/CVE-2012-1814.json | 26 +- CVE-2012/CVE-2012-18xx/CVE-2012-1815.json | 26 +- CVE-2012/CVE-2012-18xx/CVE-2012-1816.json | 26 +- CVE-2012/CVE-2012-18xx/CVE-2012-1817.json | 26 +- CVE-2012/CVE-2012-18xx/CVE-2012-1818.json | 26 +- CVE-2012/CVE-2012-18xx/CVE-2012-1819.json | 36 +- CVE-2012/CVE-2012-18xx/CVE-2012-1820.json | 34 +- CVE-2012/CVE-2012-18xx/CVE-2012-1821.json | 34 +- CVE-2012/CVE-2012-18xx/CVE-2012-1823.json | 269 +- CVE-2012/CVE-2012-18xx/CVE-2012-1824.json | 24 +- CVE-2012/CVE-2012-18xx/CVE-2012-1825.json | 23 +- CVE-2012/CVE-2012-18xx/CVE-2012-1826.json | 42 +- CVE-2012/CVE-2012-18xx/CVE-2012-1827.json | 29 +- CVE-2012/CVE-2012-18xx/CVE-2012-1828.json | 29 +- CVE-2012/CVE-2012-18xx/CVE-2012-1829.json | 29 +- CVE-2012/CVE-2012-18xx/CVE-2012-1830.json | 29 +- CVE-2012/CVE-2012-18xx/CVE-2012-1831.json | 25 +- CVE-2012/CVE-2012-18xx/CVE-2012-1832.json | 25 +- CVE-2012/CVE-2012-18xx/CVE-2012-1835.json | 30 +- CVE-2012/CVE-2012-18xx/CVE-2012-1836.json | 43 +- CVE-2012/CVE-2012-18xx/CVE-2012-1837.json | 19 +- CVE-2012/CVE-2012-18xx/CVE-2012-1838.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1839.json | 42 +- CVE-2012/CVE-2012-18xx/CVE-2012-1840.json | 26 +- CVE-2012/CVE-2012-18xx/CVE-2012-1841.json | 54 +- CVE-2012/CVE-2012-18xx/CVE-2012-1842.json | 58 +- CVE-2012/CVE-2012-18xx/CVE-2012-1843.json | 58 +- CVE-2012/CVE-2012-18xx/CVE-2012-1844.json | 57 +- CVE-2012/CVE-2012-18xx/CVE-2012-1845.json | 54 +- CVE-2012/CVE-2012-18xx/CVE-2012-1846.json | 52 +- CVE-2012/CVE-2012-18xx/CVE-2012-1847.json | 38 +- CVE-2012/CVE-2012-18xx/CVE-2012-1848.json | 30 +- CVE-2012/CVE-2012-18xx/CVE-2012-1849.json | 28 +- CVE-2012/CVE-2012-18xx/CVE-2012-1850.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1851.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1852.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1853.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1854.json | 26 +- CVE-2012/CVE-2012-18xx/CVE-2012-1855.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1856.json | 55 +- CVE-2012/CVE-2012-18xx/CVE-2012-1857.json | 18 +- CVE-2012/CVE-2012-18xx/CVE-2012-1858.json | 37 +- CVE-2012/CVE-2012-18xx/CVE-2012-1859.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1860.json | 15 +- CVE-2012/CVE-2012-18xx/CVE-2012-1861.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1862.json | 15 +- CVE-2012/CVE-2012-18xx/CVE-2012-1863.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1864.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1865.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1866.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1867.json | 28 +- CVE-2012/CVE-2012-18xx/CVE-2012-1868.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1870.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1872.json | 15 +- CVE-2012/CVE-2012-18xx/CVE-2012-1873.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1874.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1875.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1876.json | 38 +- CVE-2012/CVE-2012-18xx/CVE-2012-1877.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1878.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1879.json | 28 +- CVE-2012/CVE-2012-18xx/CVE-2012-1880.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1881.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1882.json | 15 +- CVE-2012/CVE-2012-18xx/CVE-2012-1888.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1889.json | 61 +- CVE-2012/CVE-2012-18xx/CVE-2012-1890.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1891.json | 28 +- CVE-2012/CVE-2012-18xx/CVE-2012-1892.json | 34 +- CVE-2012/CVE-2012-18xx/CVE-2012-1893.json | 22 +- CVE-2012/CVE-2012-18xx/CVE-2012-1894.json | 22 +- CVE-2012/CVE-2012-19xx/CVE-2012-1902.json | 43 +- CVE-2012/CVE-2012-19xx/CVE-2012-1904.json | 22 +- CVE-2012/CVE-2012-19xx/CVE-2012-1906.json | 58 +- CVE-2012/CVE-2012-19xx/CVE-2012-1907.json | 16 +- CVE-2012/CVE-2012-19xx/CVE-2012-1908.json | 16 +- CVE-2012/CVE-2012-19xx/CVE-2012-1909.json | 47 +- CVE-2012/CVE-2012-19xx/CVE-2012-1910.json | 29 +- CVE-2012/CVE-2012-19xx/CVE-2012-1911.json | 40 +- CVE-2012/CVE-2012-19xx/CVE-2012-1912.json | 72 +- CVE-2012/CVE-2012-19xx/CVE-2012-1916.json | 33 +- CVE-2012/CVE-2012-19xx/CVE-2012-1917.json | 29 +- CVE-2012/CVE-2012-19xx/CVE-2012-1918.json | 33 +- CVE-2012/CVE-2012-19xx/CVE-2012-1919.json | 29 +- CVE-2012/CVE-2012-19xx/CVE-2012-1920.json | 26 +- CVE-2012/CVE-2012-19xx/CVE-2012-1921.json | 17 +- CVE-2012/CVE-2012-19xx/CVE-2012-1923.json | 34 +- CVE-2012/CVE-2012-19xx/CVE-2012-1924.json | 42 +- CVE-2012/CVE-2012-19xx/CVE-2012-1925.json | 42 +- CVE-2012/CVE-2012-19xx/CVE-2012-1926.json | 39 +- CVE-2012/CVE-2012-19xx/CVE-2012-1927.json | 42 +- CVE-2012/CVE-2012-19xx/CVE-2012-1928.json | 42 +- CVE-2012/CVE-2012-19xx/CVE-2012-1929.json | 38 +- CVE-2012/CVE-2012-19xx/CVE-2012-1930.json | 30 +- CVE-2012/CVE-2012-19xx/CVE-2012-1931.json | 30 +- CVE-2012/CVE-2012-19xx/CVE-2012-1933.json | 54 +- CVE-2012/CVE-2012-19xx/CVE-2012-1934.json | 68 +- CVE-2012/CVE-2012-19xx/CVE-2012-1935.json | 77 +- CVE-2012/CVE-2012-19xx/CVE-2012-1936.json | 25 +- CVE-2012/CVE-2012-19xx/CVE-2012-1937.json | 70 +- CVE-2012/CVE-2012-19xx/CVE-2012-1938.json | 159 +- CVE-2012/CVE-2012-19xx/CVE-2012-1939.json | 38 +- CVE-2012/CVE-2012-19xx/CVE-2012-1940.json | 58 +- CVE-2012/CVE-2012-19xx/CVE-2012-1941.json | 42 +- CVE-2012/CVE-2012-19xx/CVE-2012-1942.json | 30 +- CVE-2012/CVE-2012-19xx/CVE-2012-1943.json | 30 +- CVE-2012/CVE-2012-19xx/CVE-2012-1944.json | 52 +- CVE-2012/CVE-2012-19xx/CVE-2012-1945.json | 42 +- CVE-2012/CVE-2012-19xx/CVE-2012-1946.json | 52 +- CVE-2012/CVE-2012-19xx/CVE-2012-1947.json | 50 +- CVE-2012/CVE-2012-19xx/CVE-2012-1948.json | 158 +- CVE-2012/CVE-2012-19xx/CVE-2012-1949.json | 138 +- CVE-2012/CVE-2012-19xx/CVE-2012-1950.json | 90 +- CVE-2012/CVE-2012-19xx/CVE-2012-1951.json | 106 +- CVE-2012/CVE-2012-19xx/CVE-2012-1952.json | 106 +- CVE-2012/CVE-2012-19xx/CVE-2012-1953.json | 106 +- CVE-2012/CVE-2012-19xx/CVE-2012-1954.json | 122 +- CVE-2012/CVE-2012-19xx/CVE-2012-1955.json | 106 +- CVE-2012/CVE-2012-19xx/CVE-2012-1956.json | 50 +- CVE-2012/CVE-2012-19xx/CVE-2012-1957.json | 106 +- CVE-2012/CVE-2012-19xx/CVE-2012-1958.json | 106 +- CVE-2012/CVE-2012-19xx/CVE-2012-1959.json | 110 +- CVE-2012/CVE-2012-19xx/CVE-2012-1960.json | 94 +- CVE-2012/CVE-2012-19xx/CVE-2012-1961.json | 106 +- CVE-2012/CVE-2012-19xx/CVE-2012-1962.json | 106 +- CVE-2012/CVE-2012-19xx/CVE-2012-1963.json | 106 +- CVE-2012/CVE-2012-19xx/CVE-2012-1964.json | 82 +- CVE-2012/CVE-2012-19xx/CVE-2012-1965.json | 74 +- CVE-2012/CVE-2012-19xx/CVE-2012-1966.json | 82 +- CVE-2012/CVE-2012-19xx/CVE-2012-1967.json | 122 +- CVE-2012/CVE-2012-19xx/CVE-2012-1968.json | 27 +- CVE-2012/CVE-2012-19xx/CVE-2012-1969.json | 23 +- CVE-2012/CVE-2012-19xx/CVE-2012-1970.json | 167 +- CVE-2012/CVE-2012-19xx/CVE-2012-1971.json | 98 +- CVE-2012/CVE-2012-19xx/CVE-2012-1972.json | 119 +- CVE-2012/CVE-2012-19xx/CVE-2012-1973.json | 119 +- CVE-2012/CVE-2012-19xx/CVE-2012-1974.json | 118 +- CVE-2012/CVE-2012-19xx/CVE-2012-1975.json | 119 +- CVE-2012/CVE-2012-19xx/CVE-2012-1976.json | 119 +- CVE-2012/CVE-2012-19xx/CVE-2012-1977.json | 21 +- CVE-2012/CVE-2012-19xx/CVE-2012-1979.json | 37 +- CVE-2012/CVE-2012-19xx/CVE-2012-1982.json | 18 +- CVE-2012/CVE-2012-19xx/CVE-2012-1984.json | 26 +- CVE-2012/CVE-2012-19xx/CVE-2012-1985.json | 26 +- CVE-2012/CVE-2012-19xx/CVE-2012-1986.json | 86 +- CVE-2012/CVE-2012-19xx/CVE-2012-1987.json | 104 +- CVE-2012/CVE-2012-19xx/CVE-2012-1988.json | 140 +- CVE-2012/CVE-2012-19xx/CVE-2012-1989.json | 63 +- CVE-2012/CVE-2012-19xx/CVE-2012-1990.json | 24 +- CVE-2012/CVE-2012-19xx/CVE-2012-1992.json | 15 +- CVE-2012/CVE-2012-19xx/CVE-2012-1993.json | 27 +- CVE-2012/CVE-2012-20xx/CVE-2012-2000.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2001.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2002.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2003.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2004.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2005.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2006.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2007.json | 40 +- CVE-2012/CVE-2012-20xx/CVE-2012-2008.json | 40 +- CVE-2012/CVE-2012-20xx/CVE-2012-2009.json | 40 +- CVE-2012/CVE-2012-20xx/CVE-2012-2010.json | 35 +- CVE-2012/CVE-2012-20xx/CVE-2012-2011.json | 32 +- CVE-2012/CVE-2012-20xx/CVE-2012-2012.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2013.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2014.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2015.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2016.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2017.json | 32 +- CVE-2012/CVE-2012-20xx/CVE-2012-2018.json | 32 +- CVE-2012/CVE-2012-20xx/CVE-2012-2019.json | 28 +- CVE-2012/CVE-2012-20xx/CVE-2012-2020.json | 28 +- CVE-2012/CVE-2012-20xx/CVE-2012-2021.json | 28 +- CVE-2012/CVE-2012-20xx/CVE-2012-2022.json | 28 +- CVE-2012/CVE-2012-20xx/CVE-2012-2023.json | 27 +- CVE-2012/CVE-2012-20xx/CVE-2012-2024.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2025.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2026.json | 27 +- CVE-2012/CVE-2012-20xx/CVE-2012-2027.json | 19 +- CVE-2012/CVE-2012-20xx/CVE-2012-2028.json | 27 +- CVE-2012/CVE-2012-20xx/CVE-2012-2029.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2030.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2031.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2032.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2033.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2034.json | 47 +- CVE-2012/CVE-2012-20xx/CVE-2012-2035.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2036.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2037.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2038.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2039.json | 39 +- CVE-2012/CVE-2012-20xx/CVE-2012-2040.json | 32 +- CVE-2012/CVE-2012-20xx/CVE-2012-2041.json | 17 +- CVE-2012/CVE-2012-20xx/CVE-2012-2042.json | 18 +- CVE-2012/CVE-2012-20xx/CVE-2012-2043.json | 17 +- CVE-2012/CVE-2012-20xx/CVE-2012-2044.json | 17 +- CVE-2012/CVE-2012-20xx/CVE-2012-2045.json | 17 +- CVE-2012/CVE-2012-20xx/CVE-2012-2046.json | 17 +- CVE-2012/CVE-2012-20xx/CVE-2012-2047.json | 17 +- CVE-2012/CVE-2012-20xx/CVE-2012-2048.json | 31 +- CVE-2012/CVE-2012-20xx/CVE-2012-2049.json | 23 +- CVE-2012/CVE-2012-20xx/CVE-2012-2050.json | 23 +- CVE-2012/CVE-2012-20xx/CVE-2012-2051.json | 23 +- CVE-2012/CVE-2012-20xx/CVE-2012-2053.json | 18 +- CVE-2012/CVE-2012-20xx/CVE-2012-2054.json | 21 +- CVE-2012/CVE-2012-20xx/CVE-2012-2055.json | 44 +- CVE-2012/CVE-2012-20xx/CVE-2012-2063.json | 44 +- CVE-2012/CVE-2012-20xx/CVE-2012-2064.json | 40 +- CVE-2012/CVE-2012-20xx/CVE-2012-2065.json | 58 +- CVE-2012/CVE-2012-20xx/CVE-2012-2066.json | 55 +- CVE-2012/CVE-2012-20xx/CVE-2012-2067.json | 59 +- CVE-2012/CVE-2012-20xx/CVE-2012-2068.json | 49 +- CVE-2012/CVE-2012-20xx/CVE-2012-2069.json | 62 +- CVE-2012/CVE-2012-20xx/CVE-2012-2070.json | 67 +- CVE-2012/CVE-2012-20xx/CVE-2012-2071.json | 45 +- CVE-2012/CVE-2012-20xx/CVE-2012-2072.json | 45 +- CVE-2012/CVE-2012-20xx/CVE-2012-2073.json | 49 +- CVE-2012/CVE-2012-20xx/CVE-2012-2074.json | 45 +- CVE-2012/CVE-2012-20xx/CVE-2012-2075.json | 53 +- CVE-2012/CVE-2012-20xx/CVE-2012-2076.json | 49 +- CVE-2012/CVE-2012-20xx/CVE-2012-2077.json | 45 +- CVE-2012/CVE-2012-20xx/CVE-2012-2080.json | 53 +- CVE-2012/CVE-2012-20xx/CVE-2012-2081.json | 42 +- CVE-2012/CVE-2012-20xx/CVE-2012-2082.json | 52 +- CVE-2012/CVE-2012-20xx/CVE-2012-2083.json | 37 +- CVE-2012/CVE-2012-20xx/CVE-2012-2085.json | 43 +- CVE-2012/CVE-2012-20xx/CVE-2012-2088.json | 58 +- CVE-2012/CVE-2012-20xx/CVE-2012-2089.json | 71 +- CVE-2012/CVE-2012-20xx/CVE-2012-2090.json | 50 +- CVE-2012/CVE-2012-20xx/CVE-2012-2091.json | 46 +- CVE-2012/CVE-2012-20xx/CVE-2012-2093.json | 58 +- CVE-2012/CVE-2012-20xx/CVE-2012-2094.json | 49 +- CVE-2012/CVE-2012-20xx/CVE-2012-2096.json | 54 +- CVE-2012/CVE-2012-20xx/CVE-2012-2097.json | 61 +- CVE-2012/CVE-2012-20xx/CVE-2012-2098.json | 130 +- CVE-2012/CVE-2012-21xx/CVE-2012-2100.json | 39 +- CVE-2012/CVE-2012-21xx/CVE-2012-2101.json | 61 +- CVE-2012/CVE-2012-21xx/CVE-2012-2102.json | 42 +- CVE-2012/CVE-2012-21xx/CVE-2012-2103.json | 43 +- CVE-2012/CVE-2012-21xx/CVE-2012-2104.json | 34 +- CVE-2012/CVE-2012-21xx/CVE-2012-2109.json | 46 +- CVE-2012/CVE-2012-21xx/CVE-2012-2110.json | 201 +- CVE-2012/CVE-2012-21xx/CVE-2012-2111.json | 103 +- CVE-2012/CVE-2012-21xx/CVE-2012-2112.json | 42 +- CVE-2012/CVE-2012-21xx/CVE-2012-2113.json | 61 +- CVE-2012/CVE-2012-21xx/CVE-2012-2114.json | 27 +- CVE-2012/CVE-2012-21xx/CVE-2012-2115.json | 53 +- CVE-2012/CVE-2012-21xx/CVE-2012-2116.json | 35 +- CVE-2012/CVE-2012-21xx/CVE-2012-2117.json | 41 +- CVE-2012/CVE-2012-21xx/CVE-2012-2118.json | 30 +- CVE-2012/CVE-2012-21xx/CVE-2012-2120.json | 21 +- CVE-2012/CVE-2012-21xx/CVE-2012-2121.json | 51 +- CVE-2012/CVE-2012-21xx/CVE-2012-2122.json | 66 +- CVE-2012/CVE-2012-21xx/CVE-2012-2123.json | 91 +- CVE-2012/CVE-2012-21xx/CVE-2012-2127.json | 67 +- CVE-2012/CVE-2012-21xx/CVE-2012-2128.json | 45 +- CVE-2012/CVE-2012-21xx/CVE-2012-2129.json | 54 +- CVE-2012/CVE-2012-21xx/CVE-2012-2131.json | 110 +- CVE-2012/CVE-2012-21xx/CVE-2012-2132.json | 35 +- CVE-2012/CVE-2012-21xx/CVE-2012-2133.json | 43 +- CVE-2012/CVE-2012-21xx/CVE-2012-2135.json | 67 +- CVE-2012/CVE-2012-21xx/CVE-2012-2136.json | 82 +- CVE-2012/CVE-2012-21xx/CVE-2012-2138.json | 19 +- CVE-2012/CVE-2012-21xx/CVE-2012-2139.json | 52 +- CVE-2012/CVE-2012-21xx/CVE-2012-2140.json | 62 +- CVE-2012/CVE-2012-21xx/CVE-2012-2141.json | 58 +- CVE-2012/CVE-2012-21xx/CVE-2012-2143.json | 197 +- CVE-2012/CVE-2012-21xx/CVE-2012-2144.json | 57 +- CVE-2012/CVE-2012-21xx/CVE-2012-2146.json | 36 +- CVE-2012/CVE-2012-21xx/CVE-2012-2147.json | 39 +- CVE-2012/CVE-2012-21xx/CVE-2012-2149.json | 76 +- CVE-2012/CVE-2012-21xx/CVE-2012-2151.json | 46 +- CVE-2012/CVE-2012-21xx/CVE-2012-2152.json | 27 +- CVE-2012/CVE-2012-21xx/CVE-2012-2154.json | 35 +- CVE-2012/CVE-2012-21xx/CVE-2012-2155.json | 35 +- CVE-2012/CVE-2012-21xx/CVE-2012-2156.json | 35 +- CVE-2012/CVE-2012-21xx/CVE-2012-2159.json | 25 +- CVE-2012/CVE-2012-21xx/CVE-2012-2161.json | 25 +- CVE-2012/CVE-2012-21xx/CVE-2012-2162.json | 22 +- CVE-2012/CVE-2012-21xx/CVE-2012-2163.json | 15 +- CVE-2012/CVE-2012-21xx/CVE-2012-2164.json | 25 +- CVE-2012/CVE-2012-21xx/CVE-2012-2165.json | 25 +- CVE-2012/CVE-2012-21xx/CVE-2012-2168.json | 25 +- CVE-2012/CVE-2012-21xx/CVE-2012-2169.json | 25 +- CVE-2012/CVE-2012-21xx/CVE-2012-2170.json | 22 +- CVE-2012/CVE-2012-21xx/CVE-2012-2171.json | 22 +- CVE-2012/CVE-2012-21xx/CVE-2012-2172.json | 25 +- CVE-2012/CVE-2012-21xx/CVE-2012-2173.json | 15 +- CVE-2012/CVE-2012-21xx/CVE-2012-2174.json | 15 +- CVE-2012/CVE-2012-21xx/CVE-2012-2175.json | 18 +- CVE-2012/CVE-2012-21xx/CVE-2012-2176.json | 26 +- CVE-2012/CVE-2012-21xx/CVE-2012-2179.json | 62 +- CVE-2012/CVE-2012-21xx/CVE-2012-2180.json | 37 +- CVE-2012/CVE-2012-21xx/CVE-2012-2181.json | 22 +- CVE-2012/CVE-2012-21xx/CVE-2012-2183.json | 34 +- CVE-2012/CVE-2012-21xx/CVE-2012-2184.json | 30 +- CVE-2012/CVE-2012-21xx/CVE-2012-2185.json | 30 +- CVE-2012/CVE-2012-21xx/CVE-2012-2186.json | 31 +- CVE-2012/CVE-2012-21xx/CVE-2012-2188.json | 34 +- CVE-2012/CVE-2012-21xx/CVE-2012-2190.json | 22 +- CVE-2012/CVE-2012-21xx/CVE-2012-2191.json | 35 +- CVE-2012/CVE-2012-21xx/CVE-2012-2192.json | 46 +- CVE-2012/CVE-2012-21xx/CVE-2012-2194.json | 42 +- CVE-2012/CVE-2012-21xx/CVE-2012-2196.json | 45 +- CVE-2012/CVE-2012-21xx/CVE-2012-2197.json | 42 +- CVE-2012/CVE-2012-22xx/CVE-2012-2200.json | 38 +- CVE-2012/CVE-2012-22xx/CVE-2012-2202.json | 26 +- CVE-2012/CVE-2012-22xx/CVE-2012-2203.json | 34 +- CVE-2012/CVE-2012-22xx/CVE-2012-2205.json | 25 +- CVE-2012/CVE-2012-22xx/CVE-2012-2206.json | 29 +- CVE-2012/CVE-2012-22xx/CVE-2012-2208.json | 55 +- CVE-2012/CVE-2012-22xx/CVE-2012-2209.json | 58 +- CVE-2012/CVE-2012-22xx/CVE-2012-2210.json | 31 +- CVE-2012/CVE-2012-22xx/CVE-2012-2212.json | 18 +- CVE-2012/CVE-2012-22xx/CVE-2012-2213.json | 30 +- CVE-2012/CVE-2012-22xx/CVE-2012-2214.json | 30 +- CVE-2012/CVE-2012-22xx/CVE-2012-2215.json | 33 +- CVE-2012/CVE-2012-22xx/CVE-2012-2217.json | 23 +- CVE-2012/CVE-2012-22xx/CVE-2012-2223.json | 26 +- CVE-2012/CVE-2012-22xx/CVE-2012-2224.json | 26 +- CVE-2012/CVE-2012-22xx/CVE-2012-2225.json | 15 +- CVE-2012/CVE-2012-22xx/CVE-2012-2227.json | 49 +- CVE-2012/CVE-2012-22xx/CVE-2012-2230.json | 19 +- CVE-2012/CVE-2012-22xx/CVE-2012-2234.json | 27 +- CVE-2012/CVE-2012-22xx/CVE-2012-2235.json | 16 +- CVE-2012/CVE-2012-22xx/CVE-2012-2236.json | 16 +- CVE-2012/CVE-2012-22xx/CVE-2012-2267.json | 30 +- CVE-2012/CVE-2012-22xx/CVE-2012-2268.json | 29 +- CVE-2012/CVE-2012-22xx/CVE-2012-2269.json | 65 +- CVE-2012/CVE-2012-22xx/CVE-2012-2270.json | 53 +- CVE-2012/CVE-2012-22xx/CVE-2012-2271.json | 22 +- CVE-2012/CVE-2012-22xx/CVE-2012-2273.json | 30 +- CVE-2012/CVE-2012-22xx/CVE-2012-2274.json | 30 +- CVE-2012/CVE-2012-22xx/CVE-2012-2276.json | 38 +- CVE-2012/CVE-2012-22xx/CVE-2012-2277.json | 35 +- CVE-2012/CVE-2012-22xx/CVE-2012-2278.json | 13 +- CVE-2012/CVE-2012-22xx/CVE-2012-2279.json | 13 +- CVE-2012/CVE-2012-22xx/CVE-2012-2280.json | 13 +- CVE-2012/CVE-2012-22xx/CVE-2012-2281.json | 15 +- CVE-2012/CVE-2012-22xx/CVE-2012-2282.json | 15 +- CVE-2012/CVE-2012-22xx/CVE-2012-2283.json | 16 +- CVE-2012/CVE-2012-22xx/CVE-2012-2285.json | 27 +- CVE-2012/CVE-2012-22xx/CVE-2012-2288.json | 19 +- CVE-2012/CVE-2012-22xx/CVE-2012-2289.json | 15 +- CVE-2012/CVE-2012-22xx/CVE-2012-2296.json | 45 +- CVE-2012/CVE-2012-22xx/CVE-2012-2297.json | 42 +- CVE-2012/CVE-2012-22xx/CVE-2012-2298.json | 61 +- CVE-2012/CVE-2012-22xx/CVE-2012-2299.json | 66 +- CVE-2012/CVE-2012-23xx/CVE-2012-2300.json | 66 +- CVE-2012/CVE-2012-23xx/CVE-2012-2302.json | 40 +- CVE-2012/CVE-2012-23xx/CVE-2012-2303.json | 54 +- CVE-2012/CVE-2012-23xx/CVE-2012-2304.json | 48 +- CVE-2012/CVE-2012-23xx/CVE-2012-2305.json | 24 +- CVE-2012/CVE-2012-23xx/CVE-2012-2306.json | 24 +- CVE-2012/CVE-2012-23xx/CVE-2012-2307.json | 24 +- CVE-2012/CVE-2012-23xx/CVE-2012-2308.json | 30 +- CVE-2012/CVE-2012-23xx/CVE-2012-2309.json | 24 +- CVE-2012/CVE-2012-23xx/CVE-2012-2310.json | 39 +- CVE-2012/CVE-2012-23xx/CVE-2012-2311.json | 97 +- CVE-2012/CVE-2012-23xx/CVE-2012-2313.json | 90 +- CVE-2012/CVE-2012-23xx/CVE-2012-2314.json | 38 +- CVE-2012/CVE-2012-23xx/CVE-2012-2315.json | 54 +- CVE-2012/CVE-2012-23xx/CVE-2012-2316.json | 55 +- CVE-2012/CVE-2012-23xx/CVE-2012-2317.json | 25 +- CVE-2012/CVE-2012-23xx/CVE-2012-2318.json | 47 +- CVE-2012/CVE-2012-23xx/CVE-2012-2319.json | 43 +- CVE-2012/CVE-2012-23xx/CVE-2012-2320.json | 58 +- CVE-2012/CVE-2012-23xx/CVE-2012-2321.json | 58 +- CVE-2012/CVE-2012-23xx/CVE-2012-2322.json | 54 +- CVE-2012/CVE-2012-23xx/CVE-2012-2324.json | 29 +- CVE-2012/CVE-2012-23xx/CVE-2012-2325.json | 29 +- CVE-2012/CVE-2012-23xx/CVE-2012-2326.json | 29 +- CVE-2012/CVE-2012-23xx/CVE-2012-2327.json | 29 +- CVE-2012/CVE-2012-23xx/CVE-2012-2329.json | 50 +- CVE-2012/CVE-2012-23xx/CVE-2012-2330.json | 46 +- CVE-2012/CVE-2012-23xx/CVE-2012-2331.json | 61 +- CVE-2012/CVE-2012-23xx/CVE-2012-2332.json | 46 +- CVE-2012/CVE-2012-23xx/CVE-2012-2333.json | 138 +- CVE-2012/CVE-2012-23xx/CVE-2012-2334.json | 121 +- CVE-2012/CVE-2012-23xx/CVE-2012-2335.json | 61 +- CVE-2012/CVE-2012-23xx/CVE-2012-2336.json | 56 +- CVE-2012/CVE-2012-23xx/CVE-2012-2337.json | 54 +- CVE-2012/CVE-2012-23xx/CVE-2012-2338.json | 35 +- CVE-2012/CVE-2012-23xx/CVE-2012-2339.json | 53 +- CVE-2012/CVE-2012-23xx/CVE-2012-2340.json | 52 +- CVE-2012/CVE-2012-23xx/CVE-2012-2341.json | 46 +- CVE-2012/CVE-2012-23xx/CVE-2012-2351.json | 51 +- CVE-2012/CVE-2012-23xx/CVE-2012-2352.json | 53 +- CVE-2012/CVE-2012-23xx/CVE-2012-2353.json | 17 +- CVE-2012/CVE-2012-23xx/CVE-2012-2354.json | 15 +- CVE-2012/CVE-2012-23xx/CVE-2012-2355.json | 17 +- CVE-2012/CVE-2012-23xx/CVE-2012-2356.json | 17 +- CVE-2012/CVE-2012-23xx/CVE-2012-2357.json | 15 +- CVE-2012/CVE-2012-23xx/CVE-2012-2358.json | 17 +- CVE-2012/CVE-2012-23xx/CVE-2012-2359.json | 15 +- CVE-2012/CVE-2012-23xx/CVE-2012-2360.json | 17 +- CVE-2012/CVE-2012-23xx/CVE-2012-2361.json | 17 +- CVE-2012/CVE-2012-23xx/CVE-2012-2362.json | 23 +- CVE-2012/CVE-2012-23xx/CVE-2012-2363.json | 17 +- CVE-2012/CVE-2012-23xx/CVE-2012-2364.json | 15 +- CVE-2012/CVE-2012-23xx/CVE-2012-2365.json | 23 +- CVE-2012/CVE-2012-23xx/CVE-2012-2366.json | 17 +- CVE-2012/CVE-2012-23xx/CVE-2012-2367.json | 27 +- CVE-2012/CVE-2012-23xx/CVE-2012-2368.json | 32 +- CVE-2012/CVE-2012-23xx/CVE-2012-2369.json | 26 +- CVE-2012/CVE-2012-23xx/CVE-2012-2370.json | 71 +- CVE-2012/CVE-2012-23xx/CVE-2012-2371.json | 42 +- CVE-2012/CVE-2012-23xx/CVE-2012-2373.json | 42 +- CVE-2012/CVE-2012-23xx/CVE-2012-2374.json | 30 +- CVE-2012/CVE-2012-23xx/CVE-2012-2375.json | 39 +- CVE-2012/CVE-2012-23xx/CVE-2012-2376.json | 34 +- CVE-2012/CVE-2012-23xx/CVE-2012-2380.json | 13 +- CVE-2012/CVE-2012-23xx/CVE-2012-2381.json | 13 +- CVE-2012/CVE-2012-23xx/CVE-2012-2383.json | 43 +- CVE-2012/CVE-2012-23xx/CVE-2012-2384.json | 38 +- CVE-2012/CVE-2012-23xx/CVE-2012-2385.json | 54 +- CVE-2012/CVE-2012-23xx/CVE-2012-2386.json | 72 +- CVE-2012/CVE-2012-23xx/CVE-2012-2387.json | 21 +- CVE-2012/CVE-2012-23xx/CVE-2012-2388.json | 63 +- CVE-2012/CVE-2012-23xx/CVE-2012-2389.json | 35 +- CVE-2012/CVE-2012-23xx/CVE-2012-2390.json | 39 +- CVE-2012/CVE-2012-23xx/CVE-2012-2392.json | 58 +- CVE-2012/CVE-2012-23xx/CVE-2012-2393.json | 57 +- CVE-2012/CVE-2012-23xx/CVE-2012-2394.json | 49 +- CVE-2012/CVE-2012-23xx/CVE-2012-2395.json | 47 +- CVE-2012/CVE-2012-23xx/CVE-2012-2396.json | 26 +- CVE-2012/CVE-2012-23xx/CVE-2012-2397.json | 27 +- CVE-2012/CVE-2012-23xx/CVE-2012-2398.json | 28 +- CVE-2012/CVE-2012-23xx/CVE-2012-2399.json | 71 +- CVE-2012/CVE-2012-24xx/CVE-2012-2400.json | 39 +- CVE-2012/CVE-2012-24xx/CVE-2012-2401.json | 54 +- CVE-2012/CVE-2012-24xx/CVE-2012-2402.json | 47 +- CVE-2012/CVE-2012-24xx/CVE-2012-2403.json | 51 +- CVE-2012/CVE-2012-24xx/CVE-2012-2404.json | 47 +- CVE-2012/CVE-2012-24xx/CVE-2012-2405.json | 22 +- CVE-2012/CVE-2012-24xx/CVE-2012-2406.json | 30 +- CVE-2012/CVE-2012-24xx/CVE-2012-2407.json | 18 +- CVE-2012/CVE-2012-24xx/CVE-2012-2408.json | 18 +- CVE-2012/CVE-2012-24xx/CVE-2012-2409.json | 18 +- CVE-2012/CVE-2012-24xx/CVE-2012-2411.json | 27 +- CVE-2012/CVE-2012-24xx/CVE-2012-2414.json | 47 +- CVE-2012/CVE-2012-24xx/CVE-2012-2415.json | 47 +- CVE-2012/CVE-2012-24xx/CVE-2012-2416.json | 43 +- CVE-2012/CVE-2012-24xx/CVE-2012-2417.json | 70 +- CVE-2012/CVE-2012-24xx/CVE-2012-2418.json | 29 +- CVE-2012/CVE-2012-24xx/CVE-2012-2419.json | 25 +- CVE-2012/CVE-2012-24xx/CVE-2012-2420.json | 29 +- CVE-2012/CVE-2012-24xx/CVE-2012-2421.json | 22 +- CVE-2012/CVE-2012-24xx/CVE-2012-2422.json | 25 +- CVE-2012/CVE-2012-24xx/CVE-2012-2423.json | 25 +- CVE-2012/CVE-2012-24xx/CVE-2012-2424.json | 36 +- CVE-2012/CVE-2012-24xx/CVE-2012-2425.json | 36 +- CVE-2012/CVE-2012-24xx/CVE-2012-2426.json | 17 +- CVE-2012/CVE-2012-24xx/CVE-2012-2427.json | 17 +- CVE-2012/CVE-2012-24xx/CVE-2012-2428.json | 17 +- CVE-2012/CVE-2012-24xx/CVE-2012-2429.json | 17 +- CVE-2012/CVE-2012-24xx/CVE-2012-2435.json | 24 +- CVE-2012/CVE-2012-24xx/CVE-2012-2436.json | 65 +- CVE-2012/CVE-2012-24xx/CVE-2012-2439.json | 16 +- CVE-2012/CVE-2012-24xx/CVE-2012-2440.json | 18 +- CVE-2012/CVE-2012-24xx/CVE-2012-2441.json | 65 +- CVE-2012/CVE-2012-24xx/CVE-2012-2442.json | 36 +- CVE-2012/CVE-2012-24xx/CVE-2012-2446.json | 23 +- CVE-2012/CVE-2012-24xx/CVE-2012-2447.json | 23 +- CVE-2012/CVE-2012-24xx/CVE-2012-2448.json | 30 +- CVE-2012/CVE-2012-24xx/CVE-2012-2449.json | 35 +- CVE-2012/CVE-2012-24xx/CVE-2012-2450.json | 38 +- CVE-2012/CVE-2012-24xx/CVE-2012-2451.json | 58 +- CVE-2012/CVE-2012-24xx/CVE-2012-2459.json | 24 +- CVE-2012/CVE-2012-24xx/CVE-2012-2469.json | 22 +- CVE-2012/CVE-2012-24xx/CVE-2012-2472.json | 16 +- CVE-2012/CVE-2012-24xx/CVE-2012-2474.json | 16 +- CVE-2012/CVE-2012-24xx/CVE-2012-2486.json | 37 +- CVE-2012/CVE-2012-24xx/CVE-2012-2488.json | 30 +- CVE-2012/CVE-2012-24xx/CVE-2012-2490.json | 16 +- CVE-2012/CVE-2012-24xx/CVE-2012-2493.json | 16 +- CVE-2012/CVE-2012-24xx/CVE-2012-2494.json | 16 +- CVE-2012/CVE-2012-24xx/CVE-2012-2495.json | 16 +- CVE-2012/CVE-2012-24xx/CVE-2012-2496.json | 16 +- CVE-2012/CVE-2012-24xx/CVE-2012-2498.json | 16 +- CVE-2012/CVE-2012-24xx/CVE-2012-2499.json | 16 +- CVE-2012/CVE-2012-25xx/CVE-2012-2500.json | 16 +- CVE-2012/CVE-2012-25xx/CVE-2012-2511.json | 30 +- CVE-2012/CVE-2012-25xx/CVE-2012-2512.json | 30 +- CVE-2012/CVE-2012-25xx/CVE-2012-2513.json | 30 +- CVE-2012/CVE-2012-25xx/CVE-2012-2514.json | 30 +- CVE-2012/CVE-2012-25xx/CVE-2012-2515.json | 59 +- CVE-2012/CVE-2012-25xx/CVE-2012-2516.json | 23 +- CVE-2012/CVE-2012-25xx/CVE-2012-2521.json | 23 +- CVE-2012/CVE-2012-25xx/CVE-2012-2522.json | 23 +- CVE-2012/CVE-2012-25xx/CVE-2012-2523.json | 27 +- CVE-2012/CVE-2012-25xx/CVE-2012-2524.json | 23 +- CVE-2012/CVE-2012-25xx/CVE-2012-2526.json | 23 +- CVE-2012/CVE-2012-25xx/CVE-2012-2527.json | 23 +- CVE-2012/CVE-2012-25xx/CVE-2012-2536.json | 26 +- CVE-2012/CVE-2012-25xx/CVE-2012-2559.json | 16 +- CVE-2012/CVE-2012-25xx/CVE-2012-2560.json | 24 +- CVE-2012/CVE-2012-25xx/CVE-2012-2561.json | 42 +- CVE-2012/CVE-2012-25xx/CVE-2012-2562.json | 30 +- CVE-2012/CVE-2012-25xx/CVE-2012-2563.json | 22 +- CVE-2012/CVE-2012-25xx/CVE-2012-2564.json | 25 +- CVE-2012/CVE-2012-25xx/CVE-2012-2565.json | 25 +- CVE-2012/CVE-2012-25xx/CVE-2012-2566.json | 25 +- CVE-2012/CVE-2012-25xx/CVE-2012-2567.json | 30 +- CVE-2012/CVE-2012-25xx/CVE-2012-2568.json | 40 +- CVE-2012/CVE-2012-25xx/CVE-2012-2570.json | 36 +- CVE-2012/CVE-2012-25xx/CVE-2012-2571.json | 16 +- CVE-2012/CVE-2012-25xx/CVE-2012-2573.json | 16 +- CVE-2012/CVE-2012-25xx/CVE-2012-2574.json | 23 +- CVE-2012/CVE-2012-25xx/CVE-2012-2577.json | 39 +- CVE-2012/CVE-2012-25xx/CVE-2012-2582.json | 34 +- CVE-2012/CVE-2012-25xx/CVE-2012-2584.json | 29 +- CVE-2012/CVE-2012-25xx/CVE-2012-2585.json | 16 +- CVE-2012/CVE-2012-25xx/CVE-2012-2587.json | 16 +- CVE-2012/CVE-2012-25xx/CVE-2012-2590.json | 16 +- CVE-2012/CVE-2012-25xx/CVE-2012-2595.json | 23 +- CVE-2012/CVE-2012-25xx/CVE-2012-2596.json | 23 +- CVE-2012/CVE-2012-25xx/CVE-2012-2597.json | 23 +- CVE-2012/CVE-2012-25xx/CVE-2012-2598.json | 23 +- CVE-2012/CVE-2012-26xx/CVE-2012-2601.json | 43 +- CVE-2012/CVE-2012-26xx/CVE-2012-2602.json | 45 +- CVE-2012/CVE-2012-26xx/CVE-2012-2603.json | 23 +- CVE-2012/CVE-2012-26xx/CVE-2012-2604.json | 27 +- CVE-2012/CVE-2012-26xx/CVE-2012-2605.json | 27 +- CVE-2012/CVE-2012-26xx/CVE-2012-2606.json | 24 +- CVE-2012/CVE-2012-26xx/CVE-2012-2607.json | 20 +- CVE-2012/CVE-2012-26xx/CVE-2012-2611.json | 26 +- CVE-2012/CVE-2012-26xx/CVE-2012-2612.json | 30 +- CVE-2012/CVE-2012-26xx/CVE-2012-2614.json | 34 +- CVE-2012/CVE-2012-26xx/CVE-2012-2626.json | 25 +- CVE-2012/CVE-2012-26xx/CVE-2012-2627.json | 23 +- CVE-2012/CVE-2012-26xx/CVE-2012-2630.json | 17 +- CVE-2012/CVE-2012-26xx/CVE-2012-2631.json | 21 +- CVE-2012/CVE-2012-26xx/CVE-2012-2632.json | 24 +- CVE-2012/CVE-2012-26xx/CVE-2012-2633.json | 33 +- CVE-2012/CVE-2012-26xx/CVE-2012-2634.json | 17 +- CVE-2012/CVE-2012-26xx/CVE-2012-2635.json | 17 +- CVE-2012/CVE-2012-26xx/CVE-2012-2636.json | 21 +- CVE-2012/CVE-2012-26xx/CVE-2012-2637.json | 21 +- CVE-2012/CVE-2012-26xx/CVE-2012-2638.json | 24 +- CVE-2012/CVE-2012-26xx/CVE-2012-2640.json | 33 +- CVE-2012/CVE-2012-26xx/CVE-2012-2641.json | 21 +- CVE-2012/CVE-2012-26xx/CVE-2012-2642.json | 21 +- CVE-2012/CVE-2012-26xx/CVE-2012-2643.json | 21 +- CVE-2012/CVE-2012-26xx/CVE-2012-2644.json | 21 +- CVE-2012/CVE-2012-26xx/CVE-2012-2645.json | 30 +- CVE-2012/CVE-2012-26xx/CVE-2012-2646.json | 39 +- CVE-2012/CVE-2012-26xx/CVE-2012-2647.json | 17 +- CVE-2012/CVE-2012-26xx/CVE-2012-2648.json | 17 +- CVE-2012/CVE-2012-26xx/CVE-2012-2649.json | 25 +- CVE-2012/CVE-2012-26xx/CVE-2012-2652.json | 42 +- CVE-2012/CVE-2012-26xx/CVE-2012-2653.json | 47 +- CVE-2012/CVE-2012-26xx/CVE-2012-2654.json | 60 +- CVE-2012/CVE-2012-26xx/CVE-2012-2655.json | 54 +- CVE-2012/CVE-2012-26xx/CVE-2012-2657.json | 38 +- CVE-2012/CVE-2012-26xx/CVE-2012-2658.json | 38 +- CVE-2012/CVE-2012-26xx/CVE-2012-2660.json | 38 +- CVE-2012/CVE-2012-26xx/CVE-2012-2661.json | 30 +- CVE-2012/CVE-2012-26xx/CVE-2012-2662.json | 44 +- CVE-2012/CVE-2012-26xx/CVE-2012-2664.json | 30 +- CVE-2012/CVE-2012-26xx/CVE-2012-2665.json | 126 +- CVE-2012/CVE-2012-26xx/CVE-2012-2667.json | 41 +- CVE-2012/CVE-2012-26xx/CVE-2012-2668.json | 67 +- CVE-2012/CVE-2012-26xx/CVE-2012-2670.json | 39 +- CVE-2012/CVE-2012-26xx/CVE-2012-2671.json | 39 +- CVE-2012/CVE-2012-26xx/CVE-2012-2672.json | 53 +- CVE-2012/CVE-2012-26xx/CVE-2012-2673.json | 85 +- CVE-2012/CVE-2012-26xx/CVE-2012-2674.json | 29 +- CVE-2012/CVE-2012-26xx/CVE-2012-2675.json | 41 +- CVE-2012/CVE-2012-26xx/CVE-2012-2676.json | 25 +- CVE-2012/CVE-2012-26xx/CVE-2012-2677.json | 47 +- CVE-2012/CVE-2012-26xx/CVE-2012-2678.json | 56 +- CVE-2012/CVE-2012-26xx/CVE-2012-2687.json | 190 +- CVE-2012/CVE-2012-26xx/CVE-2012-2688.json | 63 +- CVE-2012/CVE-2012-26xx/CVE-2012-2690.json | 37 +- CVE-2012/CVE-2012-26xx/CVE-2012-2691.json | 78 +- CVE-2012/CVE-2012-26xx/CVE-2012-2692.json | 54 +- CVE-2012/CVE-2012-26xx/CVE-2012-2693.json | 30 +- CVE-2012/CVE-2012-26xx/CVE-2012-2694.json | 38 +- CVE-2012/CVE-2012-26xx/CVE-2012-2695.json | 34 +- CVE-2012/CVE-2012-26xx/CVE-2012-2698.json | 69 +- CVE-2012/CVE-2012-27xx/CVE-2012-2702.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2703.json | 38 +- CVE-2012/CVE-2012-27xx/CVE-2012-2704.json | 37 +- CVE-2012/CVE-2012-27xx/CVE-2012-2705.json | 52 +- CVE-2012/CVE-2012-27xx/CVE-2012-2706.json | 26 +- CVE-2012/CVE-2012-27xx/CVE-2012-2707.json | 45 +- CVE-2012/CVE-2012-27xx/CVE-2012-2708.json | 45 +- CVE-2012/CVE-2012-27xx/CVE-2012-2710.json | 34 +- CVE-2012/CVE-2012-27xx/CVE-2012-2711.json | 56 +- CVE-2012/CVE-2012-27xx/CVE-2012-2712.json | 53 +- CVE-2012/CVE-2012-27xx/CVE-2012-2713.json | 56 +- CVE-2012/CVE-2012-27xx/CVE-2012-2715.json | 56 +- CVE-2012/CVE-2012-27xx/CVE-2012-2716.json | 49 +- CVE-2012/CVE-2012-27xx/CVE-2012-2717.json | 60 +- CVE-2012/CVE-2012-27xx/CVE-2012-2718.json | 26 +- CVE-2012/CVE-2012-27xx/CVE-2012-2719.json | 39 +- CVE-2012/CVE-2012-27xx/CVE-2012-2720.json | 42 +- CVE-2012/CVE-2012-27xx/CVE-2012-2721.json | 53 +- CVE-2012/CVE-2012-27xx/CVE-2012-2722.json | 68 +- CVE-2012/CVE-2012-27xx/CVE-2012-2723.json | 53 +- CVE-2012/CVE-2012-27xx/CVE-2012-2725.json | 49 +- CVE-2012/CVE-2012-27xx/CVE-2012-2726.json | 64 +- CVE-2012/CVE-2012-27xx/CVE-2012-2727.json | 52 +- CVE-2012/CVE-2012-27xx/CVE-2012-2728.json | 42 +- CVE-2012/CVE-2012-27xx/CVE-2012-2729.json | 34 +- CVE-2012/CVE-2012-27xx/CVE-2012-2730.json | 45 +- CVE-2012/CVE-2012-27xx/CVE-2012-2731.json | 41 +- CVE-2012/CVE-2012-27xx/CVE-2012-2737.json | 81 +- CVE-2012/CVE-2012-27xx/CVE-2012-2738.json | 50 +- CVE-2012/CVE-2012-27xx/CVE-2012-2740.json | 55 +- CVE-2012/CVE-2012-27xx/CVE-2012-2741.json | 51 +- CVE-2012/CVE-2012-27xx/CVE-2012-2742.json | 35 +- CVE-2012/CVE-2012-27xx/CVE-2012-2743.json | 35 +- CVE-2012/CVE-2012-27xx/CVE-2012-2744.json | 50 +- CVE-2012/CVE-2012-27xx/CVE-2012-2745.json | 62 +- CVE-2012/CVE-2012-27xx/CVE-2012-2746.json | 77 +- CVE-2012/CVE-2012-27xx/CVE-2012-2747.json | 61 +- CVE-2012/CVE-2012-27xx/CVE-2012-2748.json | 38 +- CVE-2012/CVE-2012-27xx/CVE-2012-2749.json | 43 +- CVE-2012/CVE-2012-27xx/CVE-2012-2750.json | 55 +- CVE-2012/CVE-2012-27xx/CVE-2012-2751.json | 125 +- CVE-2012/CVE-2012-27xx/CVE-2012-2752.json | 42 +- CVE-2012/CVE-2012-27xx/CVE-2012-2753.json | 25 +- CVE-2012/CVE-2012-27xx/CVE-2012-2759.json | 31 +- CVE-2012/CVE-2012-27xx/CVE-2012-2760.json | 50 +- CVE-2012/CVE-2012-27xx/CVE-2012-2762.json | 45 +- CVE-2012/CVE-2012-27xx/CVE-2012-2763.json | 77 +- CVE-2012/CVE-2012-27xx/CVE-2012-2764.json | 22 +- CVE-2012/CVE-2012-27xx/CVE-2012-2768.json | 34 +- CVE-2012/CVE-2012-27xx/CVE-2012-2769.json | 30 +- CVE-2012/CVE-2012-27xx/CVE-2012-2770.json | 30 +- CVE-2012/CVE-2012-27xx/CVE-2012-2772.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2774.json | 31 +- CVE-2012/CVE-2012-27xx/CVE-2012-2775.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2776.json | 43 +- CVE-2012/CVE-2012-27xx/CVE-2012-2777.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2779.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2782.json | 31 +- CVE-2012/CVE-2012-27xx/CVE-2012-2783.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2784.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2785.json | 35 +- CVE-2012/CVE-2012-27xx/CVE-2012-2786.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2787.json | 43 +- CVE-2012/CVE-2012-27xx/CVE-2012-2788.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2789.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2790.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2791.json | 43 +- CVE-2012/CVE-2012-27xx/CVE-2012-2792.json | 31 +- CVE-2012/CVE-2012-27xx/CVE-2012-2793.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2794.json | 47 +- CVE-2012/CVE-2012-27xx/CVE-2012-2795.json | 39 +- CVE-2012/CVE-2012-27xx/CVE-2012-2796.json | 43 +- CVE-2012/CVE-2012-27xx/CVE-2012-2797.json | 39 +- CVE-2012/CVE-2012-27xx/CVE-2012-2798.json | 55 +- CVE-2012/CVE-2012-27xx/CVE-2012-2799.json | 31 +- CVE-2012/CVE-2012-28xx/CVE-2012-2800.json | 47 +- CVE-2012/CVE-2012-28xx/CVE-2012-2801.json | 55 +- CVE-2012/CVE-2012-28xx/CVE-2012-2802.json | 51 +- CVE-2012/CVE-2012-28xx/CVE-2012-2803.json | 47 +- CVE-2012/CVE-2012-28xx/CVE-2012-2804.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2806.json | 87 +- CVE-2012/CVE-2012-28xx/CVE-2012-2807.json | 79 +- CVE-2012/CVE-2012-28xx/CVE-2012-2812.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2813.json | 35 +- CVE-2012/CVE-2012-28xx/CVE-2012-2814.json | 43 +- CVE-2012/CVE-2012-28xx/CVE-2012-2815.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2816.json | 27 +- CVE-2012/CVE-2012-28xx/CVE-2012-2817.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2818.json | 47 +- CVE-2012/CVE-2012-28xx/CVE-2012-2819.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2820.json | 23 +- CVE-2012/CVE-2012-28xx/CVE-2012-2821.json | 23 +- CVE-2012/CVE-2012-28xx/CVE-2012-2822.json | 15 +- CVE-2012/CVE-2012-28xx/CVE-2012-2823.json | 23 +- CVE-2012/CVE-2012-28xx/CVE-2012-2824.json | 31 +- CVE-2012/CVE-2012-28xx/CVE-2012-2825.json | 47 +- CVE-2012/CVE-2012-28xx/CVE-2012-2826.json | 23 +- CVE-2012/CVE-2012-28xx/CVE-2012-2827.json | 15 +- CVE-2012/CVE-2012-28xx/CVE-2012-2828.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2829.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2830.json | 23 +- CVE-2012/CVE-2012-28xx/CVE-2012-2831.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2832.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2833.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2834.json | 23 +- CVE-2012/CVE-2012-28xx/CVE-2012-2836.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2837.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2840.json | 35 +- CVE-2012/CVE-2012-28xx/CVE-2012-2841.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2842.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2843.json | 39 +- CVE-2012/CVE-2012-28xx/CVE-2012-2844.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2845.json | 23 +- CVE-2012/CVE-2012-28xx/CVE-2012-2846.json | 15 +- CVE-2012/CVE-2012-28xx/CVE-2012-2847.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2848.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2849.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2850.json | 51 +- CVE-2012/CVE-2012-28xx/CVE-2012-2851.json | 27 +- CVE-2012/CVE-2012-28xx/CVE-2012-2852.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2853.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2854.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2855.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2856.json | 23 +- CVE-2012/CVE-2012-28xx/CVE-2012-2857.json | 31 +- CVE-2012/CVE-2012-28xx/CVE-2012-2858.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2859.json | 15 +- CVE-2012/CVE-2012-28xx/CVE-2012-2860.json | 19 +- CVE-2012/CVE-2012-28xx/CVE-2012-2862.json | 27 +- CVE-2012/CVE-2012-28xx/CVE-2012-2863.json | 23 +- CVE-2012/CVE-2012-28xx/CVE-2012-2864.json | 31 +- CVE-2012/CVE-2012-28xx/CVE-2012-2865.json | 27 +- CVE-2012/CVE-2012-28xx/CVE-2012-2866.json | 31 +- CVE-2012/CVE-2012-28xx/CVE-2012-2867.json | 31 +- CVE-2012/CVE-2012-28xx/CVE-2012-2868.json | 31 +- CVE-2012/CVE-2012-28xx/CVE-2012-2869.json | 31 +- CVE-2012/CVE-2012-28xx/CVE-2012-2870.json | 79 +- CVE-2012/CVE-2012-28xx/CVE-2012-2871.json | 71 +- CVE-2012/CVE-2012-28xx/CVE-2012-2872.json | 31 +- CVE-2012/CVE-2012-29xx/CVE-2012-2901.json | 33 +- CVE-2012/CVE-2012-29xx/CVE-2012-2902.json | 41 +- CVE-2012/CVE-2012-29xx/CVE-2012-2903.json | 39 +- CVE-2012/CVE-2012-29xx/CVE-2012-2904.json | 53 +- CVE-2012/CVE-2012-29xx/CVE-2012-2905.json | 36 +- CVE-2012/CVE-2012-29xx/CVE-2012-2906.json | 37 +- CVE-2012/CVE-2012-29xx/CVE-2012-2907.json | 45 +- CVE-2012/CVE-2012-29xx/CVE-2012-2908.json | 32 +- CVE-2012/CVE-2012-29xx/CVE-2012-2909.json | 29 +- CVE-2012/CVE-2012-29xx/CVE-2012-2910.json | 23 +- CVE-2012/CVE-2012-29xx/CVE-2012-2911.json | 29 +- CVE-2012/CVE-2012-29xx/CVE-2012-2912.json | 25 +- CVE-2012/CVE-2012-29xx/CVE-2012-2913.json | 25 +- CVE-2012/CVE-2012-29xx/CVE-2012-2914.json | 22 +- CVE-2012/CVE-2012-29xx/CVE-2012-2915.json | 26 +- CVE-2012/CVE-2012-29xx/CVE-2012-2916.json | 34 +- CVE-2012/CVE-2012-29xx/CVE-2012-2917.json | 25 +- CVE-2012/CVE-2012-29xx/CVE-2012-2918.json | 25 +- CVE-2012/CVE-2012-29xx/CVE-2012-2919.json | 22 +- CVE-2012/CVE-2012-29xx/CVE-2012-2920.json | 34 +- CVE-2012/CVE-2012-29xx/CVE-2012-2921.json | 39 +- CVE-2012/CVE-2012-29xx/CVE-2012-2922.json | 50 +- CVE-2012/CVE-2012-29xx/CVE-2012-2923.json | 30 +- CVE-2012/CVE-2012-29xx/CVE-2012-2924.json | 29 +- CVE-2012/CVE-2012-29xx/CVE-2012-2925.json | 18 +- CVE-2012/CVE-2012-29xx/CVE-2012-2926.json | 93 +- CVE-2012/CVE-2012-29xx/CVE-2012-2927.json | 34 +- CVE-2012/CVE-2012-29xx/CVE-2012-2928.json | 56 +- CVE-2012/CVE-2012-29xx/CVE-2012-2935.json | 15 +- CVE-2012/CVE-2012-29xx/CVE-2012-2936.json | 45 +- CVE-2012/CVE-2012-29xx/CVE-2012-2937.json | 49 +- CVE-2012/CVE-2012-29xx/CVE-2012-2938.json | 34 +- CVE-2012/CVE-2012-29xx/CVE-2012-2939.json | 34 +- CVE-2012/CVE-2012-29xx/CVE-2012-2940.json | 25 +- CVE-2012/CVE-2012-29xx/CVE-2012-2941.json | 22 +- CVE-2012/CVE-2012-29xx/CVE-2012-2942.json | 58 +- CVE-2012/CVE-2012-29xx/CVE-2012-2943.json | 19 +- CVE-2012/CVE-2012-29xx/CVE-2012-2944.json | 57 +- CVE-2012/CVE-2012-29xx/CVE-2012-2947.json | 45 +- CVE-2012/CVE-2012-29xx/CVE-2012-2948.json | 35 +- CVE-2012/CVE-2012-29xx/CVE-2012-2949.json | 19 +- CVE-2012/CVE-2012-29xx/CVE-2012-2952.json | 37 +- CVE-2012/CVE-2012-29xx/CVE-2012-2953.json | 22 +- CVE-2012/CVE-2012-29xx/CVE-2012-2955.json | 34 +- CVE-2012/CVE-2012-29xx/CVE-2012-2957.json | 23 +- CVE-2012/CVE-2012-29xx/CVE-2012-2959.json | 17 +- CVE-2012/CVE-2012-29xx/CVE-2012-2960.json | 26 +- CVE-2012/CVE-2012-29xx/CVE-2012-2961.json | 26 +- CVE-2012/CVE-2012-29xx/CVE-2012-2962.json | 72 +- CVE-2012/CVE-2012-29xx/CVE-2012-2963.json | 24 +- CVE-2012/CVE-2012-29xx/CVE-2012-2964.json | 27 +- CVE-2012/CVE-2012-29xx/CVE-2012-2965.json | 28 +- CVE-2012/CVE-2012-29xx/CVE-2012-2966.json | 28 +- CVE-2012/CVE-2012-29xx/CVE-2012-2967.json | 28 +- CVE-2012/CVE-2012-29xx/CVE-2012-2968.json | 28 +- CVE-2012/CVE-2012-29xx/CVE-2012-2969.json | 28 +- CVE-2012/CVE-2012-29xx/CVE-2012-2970.json | 16 +- CVE-2012/CVE-2012-29xx/CVE-2012-2974.json | 18 +- CVE-2012/CVE-2012-29xx/CVE-2012-2975.json | 20 +- CVE-2012/CVE-2012-29xx/CVE-2012-2976.json | 19 +- CVE-2012/CVE-2012-29xx/CVE-2012-2977.json | 19 +- CVE-2012/CVE-2012-29xx/CVE-2012-2978.json | 41 +- CVE-2012/CVE-2012-29xx/CVE-2012-2980.json | 24 +- CVE-2012/CVE-2012-29xx/CVE-2012-2981.json | 38 +- CVE-2012/CVE-2012-29xx/CVE-2012-2982.json | 39 +- CVE-2012/CVE-2012-29xx/CVE-2012-2983.json | 35 +- CVE-2012/CVE-2012-29xx/CVE-2012-2984.json | 19 +- CVE-2012/CVE-2012-29xx/CVE-2012-2985.json | 16 +- CVE-2012/CVE-2012-29xx/CVE-2012-2986.json | 16 +- CVE-2012/CVE-2012-29xx/CVE-2012-2990.json | 21 +- CVE-2012/CVE-2012-30xx/CVE-2012-3003.json | 23 +- CVE-2012/CVE-2012-30xx/CVE-2012-3004.json | 20 +- CVE-2012/CVE-2012-30xx/CVE-2012-3005.json | 20 +- CVE-2012/CVE-2012-30xx/CVE-2012-3006.json | 32 +- CVE-2012/CVE-2012-30xx/CVE-2012-3007.json | 22 +- CVE-2012/CVE-2012-30xx/CVE-2012-3008.json | 30 +- CVE-2012/CVE-2012-30xx/CVE-2012-3009.json | 23 +- CVE-2012/CVE-2012-30xx/CVE-2012-3012.json | 20 +- CVE-2012/CVE-2012-30xx/CVE-2012-3013.json | 23 +- CVE-2012/CVE-2012-30xx/CVE-2012-3014.json | 27 +- CVE-2012/CVE-2012-30xx/CVE-2012-3015.json | 27 +- CVE-2012/CVE-2012-30xx/CVE-2012-3016.json | 26 +- CVE-2012/CVE-2012-30xx/CVE-2012-3017.json | 25 +- CVE-2012/CVE-2012-30xx/CVE-2012-3018.json | 16 +- CVE-2012/CVE-2012-30xx/CVE-2012-3020.json | 20 +- CVE-2012/CVE-2012-30xx/CVE-2012-3024.json | 27 +- CVE-2012/CVE-2012-30xx/CVE-2012-3025.json | 27 +- CVE-2012/CVE-2012-30xx/CVE-2012-3053.json | 16 +- CVE-2012/CVE-2012-30xx/CVE-2012-3054.json | 16 +- CVE-2012/CVE-2012-30xx/CVE-2012-3055.json | 16 +- CVE-2012/CVE-2012-30xx/CVE-2012-3056.json | 16 +- CVE-2012/CVE-2012-30xx/CVE-2012-3057.json | 16 +- CVE-2012/CVE-2012-30xx/CVE-2012-3058.json | 18 +- CVE-2012/CVE-2012-30xx/CVE-2012-3063.json | 18 +- CVE-2012/CVE-2012-30xx/CVE-2012-3073.json | 30 +- CVE-2012/CVE-2012-30xx/CVE-2012-3074.json | 16 +- CVE-2012/CVE-2012-30xx/CVE-2012-3075.json | 16 +- CVE-2012/CVE-2012-30xx/CVE-2012-3076.json | 16 +- CVE-2012/CVE-2012-31xx/CVE-2012-3105.json | 22 +- CVE-2012/CVE-2012-31xx/CVE-2012-3106.json | 65 +- CVE-2012/CVE-2012-31xx/CVE-2012-3107.json | 69 +- CVE-2012/CVE-2012-31xx/CVE-2012-3108.json | 69 +- CVE-2012/CVE-2012-31xx/CVE-2012-3109.json | 69 +- CVE-2012/CVE-2012-31xx/CVE-2012-3110.json | 69 +- CVE-2012/CVE-2012-31xx/CVE-2012-3111.json | 38 +- CVE-2012/CVE-2012-31xx/CVE-2012-3112.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3113.json | 38 +- CVE-2012/CVE-2012-31xx/CVE-2012-3114.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3115.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3116.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3117.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3118.json | 38 +- CVE-2012/CVE-2012-31xx/CVE-2012-3119.json | 38 +- CVE-2012/CVE-2012-31xx/CVE-2012-3120.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3121.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3122.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3123.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3124.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3125.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3126.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3127.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3128.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3129.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3130.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3131.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3132.json | 45 +- CVE-2012/CVE-2012-31xx/CVE-2012-3134.json | 34 +- CVE-2012/CVE-2012-31xx/CVE-2012-3135.json | 30 +- CVE-2012/CVE-2012-31xx/CVE-2012-3136.json | 38 +- CVE-2012/CVE-2012-32xx/CVE-2012-3231.json | 23 +- CVE-2012/CVE-2012-32xx/CVE-2012-3232.json | 23 +- CVE-2012/CVE-2012-32xx/CVE-2012-3236.json | 89 +- CVE-2012/CVE-2012-32xx/CVE-2012-3238.json | 27 +- CVE-2012/CVE-2012-32xx/CVE-2012-3240.json | 30 +- CVE-2012/CVE-2012-32xx/CVE-2012-3241.json | 30 +- CVE-2012/CVE-2012-32xx/CVE-2012-3247.json | 32 +- CVE-2012/CVE-2012-32xx/CVE-2012-3248.json | 32 +- CVE-2012/CVE-2012-32xx/CVE-2012-3249.json | 19 +- CVE-2012/CVE-2012-32xx/CVE-2012-3250.json | 28 +- CVE-2012/CVE-2012-32xx/CVE-2012-3251.json | 28 +- CVE-2012/CVE-2012-32xx/CVE-2012-3252.json | 32 +- CVE-2012/CVE-2012-32xx/CVE-2012-3253.json | 32 +- CVE-2012/CVE-2012-32xx/CVE-2012-3254.json | 32 +- CVE-2012/CVE-2012-32xx/CVE-2012-3255.json | 32 +- CVE-2012/CVE-2012-32xx/CVE-2012-3256.json | 32 +- CVE-2012/CVE-2012-32xx/CVE-2012-3257.json | 32 +- CVE-2012/CVE-2012-32xx/CVE-2012-3287.json | 18 +- CVE-2012/CVE-2012-32xx/CVE-2012-3288.json | 18 +- CVE-2012/CVE-2012-32xx/CVE-2012-3289.json | 16 +- CVE-2012/CVE-2012-32xx/CVE-2012-3290.json | 16 +- CVE-2012/CVE-2012-32xx/CVE-2012-3291.json | 31 +- CVE-2012/CVE-2012-32xx/CVE-2012-3292.json | 27 +- CVE-2012/CVE-2012-32xx/CVE-2012-3293.json | 30 +- CVE-2012/CVE-2012-32xx/CVE-2012-3294.json | 33 +- CVE-2012/CVE-2012-32xx/CVE-2012-3295.json | 22 +- CVE-2012/CVE-2012-32xx/CVE-2012-3296.json | 50 +- CVE-2012/CVE-2012-33xx/CVE-2012-3301.json | 19 +- CVE-2012/CVE-2012-33xx/CVE-2012-3302.json | 22 +- CVE-2012/CVE-2012-33xx/CVE-2012-3308.json | 26 +- CVE-2012/CVE-2012-33xx/CVE-2012-3309.json | 30 +- CVE-2012/CVE-2012-33xx/CVE-2012-3312.json | 26 +- CVE-2012/CVE-2012-33xx/CVE-2012-3313.json | 26 +- CVE-2012/CVE-2012-33xx/CVE-2012-3325.json | 38 +- CVE-2012/CVE-2012-33xx/CVE-2012-3326.json | 26 +- CVE-2012/CVE-2012-33xx/CVE-2012-3343.json | 20 +- CVE-2012/CVE-2012-33xx/CVE-2012-3345.json | 15 +- CVE-2012/CVE-2012-33xx/CVE-2012-3347.json | 25 +- CVE-2012/CVE-2012-33xx/CVE-2012-3350.json | 56 +- CVE-2012/CVE-2012-33xx/CVE-2012-3355.json | 47 +- CVE-2012/CVE-2012-33xx/CVE-2012-3356.json | 67 +- CVE-2012/CVE-2012-33xx/CVE-2012-3357.json | 43 +- CVE-2012/CVE-2012-33xx/CVE-2012-3358.json | 42 +- CVE-2012/CVE-2012-33xx/CVE-2012-3360.json | 53 +- CVE-2012/CVE-2012-33xx/CVE-2012-3361.json | 65 +- CVE-2012/CVE-2012-33xx/CVE-2012-3362.json | 34 +- CVE-2012/CVE-2012-33xx/CVE-2012-3365.json | 47 +- CVE-2012/CVE-2012-33xx/CVE-2012-3366.json | 44 +- CVE-2012/CVE-2012-33xx/CVE-2012-3367.json | 46 +- CVE-2012/CVE-2012-33xx/CVE-2012-3368.json | 38 +- CVE-2012/CVE-2012-33xx/CVE-2012-3371.json | 40 +- CVE-2012/CVE-2012-33xx/CVE-2012-3372.json | 26 +- CVE-2012/CVE-2012-33xx/CVE-2012-3374.json | 42 +- CVE-2012/CVE-2012-33xx/CVE-2012-3376.json | 19 +- CVE-2012/CVE-2012-33xx/CVE-2012-3377.json | 38 +- CVE-2012/CVE-2012-33xx/CVE-2012-3378.json | 25 +- CVE-2012/CVE-2012-33xx/CVE-2012-3380.json | 39 +- CVE-2012/CVE-2012-33xx/CVE-2012-3381.json | 29 +- CVE-2012/CVE-2012-33xx/CVE-2012-3382.json | 31 +- CVE-2012/CVE-2012-33xx/CVE-2012-3383.json | 35 +- CVE-2012/CVE-2012-33xx/CVE-2012-3384.json | 21 +- CVE-2012/CVE-2012-33xx/CVE-2012-3385.json | 21 +- CVE-2012/CVE-2012-33xx/CVE-2012-3386.json | 60 +- CVE-2012/CVE-2012-33xx/CVE-2012-3387.json | 27 +- CVE-2012/CVE-2012-33xx/CVE-2012-3388.json | 27 +- CVE-2012/CVE-2012-33xx/CVE-2012-3389.json | 27 +- CVE-2012/CVE-2012-33xx/CVE-2012-3390.json | 30 +- CVE-2012/CVE-2012-33xx/CVE-2012-3391.json | 27 +- CVE-2012/CVE-2012-33xx/CVE-2012-3392.json | 27 +- CVE-2012/CVE-2012-33xx/CVE-2012-3393.json | 27 +- CVE-2012/CVE-2012-33xx/CVE-2012-3394.json | 27 +- CVE-2012/CVE-2012-33xx/CVE-2012-3395.json | 27 +- CVE-2012/CVE-2012-33xx/CVE-2012-3396.json | 27 +- CVE-2012/CVE-2012-33xx/CVE-2012-3397.json | 27 +- CVE-2012/CVE-2012-33xx/CVE-2012-3398.json | 31 +- CVE-2012/CVE-2012-33xx/CVE-2012-3399.json | 41 +- CVE-2012/CVE-2012-34xx/CVE-2012-3401.json | 85 +- CVE-2012/CVE-2012-34xx/CVE-2012-3402.json | 61 +- CVE-2012/CVE-2012-34xx/CVE-2012-3403.json | 97 +- CVE-2012/CVE-2012-34xx/CVE-2012-3408.json | 32 +- CVE-2012/CVE-2012-34xx/CVE-2012-3410.json | 57 +- CVE-2012/CVE-2012-34xx/CVE-2012-3413.json | 48 +- CVE-2012/CVE-2012-34xx/CVE-2012-3416.json | 49 +- CVE-2012/CVE-2012-34xx/CVE-2012-3417.json | 39 +- CVE-2012/CVE-2012-34xx/CVE-2012-3418.json | 127 +- CVE-2012/CVE-2012-34xx/CVE-2012-3419.json | 47 +- CVE-2012/CVE-2012-34xx/CVE-2012-3420.json | 63 +- CVE-2012/CVE-2012-34xx/CVE-2012-3421.json | 51 +- CVE-2012/CVE-2012-34xx/CVE-2012-3422.json | 66 +- CVE-2012/CVE-2012-34xx/CVE-2012-3423.json | 93 +- CVE-2012/CVE-2012-34xx/CVE-2012-3424.json | 23 +- CVE-2012/CVE-2012-34xx/CVE-2012-3425.json | 52 +- CVE-2012/CVE-2012-34xx/CVE-2012-3426.json | 80 +- CVE-2012/CVE-2012-34xx/CVE-2012-3429.json | 56 +- CVE-2012/CVE-2012-34xx/CVE-2012-3434.json | 51 +- CVE-2012/CVE-2012-34xx/CVE-2012-3435.json | 64 +- CVE-2012/CVE-2012-34xx/CVE-2012-3437.json | 54 +- CVE-2012/CVE-2012-34xx/CVE-2012-3438.json | 49 +- CVE-2012/CVE-2012-34xx/CVE-2012-3440.json | 26 +- CVE-2012/CVE-2012-34xx/CVE-2012-3441.json | 39 +- CVE-2012/CVE-2012-34xx/CVE-2012-3442.json | 35 +- CVE-2012/CVE-2012-34xx/CVE-2012-3443.json | 35 +- CVE-2012/CVE-2012-34xx/CVE-2012-3444.json | 35 +- CVE-2012/CVE-2012-34xx/CVE-2012-3445.json | 50 +- CVE-2012/CVE-2012-34xx/CVE-2012-3447.json | 47 +- CVE-2012/CVE-2012-34xx/CVE-2012-3448.json | 58 +- CVE-2012/CVE-2012-34xx/CVE-2012-3449.json | 35 +- CVE-2012/CVE-2012-34xx/CVE-2012-3450.json | 47 +- CVE-2012/CVE-2012-34xx/CVE-2012-3452.json | 21 +- CVE-2012/CVE-2012-34xx/CVE-2012-3453.json | 21 +- CVE-2012/CVE-2012-34xx/CVE-2012-3454.json | 17 +- CVE-2012/CVE-2012-34xx/CVE-2012-3455.json | 58 +- CVE-2012/CVE-2012-34xx/CVE-2012-3456.json | 73 +- CVE-2012/CVE-2012-34xx/CVE-2012-3457.json | 31 +- CVE-2012/CVE-2012-34xx/CVE-2012-3461.json | 71 +- CVE-2012/CVE-2012-34xx/CVE-2012-3463.json | 22 +- CVE-2012/CVE-2012-34xx/CVE-2012-3464.json | 26 +- CVE-2012/CVE-2012-34xx/CVE-2012-3465.json | 26 +- CVE-2012/CVE-2012-34xx/CVE-2012-3467.json | 50 +- CVE-2012/CVE-2012-34xx/CVE-2012-3468.json | 37 +- CVE-2012/CVE-2012-34xx/CVE-2012-3469.json | 45 +- CVE-2012/CVE-2012-34xx/CVE-2012-3470.json | 21 +- CVE-2012/CVE-2012-34xx/CVE-2012-3471.json | 21 +- CVE-2012/CVE-2012-34xx/CVE-2012-3472.json | 21 +- CVE-2012/CVE-2012-34xx/CVE-2012-3473.json | 28 +- CVE-2012/CVE-2012-34xx/CVE-2012-3474.json | 21 +- CVE-2012/CVE-2012-34xx/CVE-2012-3475.json | 27 +- CVE-2012/CVE-2012-34xx/CVE-2012-3476.json | 21 +- CVE-2012/CVE-2012-34xx/CVE-2012-3477.json | 20 +- CVE-2012/CVE-2012-34xx/CVE-2012-3478.json | 46 +- CVE-2012/CVE-2012-34xx/CVE-2012-3479.json | 61 +- CVE-2012/CVE-2012-34xx/CVE-2012-3480.json | 74 +- CVE-2012/CVE-2012-34xx/CVE-2012-3481.json | 110 +- CVE-2012/CVE-2012-34xx/CVE-2012-3483.json | 25 +- CVE-2012/CVE-2012-34xx/CVE-2012-3484.json | 21 +- CVE-2012/CVE-2012-34xx/CVE-2012-3485.json | 27 +- CVE-2012/CVE-2012-34xx/CVE-2012-3486.json | 21 +- CVE-2012/CVE-2012-34xx/CVE-2012-3487.json | 21 +- CVE-2012/CVE-2012-35xx/CVE-2012-3501.json | 55 +- CVE-2012/CVE-2012-35xx/CVE-2012-3502.json | 78 +- CVE-2012/CVE-2012-35xx/CVE-2012-3503.json | 60 +- CVE-2012/CVE-2012-35xx/CVE-2012-3507.json | 43 +- CVE-2012/CVE-2012-35xx/CVE-2012-3508.json | 43 +- CVE-2012/CVE-2012-35xx/CVE-2012-3509.json | 64 +- CVE-2012/CVE-2012-35xx/CVE-2012-3514.json | 30 +- CVE-2012/CVE-2012-35xx/CVE-2012-3517.json | 42 +- CVE-2012/CVE-2012-35xx/CVE-2012-3518.json | 39 +- CVE-2012/CVE-2012-35xx/CVE-2012-3519.json | 39 +- CVE-2012/CVE-2012-35xx/CVE-2012-3525.json | 65 +- CVE-2012/CVE-2012-35xx/CVE-2012-3526.json | 42 +- CVE-2012/CVE-2012-35xx/CVE-2012-3527.json | 52 +- CVE-2012/CVE-2012-35xx/CVE-2012-3528.json | 37 +- CVE-2012/CVE-2012-35xx/CVE-2012-3529.json | 34 +- CVE-2012/CVE-2012-35xx/CVE-2012-3530.json | 41 +- CVE-2012/CVE-2012-35xx/CVE-2012-3531.json | 26 +- CVE-2012/CVE-2012-35xx/CVE-2012-3533.json | 42 +- CVE-2012/CVE-2012-35xx/CVE-2012-3534.json | 69 +- CVE-2012/CVE-2012-35xx/CVE-2012-3535.json | 65 +- CVE-2012/CVE-2012-35xx/CVE-2012-3537.json | 58 +- CVE-2012/CVE-2012-35xx/CVE-2012-3540.json | 54 +- CVE-2012/CVE-2012-35xx/CVE-2012-3542.json | 55 +- CVE-2012/CVE-2012-35xx/CVE-2012-3548.json | 39 +- CVE-2012/CVE-2012-35xx/CVE-2012-3551.json | 40 +- CVE-2012/CVE-2012-35xx/CVE-2012-3553.json | 20 +- CVE-2012/CVE-2012-35xx/CVE-2012-3554.json | 24 +- CVE-2012/CVE-2012-35xx/CVE-2012-3555.json | 32 +- CVE-2012/CVE-2012-35xx/CVE-2012-3556.json | 32 +- CVE-2012/CVE-2012-35xx/CVE-2012-3557.json | 32 +- CVE-2012/CVE-2012-35xx/CVE-2012-3558.json | 32 +- CVE-2012/CVE-2012-35xx/CVE-2012-3559.json | 13 +- CVE-2012/CVE-2012-35xx/CVE-2012-3560.json | 36 +- CVE-2012/CVE-2012-35xx/CVE-2012-3561.json | 30 +- CVE-2012/CVE-2012-35xx/CVE-2012-3562.json | 15 +- CVE-2012/CVE-2012-35xx/CVE-2012-3563.json | 18 +- CVE-2012/CVE-2012-35xx/CVE-2012-3564.json | 15 +- CVE-2012/CVE-2012-35xx/CVE-2012-3565.json | 15 +- CVE-2012/CVE-2012-35xx/CVE-2012-3566.json | 15 +- CVE-2012/CVE-2012-35xx/CVE-2012-3567.json | 15 +- CVE-2012/CVE-2012-35xx/CVE-2012-3568.json | 15 +- CVE-2012/CVE-2012-35xx/CVE-2012-3570.json | 30 +- CVE-2012/CVE-2012-35xx/CVE-2012-3571.json | 102 +- CVE-2012/CVE-2012-35xx/CVE-2012-3572.json | 17 +- CVE-2012/CVE-2012-35xx/CVE-2012-3574.json | 39 +- CVE-2012/CVE-2012-35xx/CVE-2012-3575.json | 29 +- CVE-2012/CVE-2012-35xx/CVE-2012-3576.json | 33 +- CVE-2012/CVE-2012-35xx/CVE-2012-3577.json | 43 +- CVE-2012/CVE-2012-35xx/CVE-2012-3578.json | 39 +- CVE-2012/CVE-2012-35xx/CVE-2012-3579.json | 26 +- CVE-2012/CVE-2012-35xx/CVE-2012-3580.json | 22 +- CVE-2012/CVE-2012-35xx/CVE-2012-3581.json | 20 +- CVE-2012/CVE-2012-35xx/CVE-2012-3582.json | 22 +- CVE-2012/CVE-2012-35xx/CVE-2012-3585.json | 17 +- CVE-2012/CVE-2012-35xx/CVE-2012-3587.json | 25 +- CVE-2012/CVE-2012-35xx/CVE-2012-3588.json | 32 +- CVE-2012/CVE-2012-35xx/CVE-2012-3589.json | 37 +- CVE-2012/CVE-2012-35xx/CVE-2012-3590.json | 37 +- CVE-2012/CVE-2012-35xx/CVE-2012-3591.json | 37 +- CVE-2012/CVE-2012-35xx/CVE-2012-3592.json | 37 +- CVE-2012/CVE-2012-35xx/CVE-2012-3593.json | 37 +- CVE-2012/CVE-2012-35xx/CVE-2012-3594.json | 37 +- CVE-2012/CVE-2012-35xx/CVE-2012-3595.json | 37 +- CVE-2012/CVE-2012-35xx/CVE-2012-3596.json | 37 +- CVE-2012/CVE-2012-35xx/CVE-2012-3597.json | 37 +- CVE-2012/CVE-2012-35xx/CVE-2012-3599.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3600.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3603.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3604.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3605.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3608.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3609.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3610.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3611.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3615.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3618.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3620.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3625.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3626.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3627.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3628.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3629.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3630.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3631.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3633.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3634.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3635.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3636.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3637.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3638.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3639.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3640.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3641.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3642.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3644.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3645.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3646.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3650.json | 33 +- CVE-2012/CVE-2012-36xx/CVE-2012-3653.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3655.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3656.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3661.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3663.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3664.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3665.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3666.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3667.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3668.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3669.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3670.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3674.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3678.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3679.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3680.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3681.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3682.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3683.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3686.json | 37 +- CVE-2012/CVE-2012-36xx/CVE-2012-3689.json | 23 +- CVE-2012/CVE-2012-36xx/CVE-2012-3690.json | 23 +- CVE-2012/CVE-2012-36xx/CVE-2012-3691.json | 29 +- CVE-2012/CVE-2012-36xx/CVE-2012-3693.json | 33 +- CVE-2012/CVE-2012-36xx/CVE-2012-3694.json | 23 +- CVE-2012/CVE-2012-36xx/CVE-2012-3695.json | 33 +- CVE-2012/CVE-2012-36xx/CVE-2012-3696.json | 33 +- CVE-2012/CVE-2012-36xx/CVE-2012-3697.json | 23 +- CVE-2012/CVE-2012-36xx/CVE-2012-3698.json | 16 +- CVE-2012/CVE-2012-37xx/CVE-2012-3789.json | 16 +- CVE-2012/CVE-2012-37xx/CVE-2012-3790.json | 41 +- CVE-2012/CVE-2012-37xx/CVE-2012-3791.json | 37 +- CVE-2012/CVE-2012-37xx/CVE-2012-3792.json | 37 +- CVE-2012/CVE-2012-37xx/CVE-2012-3793.json | 41 +- CVE-2012/CVE-2012-37xx/CVE-2012-3794.json | 41 +- CVE-2012/CVE-2012-37xx/CVE-2012-3795.json | 37 +- CVE-2012/CVE-2012-37xx/CVE-2012-3796.json | 37 +- CVE-2012/CVE-2012-37xx/CVE-2012-3797.json | 34 +- CVE-2012/CVE-2012-37xx/CVE-2012-3798.json | 35 +- CVE-2012/CVE-2012-37xx/CVE-2012-3799.json | 53 +- CVE-2012/CVE-2012-38xx/CVE-2012-3800.json | 53 +- CVE-2012/CVE-2012-38xx/CVE-2012-3802.json | 27 +- CVE-2012/CVE-2012-38xx/CVE-2012-3805.json | 38 +- CVE-2012/CVE-2012-38xx/CVE-2012-3811.json | 24 +- CVE-2012/CVE-2012-38xx/CVE-2012-3812.json | 34 +- CVE-2012/CVE-2012-38xx/CVE-2012-3814.json | 24 +- CVE-2012/CVE-2012-38xx/CVE-2012-3815.json | 59 +- CVE-2012/CVE-2012-38xx/CVE-2012-3816.json | 36 +- CVE-2012/CVE-2012-38xx/CVE-2012-3817.json | 58 +- CVE-2012/CVE-2012-38xx/CVE-2012-3818.json | 17 +- CVE-2012/CVE-2012-38xx/CVE-2012-3825.json | 40 +- CVE-2012/CVE-2012-38xx/CVE-2012-3826.json | 33 +- CVE-2012/CVE-2012-38xx/CVE-2012-3828.json | 19 +- CVE-2012/CVE-2012-38xx/CVE-2012-3829.json | 16 +- CVE-2012/CVE-2012-38xx/CVE-2012-3830.json | 49 +- CVE-2012/CVE-2012-38xx/CVE-2012-3831.json | 19 +- CVE-2012/CVE-2012-38xx/CVE-2012-3832.json | 17 +- CVE-2012/CVE-2012-38xx/CVE-2012-3833.json | 32 +- CVE-2012/CVE-2012-38xx/CVE-2012-3834.json | 46 +- CVE-2012/CVE-2012-38xx/CVE-2012-3835.json | 46 +- CVE-2012/CVE-2012-38xx/CVE-2012-3836.json | 38 +- CVE-2012/CVE-2012-38xx/CVE-2012-3837.json | 38 +- CVE-2012/CVE-2012-38xx/CVE-2012-3838.json | 27 +- CVE-2012/CVE-2012-38xx/CVE-2012-3839.json | 40 +- CVE-2012/CVE-2012-38xx/CVE-2012-3840.json | 32 +- CVE-2012/CVE-2012-38xx/CVE-2012-3841.json | 26 +- CVE-2012/CVE-2012-38xx/CVE-2012-3842.json | 24 +- CVE-2012/CVE-2012-38xx/CVE-2012-3843.json | 23 +- CVE-2012/CVE-2012-38xx/CVE-2012-3844.json | 23 +- CVE-2012/CVE-2012-38xx/CVE-2012-3845.json | 29 +- CVE-2012/CVE-2012-38xx/CVE-2012-3846.json | 30 +- CVE-2012/CVE-2012-38xx/CVE-2012-3847.json | 18 +- CVE-2012/CVE-2012-38xx/CVE-2012-3848.json | 25 +- CVE-2012/CVE-2012-38xx/CVE-2012-3859.json | 13 +- CVE-2012/CVE-2012-38xx/CVE-2012-3863.json | 37 +- CVE-2012/CVE-2012-38xx/CVE-2012-3864.json | 54 +- CVE-2012/CVE-2012-38xx/CVE-2012-3865.json | 54 +- CVE-2012/CVE-2012-38xx/CVE-2012-3866.json | 42 +- CVE-2012/CVE-2012-38xx/CVE-2012-3867.json | 79 +- CVE-2012/CVE-2012-38xx/CVE-2012-3868.json | 18 +- CVE-2012/CVE-2012-38xx/CVE-2012-3869.json | 41 +- CVE-2012/CVE-2012-38xx/CVE-2012-3881.json | 17 +- CVE-2012/CVE-2012-38xx/CVE-2012-3884.json | 23 +- CVE-2012/CVE-2012-38xx/CVE-2012-3885.json | 23 +- CVE-2012/CVE-2012-38xx/CVE-2012-3886.json | 23 +- CVE-2012/CVE-2012-38xx/CVE-2012-3887.json | 23 +- CVE-2012/CVE-2012-38xx/CVE-2012-3888.json | 23 +- CVE-2012/CVE-2012-38xx/CVE-2012-3889.json | 26 +- CVE-2012/CVE-2012-38xx/CVE-2012-3890.json | 26 +- CVE-2012/CVE-2012-39xx/CVE-2012-3951.json | 24 +- CVE-2012/CVE-2012-39xx/CVE-2012-3952.json | 44 +- CVE-2012/CVE-2012-39xx/CVE-2012-3953.json | 40 +- CVE-2012/CVE-2012-39xx/CVE-2012-3954.json | 89 +- CVE-2012/CVE-2012-39xx/CVE-2012-3956.json | 98 +- CVE-2012/CVE-2012-39xx/CVE-2012-3957.json | 98 +- CVE-2012/CVE-2012-39xx/CVE-2012-3958.json | 58 +- CVE-2012/CVE-2012-39xx/CVE-2012-3959.json | 119 +- CVE-2012/CVE-2012-39xx/CVE-2012-3960.json | 98 +- CVE-2012/CVE-2012-39xx/CVE-2012-3961.json | 99 +- CVE-2012/CVE-2012-39xx/CVE-2012-3962.json | 66 +- CVE-2012/CVE-2012-39xx/CVE-2012-3963.json | 98 +- CVE-2012/CVE-2012-39xx/CVE-2012-3964.json | 58 +- CVE-2012/CVE-2012-39xx/CVE-2012-3965.json | 39 +- CVE-2012/CVE-2012-39xx/CVE-2012-3966.json | 58 +- CVE-2012/CVE-2012-39xx/CVE-2012-3967.json | 93 +- CVE-2012/CVE-2012-39xx/CVE-2012-3968.json | 98 +- CVE-2012/CVE-2012-39xx/CVE-2012-3969.json | 70 +- CVE-2012/CVE-2012-39xx/CVE-2012-3970.json | 58 +- CVE-2012/CVE-2012-39xx/CVE-2012-3971.json | 50 +- CVE-2012/CVE-2012-39xx/CVE-2012-3972.json | 111 +- CVE-2012/CVE-2012-39xx/CVE-2012-3973.json | 50 +- CVE-2012/CVE-2012-39xx/CVE-2012-3974.json | 38 +- CVE-2012/CVE-2012-39xx/CVE-2012-3975.json | 46 +- CVE-2012/CVE-2012-39xx/CVE-2012-3976.json | 91 +- CVE-2012/CVE-2012-39xx/CVE-2012-3978.json | 70 +- CVE-2012/CVE-2012-39xx/CVE-2012-3979.json | 30 +- CVE-2012/CVE-2012-39xx/CVE-2012-3980.json | 58 +- CVE-2012/CVE-2012-39xx/CVE-2012-3981.json | 35 +- CVE-2012/CVE-2012-39xx/CVE-2012-3996.json | 55 +- CVE-2012/CVE-2012-39xx/CVE-2012-3997.json | 29 +- CVE-2012/CVE-2012-39xx/CVE-2012-3998.json | 29 +- CVE-2012/CVE-2012-39xx/CVE-2012-3999.json | 15 +- CVE-2012/CVE-2012-40xx/CVE-2012-4000.json | 36 +- CVE-2012/CVE-2012-40xx/CVE-2012-4004.json | 25 +- CVE-2012/CVE-2012-40xx/CVE-2012-4005.json | 24 +- CVE-2012/CVE-2012-40xx/CVE-2012-4006.json | 23 +- CVE-2012/CVE-2012-40xx/CVE-2012-4007.json | 17 +- CVE-2012/CVE-2012-40xx/CVE-2012-4008.json | 21 +- CVE-2012/CVE-2012-40xx/CVE-2012-4009.json | 21 +- CVE-2012/CVE-2012-40xx/CVE-2012-4010.json | 21 +- CVE-2012/CVE-2012-40xx/CVE-2012-4011.json | 24 +- CVE-2012/CVE-2012-40xx/CVE-2012-4012.json | 21 +- CVE-2012/CVE-2012-40xx/CVE-2012-4024.json | 66 +- CVE-2012/CVE-2012-40xx/CVE-2012-4025.json | 59 +- CVE-2012/CVE-2012-40xx/CVE-2012-4026.json | 20 +- CVE-2012/CVE-2012-40xx/CVE-2012-4027.json | 24 +- CVE-2012/CVE-2012-40xx/CVE-2012-4028.json | 24 +- CVE-2012/CVE-2012-40xx/CVE-2012-4031.json | 36 +- CVE-2012/CVE-2012-40xx/CVE-2012-4032.json | 43 +- CVE-2012/CVE-2012-40xx/CVE-2012-4033.json | 26 +- CVE-2012/CVE-2012-40xx/CVE-2012-4034.json | 51 +- CVE-2012/CVE-2012-40xx/CVE-2012-4035.json | 51 +- CVE-2012/CVE-2012-40xx/CVE-2012-4036.json | 53 +- CVE-2012/CVE-2012-40xx/CVE-2012-4037.json | 51 +- CVE-2012/CVE-2012-40xx/CVE-2012-4043.json | 20 +- CVE-2012/CVE-2012-40xx/CVE-2012-4045.json | 26 +- CVE-2012/CVE-2012-40xx/CVE-2012-4048.json | 42 +- CVE-2012/CVE-2012-40xx/CVE-2012-4049.json | 50 +- CVE-2012/CVE-2012-40xx/CVE-2012-4050.json | 18 +- CVE-2012/CVE-2012-40xx/CVE-2012-4052.json | 19 +- CVE-2012/CVE-2012-40xx/CVE-2012-4053.json | 29 +- CVE-2012/CVE-2012-40xx/CVE-2012-4054.json | 29 +- CVE-2012/CVE-2012-40xx/CVE-2012-4055.json | 25 +- CVE-2012/CVE-2012-40xx/CVE-2012-4056.json | 25 +- CVE-2012/CVE-2012-40xx/CVE-2012-4057.json | 32 +- CVE-2012/CVE-2012-40xx/CVE-2012-4058.json | 22 +- CVE-2012/CVE-2012-40xx/CVE-2012-4059.json | 22 +- CVE-2012/CVE-2012-40xx/CVE-2012-4060.json | 25 +- CVE-2012/CVE-2012-40xx/CVE-2012-4061.json | 18 +- CVE-2012/CVE-2012-40xx/CVE-2012-4068.json | 33 +- CVE-2012/CVE-2012-40xx/CVE-2012-4069.json | 13 +- CVE-2012/CVE-2012-40xx/CVE-2012-4070.json | 16 +- CVE-2012/CVE-2012-40xx/CVE-2012-4071.json | 35 +- CVE-2012/CVE-2012-41xx/CVE-2012-4142.json | 32 +- CVE-2012/CVE-2012-41xx/CVE-2012-4143.json | 32 +- CVE-2012/CVE-2012-41xx/CVE-2012-4144.json | 32 +- CVE-2012/CVE-2012-41xx/CVE-2012-4145.json | 25 +- CVE-2012/CVE-2012-41xx/CVE-2012-4146.json | 21 +- CVE-2012/CVE-2012-41xx/CVE-2012-4147.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4148.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4149.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4150.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4151.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4152.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4153.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4154.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4155.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4156.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4157.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4158.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4159.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4160.json | 23 +- CVE-2012/CVE-2012-41xx/CVE-2012-4161.json | 17 +- CVE-2012/CVE-2012-41xx/CVE-2012-4162.json | 17 +- CVE-2012/CVE-2012-41xx/CVE-2012-4163.json | 39 +- CVE-2012/CVE-2012-41xx/CVE-2012-4164.json | 39 +- CVE-2012/CVE-2012-41xx/CVE-2012-4165.json | 39 +- CVE-2012/CVE-2012-41xx/CVE-2012-4167.json | 39 +- CVE-2012/CVE-2012-41xx/CVE-2012-4168.json | 39 +- CVE-2012/CVE-2012-41xx/CVE-2012-4170.json | 22 +- CVE-2012/CVE-2012-41xx/CVE-2012-4171.json | 22 +- CVE-2012/CVE-2012-41xx/CVE-2012-4177.json | 27 +- CVE-2012/CVE-2012-41xx/CVE-2012-4178.json | 26 +- CVE-2012/CVE-2012-42xx/CVE-2012-4219.json | 25 +- CVE-2012/CVE-2012-42xx/CVE-2012-4235.json | 31 +- CVE-2012/CVE-2012-42xx/CVE-2012-4236.json | 34 +- CVE-2012/CVE-2012-42xx/CVE-2012-4237.json | 47 +- CVE-2012/CVE-2012-42xx/CVE-2012-4238.json | 36 +- CVE-2012/CVE-2012-42xx/CVE-2012-4245.json | 70 +- CVE-2012/CVE-2012-42xx/CVE-2012-4246.json | 46 +- CVE-2012/CVE-2012-42xx/CVE-2012-4247.json | 44 +- CVE-2012/CVE-2012-42xx/CVE-2012-4248.json | 24 +- CVE-2012/CVE-2012-42xx/CVE-2012-4249.json | 27 +- CVE-2012/CVE-2012-42xx/CVE-2012-4250.json | 25 +- CVE-2012/CVE-2012-42xx/CVE-2012-4251.json | 37 +- CVE-2012/CVE-2012-42xx/CVE-2012-4252.json | 29 +- CVE-2012/CVE-2012-42xx/CVE-2012-4253.json | 37 +- CVE-2012/CVE-2012-42xx/CVE-2012-4254.json | 29 +- CVE-2012/CVE-2012-42xx/CVE-2012-4255.json | 27 +- CVE-2012/CVE-2012-42xx/CVE-2012-4256.json | 25 +- CVE-2012/CVE-2012-42xx/CVE-2012-4257.json | 25 +- CVE-2012/CVE-2012-42xx/CVE-2012-4258.json | 34 +- CVE-2012/CVE-2012-42xx/CVE-2012-4259.json | 50 +- CVE-2012/CVE-2012-42xx/CVE-2012-4260.json | 51 +- CVE-2012/CVE-2012-42xx/CVE-2012-4261.json | 22 +- CVE-2012/CVE-2012-42xx/CVE-2012-4262.json | 60 +- CVE-2012/CVE-2012-42xx/CVE-2012-4263.json | 34 +- CVE-2012/CVE-2012-42xx/CVE-2012-4264.json | 21 +- CVE-2012/CVE-2012-42xx/CVE-2012-4265.json | 15 +- CVE-2012/CVE-2012-42xx/CVE-2012-4266.json | 27 +- CVE-2012/CVE-2012-42xx/CVE-2012-4267.json | 51 +- CVE-2012/CVE-2012-42xx/CVE-2012-4268.json | 34 +- CVE-2012/CVE-2012-42xx/CVE-2012-4269.json | 26 +- CVE-2012/CVE-2012-42xx/CVE-2012-4270.json | 22 +- CVE-2012/CVE-2012-42xx/CVE-2012-4271.json | 27 +- CVE-2012/CVE-2012-42xx/CVE-2012-4272.json | 21 +- CVE-2012/CVE-2012-42xx/CVE-2012-4273.json | 30 +- CVE-2012/CVE-2012-42xx/CVE-2012-4274.json | 20 +- CVE-2012/CVE-2012-42xx/CVE-2012-4275.json | 23 +- CVE-2012/CVE-2012-42xx/CVE-2012-4276.json | 23 +- CVE-2012/CVE-2012-42xx/CVE-2012-4277.json | 38 +- CVE-2012/CVE-2012-42xx/CVE-2012-4278.json | 31 +- CVE-2012/CVE-2012-42xx/CVE-2012-4279.json | 31 +- CVE-2012/CVE-2012-42xx/CVE-2012-4280.json | 31 +- CVE-2012/CVE-2012-42xx/CVE-2012-4281.json | 56 +- CVE-2012/CVE-2012-42xx/CVE-2012-4282.json | 22 +- CVE-2012/CVE-2012-42xx/CVE-2012-4283.json | 28 +- CVE-2012/CVE-2012-42xx/CVE-2012-4285.json | 76 +- CVE-2012/CVE-2012-42xx/CVE-2012-4286.json | 67 +- CVE-2012/CVE-2012-42xx/CVE-2012-4287.json | 65 +- CVE-2012/CVE-2012-42xx/CVE-2012-4288.json | 71 +- CVE-2012/CVE-2012-42xx/CVE-2012-4289.json | 75 +- CVE-2012/CVE-2012-42xx/CVE-2012-4290.json | 58 +- CVE-2012/CVE-2012-42xx/CVE-2012-4291.json | 58 +- CVE-2012/CVE-2012-42xx/CVE-2012-4292.json | 82 +- CVE-2012/CVE-2012-42xx/CVE-2012-4293.json | 71 +- CVE-2012/CVE-2012-42xx/CVE-2012-4294.json | 62 +- CVE-2012/CVE-2012-42xx/CVE-2012-4295.json | 62 +- CVE-2012/CVE-2012-42xx/CVE-2012-4296.json | 70 +- CVE-2012/CVE-2012-42xx/CVE-2012-4297.json | 64 +- CVE-2012/CVE-2012-42xx/CVE-2012-4298.json | 62 +- CVE-2012/CVE-2012-43xx/CVE-2012-4324.json | 22 +- CVE-2012/CVE-2012-43xx/CVE-2012-4325.json | 22 +- CVE-2012/CVE-2012-43xx/CVE-2012-4326.json | 26 +- CVE-2012/CVE-2012-43xx/CVE-2012-4327.json | 34 +- CVE-2012/CVE-2012-43xx/CVE-2012-4328.json | 47 +- CVE-2012/CVE-2012-43xx/CVE-2012-4329.json | 65 +- CVE-2012/CVE-2012-43xx/CVE-2012-4330.json | 64 +- CVE-2012/CVE-2012-43xx/CVE-2012-4331.json | 17 +- CVE-2012/CVE-2012-43xx/CVE-2012-4332.json | 24 +- CVE-2012/CVE-2012-43xx/CVE-2012-4333.json | 32 +- CVE-2012/CVE-2012-43xx/CVE-2012-4334.json | 32 +- CVE-2012/CVE-2012-43xx/CVE-2012-4335.json | 32 +- CVE-2012/CVE-2012-43xx/CVE-2012-4337.json | 39 +- CVE-2012/CVE-2012-43xx/CVE-2012-4340.json | 17 +- CVE-2012/CVE-2012-43xx/CVE-2012-4341.json | 42 +- CVE-2012/CVE-2012-43xx/CVE-2012-4342.json | 21 +- CVE-2012/CVE-2012-43xx/CVE-2012-4343.json | 21 +- CVE-2012/CVE-2012-43xx/CVE-2012-4344.json | 25 +- CVE-2012/CVE-2012-43xx/CVE-2012-4345.json | 23 +- CVE-2012/CVE-2012-43xx/CVE-2012-4353.json | 37 +- CVE-2012/CVE-2012-43xx/CVE-2012-4354.json | 34 +- CVE-2012/CVE-2012-43xx/CVE-2012-4355.json | 34 +- CVE-2012/CVE-2012-43xx/CVE-2012-4356.json | 34 +- CVE-2012/CVE-2012-43xx/CVE-2012-4357.json | 34 +- CVE-2012/CVE-2012-43xx/CVE-2012-4358.json | 34 +- CVE-2012/CVE-2012-43xx/CVE-2012-4359.json | 34 +- CVE-2012/CVE-2012-43xx/CVE-2012-4361.json | 30 +- CVE-2012/CVE-2012-43xx/CVE-2012-4362.json | 30 +- CVE-2012/CVE-2012-43xx/CVE-2012-4363.json | 27 +- CVE-2012/CVE-2012-43xx/CVE-2012-4386.json | 41 +- CVE-2012/CVE-2012-43xx/CVE-2012-4387.json | 42 +- CVE-2012/CVE-2012-43xx/CVE-2012-4388.json | 92 +- CVE-2012/CVE-2012-43xx/CVE-2012-4389.json | 25 +- CVE-2012/CVE-2012-43xx/CVE-2012-4390.json | 25 +- CVE-2012/CVE-2012-43xx/CVE-2012-4391.json | 21 +- CVE-2012/CVE-2012-43xx/CVE-2012-4392.json | 25 +- CVE-2012/CVE-2012-43xx/CVE-2012-4393.json | 37 +- CVE-2012/CVE-2012-43xx/CVE-2012-4394.json | 25 +- CVE-2012/CVE-2012-43xx/CVE-2012-4395.json | 25 +- CVE-2012/CVE-2012-43xx/CVE-2012-4396.json | 88 +- CVE-2012/CVE-2012-43xx/CVE-2012-4397.json | 36 +- CVE-2012/CVE-2012-44xx/CVE-2012-4404.json | 52 +- CVE-2012/CVE-2012-45xx/CVE-2012-4577.json | 27 +- CVE-2012/CVE-2012-45xx/CVE-2012-4578.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4579.json | 17 +- CVE-2012/CVE-2012-45xx/CVE-2012-4580.json | 16 +- CVE-2012/CVE-2012-45xx/CVE-2012-4581.json | 16 +- CVE-2012/CVE-2012-45xx/CVE-2012-4582.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4583.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4584.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4585.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4586.json | 16 +- CVE-2012/CVE-2012-45xx/CVE-2012-4587.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4588.json | 16 +- CVE-2012/CVE-2012-45xx/CVE-2012-4589.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4590.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4591.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4592.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4593.json | 16 +- CVE-2012/CVE-2012-45xx/CVE-2012-4594.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4595.json | 22 +- CVE-2012/CVE-2012-45xx/CVE-2012-4596.json | 18 +- CVE-2012/CVE-2012-45xx/CVE-2012-4597.json | 22 +- CVE-2012/CVE-2012-45xx/CVE-2012-4598.json | 16 +- CVE-2012/CVE-2012-45xx/CVE-2012-4599.json | 14 +- CVE-2012/CVE-2012-46xx/CVE-2012-4600.json | 30 +- CVE-2012/CVE-2012-46xx/CVE-2012-4604.json | 16 +- CVE-2012/CVE-2012-46xx/CVE-2012-4605.json | 22 +- CVE-2012/CVE-2012-46xx/CVE-2012-4667.json | 30 +- CVE-2012/CVE-2012-46xx/CVE-2012-4668.json | 32 +- CVE-2012/CVE-2012-46xx/CVE-2012-4669.json | 20 +- CVE-2012/CVE-2012-46xx/CVE-2012-4670.json | 26 +- CVE-2012/CVE-2012-46xx/CVE-2012-4671.json | 17 +- CVE-2012/CVE-2012-46xx/CVE-2012-4672.json | 15 +- CVE-2012/CVE-2012-46xx/CVE-2012-4673.json | 27 +- CVE-2012/CVE-2012-46xx/CVE-2012-4674.json | 17 +- CVE-2012/CVE-2012-46xx/CVE-2012-4675.json | 30 +- CVE-2012/CVE-2012-46xx/CVE-2012-4676.json | 24 +- CVE-2012/CVE-2012-46xx/CVE-2012-4677.json | 13 +- CVE-2012/CVE-2012-46xx/CVE-2012-4678.json | 57 +- CVE-2012/CVE-2012-46xx/CVE-2012-4679.json | 41 +- CVE-2012/CVE-2012-46xx/CVE-2012-4680.json | 22 +- CVE-2012/CVE-2012-46xx/CVE-2012-4681.json | 132 +- CVE-2012/CVE-2012-46xx/CVE-2012-4685.json | 37 +- CVE-2012/CVE-2012-46xx/CVE-2012-4686.json | 24 +- CVE-2012/CVE-2012-47xx/CVE-2012-4736.json | 18 +- CVE-2012/CVE-2012-47xx/CVE-2012-4737.json | 34 +- CVE-2012/CVE-2012-47xx/CVE-2012-4739.json | 36 +- CVE-2012/CVE-2012-47xx/CVE-2012-4740.json | 26 +- CVE-2012/CVE-2012-47xx/CVE-2012-4741.json | 22 +- CVE-2012/CVE-2012-47xx/CVE-2012-4742.json | 21 +- CVE-2012/CVE-2012-47xx/CVE-2012-4743.json | 30 +- CVE-2012/CVE-2012-47xx/CVE-2012-4744.json | 27 +- CVE-2012/CVE-2012-47xx/CVE-2012-4745.json | 23 +- CVE-2012/CVE-2012-47xx/CVE-2012-4746.json | 16 +- CVE-2012/CVE-2012-47xx/CVE-2012-4747.json | 30 +- CVE-2012/CVE-2012-47xx/CVE-2012-4752.json | 25 +- CVE-2012/CVE-2012-47xx/CVE-2012-4753.json | 13 +- CVE-2012/CVE-2012-47xx/CVE-2012-4754.json | 24 +- CVE-2012/CVE-2012-47xx/CVE-2012-4755.json | 31 +- CVE-2012/CVE-2012-47xx/CVE-2012-4756.json | 20 +- CVE-2012/CVE-2012-47xx/CVE-2012-4757.json | 20 +- CVE-2012/CVE-2012-47xx/CVE-2012-4758.json | 20 +- CVE-2012/CVE-2012-47xx/CVE-2012-4759.json | 24 +- CVE-2012/CVE-2012-48xx/CVE-2012-4864.json | 39 +- CVE-2012/CVE-2012-48xx/CVE-2012-4865.json | 27 +- CVE-2012/CVE-2012-48xx/CVE-2012-4866.json | 29 +- CVE-2012/CVE-2012-48xx/CVE-2012-4867.json | 20 +- CVE-2012/CVE-2012-48xx/CVE-2012-4868.json | 23 +- CVE-2012/CVE-2012-48xx/CVE-2012-4869.json | 51 +- CVE-2012/CVE-2012-48xx/CVE-2012-4870.json | 57 +- CVE-2012/CVE-2012-48xx/CVE-2012-4871.json | 33 +- CVE-2012/CVE-2012-48xx/CVE-2012-4872.json | 34 +- CVE-2012/CVE-2012-48xx/CVE-2012-4873.json | 31 +- CVE-2012/CVE-2012-48xx/CVE-2012-4874.json | 28 +- CVE-2012/CVE-2012-48xx/CVE-2012-4875.json | 25 +- CVE-2012/CVE-2012-48xx/CVE-2012-4876.json | 52 +- CVE-2012/CVE-2012-48xx/CVE-2012-4877.json | 40 +- CVE-2012/CVE-2012-48xx/CVE-2012-4878.json | 29 +- CVE-2012/CVE-2012-48xx/CVE-2012-4879.json | 23 +- CVE-2012/CVE-2012-48xx/CVE-2012-4880.json | 20 +- CVE-2012/CVE-2012-48xx/CVE-2012-4881.json | 20 +- CVE-2012/CVE-2012-48xx/CVE-2012-4882.json | 20 +- CVE-2012/CVE-2012-48xx/CVE-2012-4883.json | 20 +- CVE-2012/CVE-2012-48xx/CVE-2012-4885.json | 53 +- CVE-2012/CVE-2012-48xx/CVE-2012-4889.json | 52 +- CVE-2012/CVE-2012-48xx/CVE-2012-4890.json | 44 +- CVE-2012/CVE-2012-48xx/CVE-2012-4891.json | 40 +- CVE-2012/CVE-2012-48xx/CVE-2012-4892.json | 22 +- CVE-2012/CVE-2012-48xx/CVE-2012-4893.json | 24 +- README.md | 52 +- _state.csv | 7996 ++++++++++----------- 2001 files changed, 72482 insertions(+), 12896 deletions(-) diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0985.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0985.json index f8ff9c3644f..25c0ecac316 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0985.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0985.json @@ -2,9 +2,8 @@ "id": "CVE-2012-0985", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-07T19:55:06.993", - "lastModified": "2017-08-29T01:31:08.227", + "lastModified": "2024-11-21T01:36:05.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -176,6 +175,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75978", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0147.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://esupport.sony.com/US/perl/support-info.pl?template_id=1&info_id=946", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/82401", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49340", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18958", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53735", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75978", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0990.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0990.json index 5e4a8a5b312..cfb74f047d9 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0990.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0990.json @@ -2,9 +2,8 @@ "id": "CVE-2012-0990", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-07T21:55:02.390", - "lastModified": "2017-08-29T01:31:08.537", + "lastModified": "2024-11-21T01:36:06.043", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -114,6 +113,49 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0158.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47691", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.net/projects/dclassifieds/files/csrf_fix_120105.rar/download", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.osvdb.org/78557", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51671", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72733", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23067", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0991.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0991.json index 882c7a7ceea..9234fb8e5e3 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0991.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0991.json @@ -2,9 +2,8 @@ "id": "CVE-2012-0991", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-07T21:55:03.547", - "lastModified": "2017-08-29T01:31:08.617", + "lastModified": "2024-11-21T01:36:06.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -128,6 +127,63 @@ "Exploit", "Patch" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://osvdb.org/78727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/78728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/78729", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/78730", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47781", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51788", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72914", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23069", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0992.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0992.json index 4e11f1c3a88..cf2cd6fd2ad 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0992.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0992.json @@ -2,9 +2,8 @@ "id": "CVE-2012-0992", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-07T21:55:03.640", - "lastModified": "2017-08-29T01:31:08.663", + "lastModified": "2024-11-21T01:36:06.343", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -115,6 +114,50 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/78731", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47781", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51788", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72915", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23069", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0993.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0993.json index 1abc6c6b1a1..a07d00b2236 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0993.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0993.json @@ -2,9 +2,8 @@ "id": "CVE-2012-0993", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:45.657", - "lastModified": "2017-08-29T01:31:08.727", + "lastModified": "2024-11-21T01:36:06.493", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,58 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47875", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51916", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zenphoto.org/news/zenphoto-1.4.2.1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zenphoto.org/trac/changeset/8994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.zenphoto.org/trac/changeset/8995", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23070", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0994.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0994.json index 4de480e3b2d..a0194c7764f 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0994.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0994.json @@ -2,9 +2,8 @@ "id": "CVE-2012-0994", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:45.687", - "lastModified": "2017-08-29T01:31:08.820", + "lastModified": "2024-11-21T01:36:06.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -123,6 +122,58 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47875", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51916", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zenphoto.org/news/zenphoto-1.4.2.1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zenphoto.org/trac/changeset/8994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.zenphoto.org/trac/changeset/8995", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23070", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0995.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0995.json index 241f87dcd8f..d64084a6e92 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0995.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0995.json @@ -2,9 +2,8 @@ "id": "CVE-2012-0995", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:45.720", - "lastModified": "2017-08-29T01:31:08.883", + "lastModified": "2024-11-21T01:36:06.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,58 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47875", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51916", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zenphoto.org/news/zenphoto-1.4.2.1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zenphoto.org/trac/changeset/8994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.zenphoto.org/trac/changeset/8995", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23070", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0996.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0996.json index 96268a07b3c..6c6983e1946 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0996.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0996.json @@ -2,9 +2,8 @@ "id": "CVE-2012-0996", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:02.733", - "lastModified": "2012-02-24T13:55:02.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:06.937", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23071", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0997.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0997.json index ca2dbdf2973..6b1f269b3cb 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0997.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0997.json @@ -2,9 +2,8 @@ "id": "CVE-2012-0997", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:02.780", - "lastModified": "2012-02-24T13:55:02.780", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:07.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23071", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0998.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0998.json index 41e9127374e..296123018b3 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0998.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0998.json @@ -2,9 +2,8 @@ "id": "CVE-2012-0998", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:03.217", - "lastModified": "2012-02-24T13:55:03.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:07.213", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +105,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.lepton-cms.org/media/changelog/changelog_1.1.4.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.lepton-cms.org/posts/security-release-lepton-1.1.4-52.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23072", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-09xx/CVE-2012-0999.json b/CVE-2012/CVE-2012-09xx/CVE-2012-0999.json index 0010a19e675..8e8bdfb90e8 100644 --- a/CVE-2012/CVE-2012-09xx/CVE-2012-0999.json +++ b/CVE-2012/CVE-2012-09xx/CVE-2012-0999.json @@ -2,9 +2,8 @@ "id": "CVE-2012-0999", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:03.267", - "lastModified": "2012-02-24T13:55:03.267", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:07.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +105,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.lepton-cms.org/media/changelog/changelog_1.1.4.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.lepton-cms.org/posts/security-release-lepton-1.1.4-52.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23072", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1000.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1000.json index a625875b400..6d28464650f 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1000.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1000.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1000", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:03.313", - "lastModified": "2012-02-24T13:55:03.313", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:10.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -106,6 +105,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.lepton-cms.org/media/changelog/changelog_1.1.4.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.lepton-cms.org/posts/security-release-lepton-1.1.4-52.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23072", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1002.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1002.json index 633ca69ee15..0dbb0496a7a 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1002.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1002.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1002", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T04:11:31.703", - "lastModified": "2017-12-07T02:29:10.350", + "lastModified": "2024-11-21T01:36:10.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75399", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18820", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openconf.com/news/#20120202", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51927", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75399", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1003.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1003.json index 51a6ee17e2f..263ba5798a9 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1003.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1003.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1003", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-07T04:09:20.283", - "lastModified": "2017-08-29T01:31:08.943", + "lastModified": "2024-11-21T01:36:10.463", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -703,6 +702,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73027", "source": "cve@mitre.org" + }, + { + "url": "http://blog.vulnhunt.com/index.php/2012/02/02/cal-2012-0004-opera-array-integer-overflow/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73027", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1004.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1004.json index f32688317ab..3af244a11d6 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1004.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1004.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1004", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T04:11:31.780", - "lastModified": "2012-02-08T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorImpact": "Per: http://foswiki.org/Support/SecurityAlert-CVE-2012-1004\r\n\r\n'Vulnerable Software Versions - All versions 1.0.0 - 1.1.4 inclusive for sites that use the user registration process'", + "lastModified": "2024-11-21T01:36:10.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -128,6 +126,33 @@ { "url": "http://st2tea.blogspot.com/2012/02/foswiki-cross-site-scripting.html", "source": "cve@mitre.org" + }, + { + "url": "http://foswiki.org/Support/SecurityAlert-CVE-2012-1004", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://foswiki.org/Tasks/Item11498", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://foswiki.org/Tasks/Item11501", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://st2tea.blogspot.com/2012/02/foswiki-cross-site-scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://foswiki.org/Support/SecurityAlert-CVE-2012-1004\r\n\r\n'Vulnerable Software Versions - All versions 1.0.0 - 1.1.4 inclusive for sites that use the user registration process'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1005.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1005.json index 70dcd339d7b..a0a6b3810b0 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1005.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1005.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1005", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-07T21:55:04.047", - "lastModified": "2017-08-29T01:31:08.990", + "lastModified": "2024-11-21T01:36:10.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72913", "source": "cve@mitre.org" + }, + { + "url": "http://secpod.org/blog/?p=453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47876", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51820", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72913", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1006.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1006.json index d320e195380..5c6c56e023b 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1006.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1006.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1006", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-07T04:09:20.330", - "lastModified": "2017-08-29T01:31:09.053", + "lastModified": "2024-11-21T01:36:10.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72888", "source": "cve@mitre.org" + }, + { + "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secpod.org/blog/?p=450", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72888", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1007.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1007.json index 0c65da86565..ec1af980bf2 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1007.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1007.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1007", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-07T04:09:20.360", - "lastModified": "2018-10-17T01:29:00.740", + "lastModified": "2024-11-21T01:36:11.047", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73052", "source": "cve@mitre.org" + }, + { + "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secpod.org/blog/?p=450", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51900", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1008.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1008.json index 334feafb5ab..f1ce101f19b 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1008.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1008.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1008", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T04:11:31.920", - "lastModified": "2013-07-26T06:40:59.807", + "lastModified": "2024-11-21T01:36:11.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "http://www.exploit-db.com/exploits/18453", "source": "cve@mitre.org" + }, + { + "url": "http://secpod.org/advisories/SecPod_Exploit_OfficeSIP_Server_DOS_Vuln.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secpod.org/blog/?p=461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secpod.org/exploits/SecPod_Exploit_OfficeSIP_Server_DOS.py", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18453", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1009.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1009.json index 8deb55ee71c..3c8a2752820 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1009.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1009.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1009", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.227", - "lastModified": "2017-08-29T01:31:09.163", + "lastModified": "2024-11-21T01:36:11.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -108,6 +107,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72933", "source": "cve@mitre.org" + }, + { + "url": "http://secpod.org/advisories/SecPod_Exploit_NetSarang_Xlpd_Printer_Daemon_DoS_Vuln.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secpod.org/blog/?p=457", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18454", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51821", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72933", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1010.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1010.json index 6dfb9e1096a..812d1cb8ca0 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1010.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1010.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1010", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-07T21:55:04.250", - "lastModified": "2017-08-29T01:31:09.210", + "lastModified": "2024-11-21T01:36:11.467", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -222,6 +221,39 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72640", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0137.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18407", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72640", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1011.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1011.json index 5247def2b8a..4267ca5a0d9 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1011.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1011.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1011", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-07T21:55:04.297", - "lastModified": "2017-08-29T01:31:09.273", + "lastModified": "2024-11-21T01:36:11.613", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -119,6 +118,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72640", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0137.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18407", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72640", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1012.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1012.json index 7a43b988e01..58fdf41abc2 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1012.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1012.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1012", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-07T19:55:07.757", - "lastModified": "2020-01-21T15:46:22.213", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:11.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -92,6 +91,22 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=796438", "source": "cve@mitre.org" + }, + { + "url": "http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=7093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://src.mit.edu/fisheye/changelog/krb5/?cs=25704", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/krb5-1.10/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=796438", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1013.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1013.json index c6511649199..4f9c1f41e2c 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1013.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1013.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1013", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-07T19:55:07.930", - "lastModified": "2020-01-21T15:46:22.213", + "lastModified": "2024-11-21T01:36:11.890", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'CWE-476: NULL Pointer Dereference'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -192,6 +190,47 @@ { "url": "https://hermes.opensuse.org/messages/15083635", "source": "cve@mitre.org" + }, + { + "url": "http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=7152", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mailman.mit.edu/pipermail/kerberos-announce/2012q2/000136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1131.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/krb5-1.10/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53784", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=827517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/krb5/krb5/commit/c5be6209311d4a8f10fda37d0d3f876c1b33b77b", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15083635", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'CWE-476: NULL Pointer Dereference'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1014.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1014.json index c47591713b5..b47c11bdee9 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1014.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1014.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1014", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:01.273", - "lastModified": "2020-01-21T15:46:24.010", + "lastModified": "2024-11-21T01:36:12.037", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,22 @@ { "url": "http://www.debian.org/security/2012/dsa-2518", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2518", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1015.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1015.json index 8f5e9243a9e..793aed8ab70 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1015.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1015.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1015", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:01.320", - "lastModified": "2020-01-21T15:46:24.010", + "lastModified": "2024-11-21T01:36:12.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -165,6 +164,30 @@ { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:120", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1131.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2012-001.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2518", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:120", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1017.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1017.json index 8fb35fabe43..1991cb73964 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1017.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1017.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1017", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:01.453", - "lastModified": "2017-08-29T01:31:09.320", + "lastModified": "2024-11-21T01:36:12.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72998", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/47857", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51874", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72998", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1018.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1018.json index 42fb56fefce..dd61757487c 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1018.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1018.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1018", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:01.563", - "lastModified": "2017-08-29T01:31:09.397", + "lastModified": "2024-11-21T01:36:12.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72917", "source": "cve@mitre.org" + }, + { + "url": "http://dl.packetstormsecurity.net/1202-exploits/joomlacurrencyconverter-xss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51804", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72917", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1019.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1019.json index 946f17d944e..d1c343b8355 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1019.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1019.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1019", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:01.703", - "lastModified": "2012-02-08T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:12.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,31 @@ { "url": "http://www.securityfocus.com/bid/51867", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109447/XWiki-Enterprise-3.4-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47885", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://st2tea.blogspot.com/2012/02/xwiki-cross-site-scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51867", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1020.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1020.json index 562d62fd077..35f00fc271c 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1020.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1020.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1020", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:01.813", - "lastModified": "2017-08-29T01:31:09.460", + "lastModified": "2024-11-21T01:36:12.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73001", "source": "cve@mitre.org" + }, + { + "url": "http://marc.info/?l=full-disclosure&m=132852645911072&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51876", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=304", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73001", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1021.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1021.json index 9156d2a874b..375e8edbfaa 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1021.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1021.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1021", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:02.390", - "lastModified": "2017-08-29T01:31:09.523", + "lastModified": "2024-11-21T01:36:12.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72924", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78711", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.org/files/109290/4images-xss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47811", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51774", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72924", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1022.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1022.json index 9158f512545..36fac7407a0 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1022.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1022.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1022", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:02.437", - "lastModified": "2017-08-29T01:31:09.600", + "lastModified": "2024-11-21T01:36:13.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72932", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109290/4images-xss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51774", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72932", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1023.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1023.json index ad8d296bff5..22c443c5a28 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1023.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1023.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1023", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:02.500", - "lastModified": "2017-08-29T01:31:09.647", + "lastModified": "2024-11-21T01:36:13.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72925", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78779", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.org/files/109290/4images-xss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51774", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72925", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1024.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1024.json index 440e649a818..f834f49b64c 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1024.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1024.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1024", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:02.530", - "lastModified": "2017-08-29T01:31:09.710", + "lastModified": "2024-11-21T01:36:13.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -84,6 +83,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73109", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18343", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73109", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1025.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1025.json index ff07e63719d..feb32babf71 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1025.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1025.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1025", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:02.577", - "lastModified": "2012-02-08T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:13.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -128,6 +127,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/18343", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1026.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1026.json index f0f2a416646..24ef004d440 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1026.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1026.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1026", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:02.627", - "lastModified": "2017-08-29T01:31:09.883", + "lastModified": "2024-11-21T01:36:13.660", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73000", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/tracker/?func=detail&aid=3488241&group_id=298778&atid=1260461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18467", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51870", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73000", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1027.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1027.json index 37da8710282..b9085114938 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1027.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1027.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1027", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:02.670", - "lastModified": "2017-08-29T01:31:09.977", + "lastModified": "2024-11-21T01:36:13.793", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,43 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72952", "source": "cve@mitre.org" + }, + { + "url": "http://dl.packetstormsecurity.net/1202-exploits/projectopen-xss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/78823", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47854", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/732115", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51842", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72952", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1028.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1028.json index c7e937cae88..0cc104ab02f 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1028.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1028.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1028", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:02.733", - "lastModified": "2017-08-29T01:31:10.037", + "lastModified": "2024-11-21T01:36:13.933", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73042", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://voxel.dl.sourceforge.net/project/simplgroup/README.md", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1029.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1029.json index 0b5e2ef6532..e3a0450fa03 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1029.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1029.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1029", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T00:55:02.767", - "lastModified": "2017-08-29T01:31:10.100", + "lastModified": "2024-11-21T01:36:14.067", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -108,6 +107,43 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72999", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78900", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/109485/Tube-Ace-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47874", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18466", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52046", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72999", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1030.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1030.json index 40e4e845645..0554aa346b0 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1030.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1030.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1030", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-11T10:39:26.340", - "lastModified": "2012-04-11T10:39:26.340", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:14.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://technet.microsoft.com/en-us/security/msvr/msvr12-003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.dotnetnuke.com/News/Security-Policy/Security-bulletin-no.62.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1031.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1031.json index 340c8d9776b..f41c68f93e2 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1031.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1031.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1031", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T04:11:32.017", - "lastModified": "2012-02-14T04:11:16.507", + "lastModified": "2024-11-21T01:36:14.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -133,6 +132,28 @@ { "url": "http://www.securityfocus.com/bid/51877", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/47910", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://world.episerver.com/Blogs/Jens-N/Dates/2012/1/Security-vulnerability---Elevation-of-privilege/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://world.episerver.com/Blogs/Shahid-Nawaz/Dates/2012/1/General-Hotfix-CMS-6-R2/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51877", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1033.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1033.json index ab1ef24c562..70438bf29e1 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1033.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1033.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1033", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T20:55:01.030", - "lastModified": "2018-10-30T16:27:02.577", + "lastModified": "2024-11-21T01:36:14.607", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorSolution": "Per: https://www.isc.org/software/bind/advisories/cve-2012-1033\r\n\r\n'Solution: \r\n\r\nOn further review, ISC has determined that this is not an issue which needs an immediate patch. The issue is being reviewed at the protocol level and will be addressed there. Implementing DNSSEC is the safest mitigation measure.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -428,6 +426,10 @@ } ], "references": [ + { + "url": "http://marc.info/?l=bugtraq&m=135638082529878&w=2", + "source": "cve@mitre.org" + }, { "url": "http://marc.info/?l=bugtraq&m=135638082529878&w=2", "source": "cve@mitre.org" @@ -477,6 +479,61 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=135638082529878&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=135638082529878&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/78916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0717.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47884", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/542123", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73053", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15136456", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15136477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.isc.org/software/bind/advisories/cve-2012-1033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorSolution": "Per: https://www.isc.org/software/bind/advisories/cve-2012-1033\r\n\r\n'Solution: \r\n\r\nOn further review, ISC has determined that this is not an issue which needs an immediate patch. The issue is being reviewed at the protocol level and will be addressed there. Implementing DNSSEC is the safest mitigation measure.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1034.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1034.json index d54fedf1f83..4567a7b3ff2 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1034.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1034.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1034", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T11:55:03.937", - "lastModified": "2012-02-14T04:11:16.837", + "lastModified": "2024-11-21T01:36:14.777", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -130,6 +129,25 @@ { "url": "http://www.securityfocus.com/bid/51877", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/47910", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://world.episerver.com/Blogs/Shahid-Nawaz/Dates/2012/1/General-Hotfix-CMS-6-R2/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://world.episerver.com/PageFiles/110367/BugList.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51877", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1035.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1035.json index 1afb1c52c79..a14a77ece15 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1035.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1035.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1035", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-08T21:55:01.640", - "lastModified": "2012-02-09T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:14.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,25 @@ { "url": "http://www.ocert.org/advisories/ocert-2011-003.html", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0169.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adacore.com/2012/01/27/security-advisory-sa-2012-l119-003-hash-collisions-in-aws/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.nruns.com/_downloads/advisory28122011.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ocert.org/advisories/ocert-2011-003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1036.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1036.json index 572242b7a67..2a2340141e4 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1036.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1036.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1036", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-11T10:39:26.387", - "lastModified": "2012-04-11T10:39:26.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:15.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -253,6 +252,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://technet.microsoft.com/en-us/security/msvr/msvr12-002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.dotnetnuke.com/News/Security-Policy/Security-bulletin-no.59.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1037.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1037.json index c791979b21c..7b56618f9a4 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1037.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1037.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1037", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T20:55:10.873", - "lastModified": "2012-07-16T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:15.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -156,6 +155,26 @@ { "url": "https://forge.indepnet.net/projects/glpi/versions/685", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Feb/157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:016", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://forge.indepnet.net/issues/3338", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://forge.indepnet.net/projects/glpi/repository/revisions/17457/diff/branches/0.80-bugfixes/front/popup.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://forge.indepnet.net/projects/glpi/versions/685", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1039.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1039.json index 79517da4081..e36f62faad8 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1039.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1039.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1039", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T19:55:03.937", - "lastModified": "2018-01-11T02:29:03.527", + "lastModified": "2024-11-21T01:36:15.473", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -263,6 +262,37 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0183.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://dotclear.org/blog/post/2012/02/11/Dotclear-2.4.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52221", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.ch/advisory/HTB23074", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1046.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1046.json index d89c456e1f8..2ece03d2167 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1046.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1046.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1046", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-10T19:55:02.487", - "lastModified": "2012-02-13T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:15.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,37 @@ { "url": "http://www.securityfocus.com/bid/51905", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/47889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://securitytracker.com/id?1026648", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?crawler=1&uid=swg1PM49009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27023584", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg1PM49009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/78917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51905", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1047.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1047.json index c5d973dfb67..502ec13ebc1 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1047.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1047.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1047", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-12T22:55:01.263", - "lastModified": "2012-02-25T04:21:24.917", + "lastModified": "2024-11-21T01:36:15.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ { "url": "http://www.vulnerability-lab.com/get_content.php?id=405", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18473", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51901", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=405", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1048.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1048.json index 17a058a44f2..7fbdc742ae0 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1048.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1048.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1048", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-12T22:55:01.357", - "lastModified": "2017-08-29T01:31:10.320", + "lastModified": "2024-11-21T01:36:15.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73043", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51894", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1049.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1049.json index 091e7813fd0..de13b21194a 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1049.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1049.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1049", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-13T19:55:01.037", - "lastModified": "2017-08-29T01:31:10.383", + "lastModified": "2024-11-21T01:36:16.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73039", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47887", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51893", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5070.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73039", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1050.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1050.json index e2c0b23d478..f572b17abaf 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1050.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1050.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1050", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-13T19:55:01.147", - "lastModified": "2021-06-01T14:08:09.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:16.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -129,6 +128,57 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://osvdb.org/78896", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/47908", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mail-archive.com/mathopd%40mathopd.org/msg00392.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mathopd.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026641", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1051.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1051.json index c2fea1b07f0..3762bd1093d 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1051.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1051.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1051", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-13T19:55:01.193", - "lastModified": "2017-08-29T01:31:10.490", + "lastModified": "2024-11-21T01:36:17.223", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73040", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78904", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47352", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73040", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1052.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1052.json index d7cb9635fee..cd15e1e2913 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1052.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1052.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1052", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-13T19:55:01.287", - "lastModified": "2017-08-29T01:31:10.537", + "lastModified": "2024-11-21T01:36:18.143", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73041", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78905", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47362", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73041", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1053.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1053.json index 5aabed3d37c..35a0be15690 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1053.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1053.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1053", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-29T20:55:07.057", - "lastModified": "2019-07-11T15:09:06.720", + "lastModified": "2024-11-21T01:36:18.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -337,6 +336,82 @@ { "url": "https://hermes.opensuse.org/messages/15087408", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://projects.puppetlabs.com/issues/12457", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://projects.puppetlabs.com/issues/12458", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://projects.puppetlabs.com/issues/12459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-1053/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48290", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1372-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2419", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79495", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52158", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15087408", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1054.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1054.json index 7cc079b1a82..439bec1fa18 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1054.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1054.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1054", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-29T20:55:07.133", - "lastModified": "2019-07-11T15:09:06.720", + "lastModified": "2024-11-21T01:36:18.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -335,6 +334,80 @@ { "url": "https://hermes.opensuse.org/messages/15087408", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://projects.puppetlabs.com/issues/12460", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-1054/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48157", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48290", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1372-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2419", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52158", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15087408", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1055.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1055.json index 77d0189514f..9bceda7b3a3 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1055.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1055.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1055", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T00:55:00.677", - "lastModified": "2017-08-29T01:31:10.757", + "lastModified": "2024-11-21T01:36:18.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73103", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47477", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73103", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1056.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1056.json index 136e026ef04..ded18678aa0 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1056.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1056.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1056", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T00:55:00.740", - "lastModified": "2017-08-29T01:31:10.820", + "lastModified": "2024-11-21T01:36:18.767", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -299,6 +298,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72920", "source": "cve@mitre.org" + }, + { + "url": "http://drupal.org/node/1423722", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1425150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/78817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47851", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51826", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72920", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1057.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1057.json index 8aa31472a8a..04ec7928479 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1057.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1057.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1057", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T00:55:00.803", - "lastModified": "2017-08-29T01:31:10.883", + "lastModified": "2024-11-21T01:36:18.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -303,6 +302,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72922", "source": "cve@mitre.org" + }, + { + "url": "http://drupal.org/node/1423722", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1425150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/forward.git/commitdiff/72158fdbfbf5a068938985e3d10ce1d8f969d9c3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/78817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47851", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51826", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72922", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1058.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1058.json index 711ab5f10f8..e9d00f54a0d 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1058.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1058.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1058", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T00:55:00.897", - "lastModified": "2017-08-29T01:31:10.943", + "lastModified": "2024-11-21T01:36:19.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73051", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78923", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/109507/Flyspray-0.9.9.6-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18468", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73051", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1059.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1059.json index 7b8c5b70e5b..d93dc16aad8 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1059.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1059.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1059", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T00:55:01.053", - "lastModified": "2017-08-29T01:31:11.007", + "lastModified": "2024-11-21T01:36:19.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,36 @@ { "url": "https://github.com/osCommerce/oscommerce/commit/a5aeb0448cc333cc4b801c0e01981b218fd9c7df", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109389/VL-407.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18455", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=407", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/osCommerce/oscommerce/commit/a5aeb0448cc333cc4b801c0e01981b218fd9c7df", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1060.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1060.json index d9e14f12102..a924ef5aded 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1060.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1060.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1060", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T00:55:01.113", - "lastModified": "2012-02-14T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:19.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -120,6 +119,43 @@ { "url": "http://www.securityfocus.com/bid/51923", "source": "cve@mitre.org" + }, + { + "url": "http://drupal.org/node/1431114", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1433550", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/revisioning.git/commit/768c882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47931", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.madirish.net/content/drupal-revisioning-6x-313-xss-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51923", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1061.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1061.json index 84a003a7143..66846dde0d5 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1061.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1061.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1061", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T00:55:01.270", - "lastModified": "2017-08-29T01:31:11.070", + "lastModified": "2024-11-21T01:36:19.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73085", "source": "cve@mitre.org" + }, + { + "url": "http://gforgegroup.wordpress.com/2012/02/03/gforge-as-6_0_1-release/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/78928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47587", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51912", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73085", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1062.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1062.json index e7d3f4c4f7f..717bf2d4bfb 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1062.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1062.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1062", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T00:55:01.507", - "lastModified": "2017-08-29T01:31:11.133", + "lastModified": "2024-11-21T01:36:19.667", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -160,6 +159,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72830", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78721", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/78722", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/view/109238/VL-115.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47724", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51796", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72830", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1063.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1063.json index 5880d05a142..70b7ad76f37 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1063.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1063.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1063", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T00:55:01.553", - "lastModified": "2017-08-29T01:31:11.193", + "lastModified": "2024-11-21T01:36:19.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -140,6 +139,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72831", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/view/109238/VL-115.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51796", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72831", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1065.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1065.json index 36d975bf65d..b1b449a26aa 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1065.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1065.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1065", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.273", - "lastModified": "2017-08-29T01:31:11.257", + "lastModified": "2024-11-21T01:36:20.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72947", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51856", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72947", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1066.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1066.json index c86a99aa24a..fee0affd6dd 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1066.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1066.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1066", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.383", - "lastModified": "2017-08-29T01:31:11.320", + "lastModified": "2024-11-21T01:36:20.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72918", "source": "cve@mitre.org" + }, + { + "url": "http://dl.packetstormsecurity.net/1202-exploits/smartycms-xss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51805", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72918", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1067.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1067.json index 83deedf6b4d..905499f1801 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1067.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1067.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1067", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.430", - "lastModified": "2017-08-29T01:31:11.367", + "lastModified": "2024-11-21T01:36:20.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -102,6 +101,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72951", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78820", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47870", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51859", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72951", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1068.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1068.json index 8686540a882..cbe8e5ab9c5 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1068.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1068.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1068", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.570", - "lastModified": "2017-08-29T01:31:11.430", + "lastModified": "2024-11-21T01:36:20.533", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -161,6 +160,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70003", "source": "cve@mitre.org" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset/416723/wp-recentcomments/trunk/core.php?old=316325&old_path=wp-recentcomments%2Ftrunk%2Fcore.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/46141", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/wp-recentcomments/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/75635", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/49734", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70003", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1069.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1069.json index 4bde9fbb58b..fbc458d8578 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1069.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1069.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1069", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.647", - "lastModified": "2017-08-29T01:31:11.477", + "lastModified": "2024-11-21T01:36:20.680", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72926", "source": "cve@mitre.org" + }, + { + "url": "http://dl.packetstormsecurity.net/1202-exploits/iknsupport-xss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51803", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72926", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1070.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1070.json index 2b2036971da..f853f8b843f 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1070.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1070.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1070", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.697", - "lastModified": "2012-02-15T18:18:50.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:20.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,28 @@ { "url": "http://www.securityfocus.com/bid/51845", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78749", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47823", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51845", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1071.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1071.json index b4bcdea5caf..e9a6ff697a1 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1071.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1071.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1071", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.757", - "lastModified": "2017-08-29T01:31:11.537", + "lastModified": "2024-11-21T01:36:20.963", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -123,6 +122,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72934", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78748", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47437", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://typo3.org/extensions/repository/view/mv_cooking/0.4.1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51825", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72934", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1072.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1072.json index 81e35a5f5f0..841de9e6293 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1072.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1072.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1072", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.820", - "lastModified": "2017-08-29T01:31:11.600", + "lastModified": "2024-11-21T01:36:21.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +102,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72958", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78785", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51834", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72958", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1073.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1073.json index 1989df7d2c4..9d2693f4f1d 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1073.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1073.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1073", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.853", - "lastModified": "2017-08-29T01:31:11.647", + "lastModified": "2024-11-21T01:36:21.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72957", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78784", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51834", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72957", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1074.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1074.json index b1c691c5138..62909c40737 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1074.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1074.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1074", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.897", - "lastModified": "2017-08-29T01:31:11.693", + "lastModified": "2024-11-21T01:36:21.423", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +102,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72959", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78786", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51837", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72959", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1075.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1075.json index f874c36cd42..c814bd57a54 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1075.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1075.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1075", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.947", - "lastModified": "2017-08-29T01:31:11.757", + "lastModified": "2024-11-21T01:36:21.557", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -128,6 +127,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72961", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78788", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47842", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/rtg_files/1.5.2/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51838", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72961", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1076.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1076.json index ed849ed0a0c..b44bcac2c07 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1076.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1076.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1076", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:02.993", - "lastModified": "2017-08-29T01:31:11.803", + "lastModified": "2024-11-21T01:36:21.693", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -131,6 +130,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72960", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47842", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/rtg_files/1.5.2/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51838", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72960", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1077.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1077.json index 9461873a6a7..7e833b0496a 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1077.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1077.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1077", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:03.070", - "lastModified": "2012-02-15T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:21.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/78790", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/bc_post2facebook/0.2.2/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1078.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1078.json index 7413cf11cb2..e8dd69578de 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1078.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1078.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1078", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:03.117", - "lastModified": "2017-08-29T01:31:11.867", + "lastModified": "2024-11-21T01:36:21.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -127,6 +126,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72964", "source": "cve@mitre.org" + }, + { + "url": "http://typo3.org/extensions/repository/view/sysutils/1.0.4/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/78791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51844", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72964", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1079.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1079.json index 7fac3294e9f..04ca0196635 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1079.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1079.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1079", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:03.163", - "lastModified": "2017-08-29T01:31:11.913", + "lastModified": "2024-11-21T01:36:22.103", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -127,6 +126,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72965", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/typo3_webservice/0.3.8/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51843", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72965", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1080.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1080.json index a7f90415cde..9b7aee7cc54 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1080.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1080.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1080", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:03.353", - "lastModified": "2012-02-29T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:22.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,21 @@ { "url": "http://www.securityfocus.com/bid/51848", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51848", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1081.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1081.json index c52cb82e2fd..96b33f40879 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1081.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1081.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1081", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:03.383", - "lastModified": "2012-02-29T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:22.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -127,6 +126,29 @@ { "url": "http://www.securityfocus.com/bid/51851", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78795", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/ya_googlesearch/0.3.10/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51851", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1082.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1082.json index 90d99b2d654..d7371e466d9 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1082.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1082.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1082", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:03.430", - "lastModified": "2012-02-29T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:22.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -99,6 +98,21 @@ { "url": "http://www.securityfocus.com/bid/51849", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78796", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51849", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1083.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1083.json index 37ce41715b6..e498cdc816b 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1083.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1083.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1083", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:03.460", - "lastModified": "2012-02-29T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:22.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,21 @@ { "url": "http://www.securityfocus.com/bid/51849", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51849", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1084.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1084.json index 9a1320f2c7b..d09752e8535 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1084.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1084.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1084", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:03.507", - "lastModified": "2017-08-29T01:31:11.977", + "lastModified": "2024-11-21T01:36:22.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72974", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78798", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51852", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72974", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1085.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1085.json index af14715ab3b..9ae92598fdc 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1085.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1085.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1085", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:03.540", - "lastModified": "2017-08-29T01:31:12.023", + "lastModified": "2024-11-21T01:36:22.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -102,6 +101,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72973", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51852", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72973", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1086.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1086.json index 527896a5189..28d40d336ae 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1086.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1086.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1086", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:03.587", - "lastModified": "2012-02-29T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:23.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,21 @@ { "url": "http://www.securityfocus.com/bid/51855", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78801", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51855", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1087.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1087.json index 9d5805e56b3..7b9c1a8016a 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1087.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1087.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1087", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-14T17:55:03.617", - "lastModified": "2012-02-29T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:23.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,25 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/78789", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/extensions/repository/view/bc_post2facebook/0.2.2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1089.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1089.json index 12114fc1f4d..9bf7daebc06 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1089.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1089.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1089", "sourceIdentifier": "secalert@redhat.com", "published": "2012-03-23T18:55:01.177", - "lastModified": "2017-12-13T02:29:02.547", + "lastModified": "2024-11-21T01:36:23.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -220,6 +219,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74276", "source": "secalert@redhat.com" + }, + { + "url": "http://osvdb.org/80301", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wicket.apache.org/2012/03/22/wicket-cve-2012-1089.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52679", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74276", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1090.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1090.json index 14346e55bb5..506e76e2965 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1090.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1090.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1090", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-17T11:00:37.053", - "lastModified": "2021-07-15T19:16:09.750", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:23.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -238,6 +237,85 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0481.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48842", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/48964", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/02/28/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=798293", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1097.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1097.json index 4bd01d1e198..d31577f069e 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1097.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1097.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1097", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-17T11:00:37.227", - "lastModified": "2023-02-13T04:32:55.757", + "lastModified": "2024-11-21T01:36:24.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -261,6 +260,96 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c8e252586f8d5de906385d8cf6385fee289a825e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0481.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48842", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/48898", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/48964", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/05/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799209", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1098.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1098.json index ab2805dcfd8..d8851c9f00d 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1098.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1098.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1098", "sourceIdentifier": "secalert@redhat.com", "published": "2012-03-13T10:55:01.213", - "lastModified": "2019-08-08T15:42:29.590", + "lastModified": "2024-11-21T01:36:24.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -415,6 +414,30 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799275", "source": "secalert@redhat.com" + }, + { + "url": "http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source&output=gplain", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799275", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-10xx/CVE-2012-1099.json b/CVE-2012/CVE-2012-10xx/CVE-2012-1099.json index 64b10dc8ef7..027006fea3b 100644 --- a/CVE-2012/CVE-2012-10xx/CVE-2012-1099.json +++ b/CVE-2012/CVE-2012-10xx/CVE-2012-1099.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1099", "sourceIdentifier": "secalert@redhat.com", "published": "2012-03-13T10:55:01.260", - "lastModified": "2019-08-08T15:42:29.590", + "lastModified": "2024-11-21T01:36:25.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -423,6 +422,38 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799276", "source": "secalert@redhat.com" + }, + { + "url": "http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source&output=gplain", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2466", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/02/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799276", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1106.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1106.json index 173e25d390f..c9cdb9ed7d9 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1106.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1106.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1106", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T16:40:32.037", - "lastModified": "2017-08-29T01:31:12.180", + "lastModified": "2024-11-21T01:36:26.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -92,6 +91,26 @@ "Exploit", "Patch" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0841.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://fedorahosted.org/abrt/changeset/23d6997d7886abe118c28254f7f73f0b19b2d4e0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1107.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1107.json index fae22ea5a68..4e5c79eebb6 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1107.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1107.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1107", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-06T18:55:00.987", - "lastModified": "2017-08-29T01:31:12.257", + "lastModified": "2024-11-21T01:36:26.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -181,6 +180,60 @@ "Exploit", "Patch" ] + }, + { + "url": "http://mail.kde.org/pipermail/taglib-devel/2012-March/002186.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mail.kde.org/pipermail/taglib-devel/2012-March/002187.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/79814", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48211", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49688", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201206-16.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/05/19", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73666", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/taglib/taglib/commit/77d61c6eca4d08b9b025738acf6b926cc750db23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1108.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1108.json index 026005292dd..f472e310c08 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1108.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1108.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1108", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-06T18:55:01.050", - "lastModified": "2017-08-29T01:31:12.320", + "lastModified": "2024-11-21T01:36:26.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -181,6 +180,60 @@ "Exploit", "Patch" ] + }, + { + "url": "http://mail.kde.org/pipermail/taglib-devel/2012-March/002186.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mail.kde.org/pipermail/taglib-devel/2012-March/002191.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/79813", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48211", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49688", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201206-16.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/05/19", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/taglib/taglib/commit/b3646a07348ffa276ea41a9dae03ddc63ea6c532", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1110.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1110.json index e46e02a5336..92a01babb65 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1110.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1110.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1110", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-06T18:55:01.097", - "lastModified": "2017-08-29T01:31:12.367", + "lastModified": "2024-11-21T01:36:27.003", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -119,6 +118,53 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73669", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48165", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/05/15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/05/21", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79827", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79828", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79829", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52295", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://yehg.net/lab/pr0js/advisories/%5Betano_1.2.x%5D_xss", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73669", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1112.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1112.json index 789bec4985e..57023b4f0ae 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1112.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1112.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1112", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-06T18:55:01.143", - "lastModified": "2017-08-29T01:31:12.430", + "lastModified": "2024-11-21T01:36:27.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -121,6 +120,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73736", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/05/14", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/05/23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52296", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_2.5.8_2.x%5D_lfi", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73736", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1113.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1113.json index bb13f0b9aec..0c713eb798b 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1113.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1113.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1113", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-22T18:55:04.437", - "lastModified": "2017-12-07T02:29:10.413", + "lastModified": "2024-11-21T01:36:27.393", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -150,6 +149,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74837", "source": "secalert@redhat.com" + }, + { + "url": "http://gallery.menalto.com/gallery_3_0_3_and_gallery_2_3_2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078618.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078752.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078816.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078851.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078873.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078925.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48767", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=812045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74837", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1118.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1118.json index f79e56c1f56..09b3d1b6c2c 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1118.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1118.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1118", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:02.860", - "lastModified": "2013-08-27T03:21:46.090", + "lastModified": "2024-11-21T01:36:28.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -359,6 +358,68 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48258", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49572", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=10124", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/eb803ed02105fc919cf5f789e939f2b824162927", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1119.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1119.json index 0ad8a077e46..3769d53cfac 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1119.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1119.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1119", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:02.907", - "lastModified": "2021-01-12T18:05:59.507", + "lastModified": "2024-11-21T01:36:28.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -431,6 +430,75 @@ "tags": [ "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48258", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49572", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=13816", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/cf5df427f17cf9204645f83e000665780eb9afe6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/dea7e315f3fc96dfa995e56e8810845fc07a47aa", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1120.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1120.json index 0b1e031de22..0c7aa770fc8 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1120.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1120.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1120", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:02.953", - "lastModified": "2021-01-12T18:05:59.507", + "lastModified": "2024-11-21T01:36:28.583", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -423,6 +422,67 @@ "tags": [ "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48258", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49572", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=13656", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/df7782a65e96aa1c9639a7625a658102134c7fe0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1121.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1121.json index a57e3ebaab7..729cf8ad8e7 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1121.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1121.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1121", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:03.017", - "lastModified": "2021-01-12T18:05:59.507", + "lastModified": "2024-11-21T01:36:28.703", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -413,6 +412,57 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48258", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=13561", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/9443258724e84cb388aa1865b775beaecd80596d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1122.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1122.json index b60012e0b8a..3053e740103 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1122.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1122.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1122", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:03.093", - "lastModified": "2013-08-27T03:21:46.477", + "lastModified": "2024-11-21T01:36:28.823", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -359,6 +358,68 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48258", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49572", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=13748", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/0da3f7ace233208eb3c8d628cc2fd6e56d83839f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1123.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1123.json index d2d40f4140f..517215e6ffa 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1123.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1123.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1123", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:03.140", - "lastModified": "2021-01-12T18:05:59.507", + "lastModified": "2024-11-21T01:36:28.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -426,6 +425,70 @@ "tags": [ "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48258", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49572", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=13901", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52313", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/f5106be52cf6aa72c521f388e4abb5f0de1f1d7f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1126.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1126.json index 22f85b464ef..5f03cd2c486 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1126.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1126.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1126", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:17.933", - "lastModified": "2023-02-13T04:32:58.693", + "lastModified": "2024-11-21T01:36:29.280", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -473,6 +472,101 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800581", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800581", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1127.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1127.json index 3b2d6e67064..9f45be37064 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1127.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1127.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1127", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:17.997", - "lastModified": "2023-02-13T04:32:59.470", + "lastModified": "2024-11-21T01:36:29.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -473,6 +472,101 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800583", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1128.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1128.json index f840876c18e..8692ed90eaa 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1128.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1128.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1128", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.057", - "lastModified": "2021-01-26T12:43:34.040", + "lastModified": "2024-11-21T01:36:29.537", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -445,6 +444,73 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800584", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800584", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1129.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1129.json index 4b2cee25562..0c4921bd4a1 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1129.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1129.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1129", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.090", - "lastModified": "2021-01-26T12:43:34.040", + "lastModified": "2024-11-21T01:36:29.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -465,6 +464,93 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800585", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800585", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1130.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1130.json index d6892f866a8..627ccbb29e0 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1130.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1130.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1130", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.137", - "lastModified": "2023-02-13T04:33:00.570", + "lastModified": "2024-11-21T01:36:29.787", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -473,6 +472,101 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800587", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800587", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1131.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1131.json index 67f3950d9a1..8ceda3af594 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1131.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1131.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1131", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.183", - "lastModified": "2023-02-13T00:23:21.923", + "lastModified": "2024-11-21T01:36:29.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -473,6 +472,101 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800589", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800589", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1132.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1132.json index cd6af3ed16f..eadd8518f66 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1132.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1132.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1132", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.213", - "lastModified": "2023-02-13T00:23:25.037", + "lastModified": "2024-11-21T01:36:30.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -473,6 +472,101 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800590", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800590", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1133.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1133.json index b040918b3be..df5eccd6c5d 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1133.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1133.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1133", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.260", - "lastModified": "2021-01-26T12:43:34.040", + "lastModified": "2024-11-21T01:36:30.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -473,6 +472,101 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800591", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48300", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2428", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800591", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1134.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1134.json index facd3dfb642..2969118449c 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1134.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1134.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1134", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.307", - "lastModified": "2023-02-13T04:33:01.747", + "lastModified": "2024-11-21T01:36:30.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -481,6 +480,109 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800592", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48300", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2428", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800592", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1135.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1135.json index 50f958c4668..76c5e481125 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1135.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1135.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1135", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.370", - "lastModified": "2021-01-26T12:43:34.040", + "lastModified": "2024-11-21T01:36:30.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -465,6 +464,93 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1136.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1136.json index 0b4a35922d8..fc87e031a4e 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1136.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1136.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1136", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.417", - "lastModified": "2023-02-13T04:33:02.933", + "lastModified": "2024-11-21T01:36:30.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -481,6 +480,109 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800594", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48300", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2428", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800594", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1137.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1137.json index 095537677c2..eb578aed622 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1137.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1137.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1137", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.480", - "lastModified": "2023-02-13T04:33:03.947", + "lastModified": "2024-11-21T01:36:30.773", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -465,6 +464,93 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800595", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800595", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1138.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1138.json index b1fb54525f5..ac20d96604e 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1138.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1138.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1138", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.527", - "lastModified": "2021-01-26T12:43:34.040", + "lastModified": "2024-11-21T01:36:30.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -465,6 +464,93 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800597", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800597", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1139.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1139.json index eda9570cb17..d39e3e1a962 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1139.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1139.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1139", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.557", - "lastModified": "2023-02-13T00:23:25.857", + "lastModified": "2024-11-21T01:36:31.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -473,6 +472,101 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800598", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800598", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1140.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1140.json index 73edf25fe0f..fb0dea146b2 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1140.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1140.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1140", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.607", - "lastModified": "2023-02-13T04:33:04.987", + "lastModified": "2024-11-21T01:36:31.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -453,6 +452,81 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800600", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800600", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1141.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1141.json index 25fcda5025b..7435dc58ab6 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1141.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1141.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1141", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.650", - "lastModified": "2023-02-13T00:23:37.737", + "lastModified": "2024-11-21T01:36:31.317", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -473,6 +472,101 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800602", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800602", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1142.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1142.json index 04839c44def..8c7b31daa7b 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1142.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1142.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1142", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.683", - "lastModified": "2023-02-13T00:23:39.990", + "lastModified": "2024-11-21T01:36:31.487", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -481,6 +480,109 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800604", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48300", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2428", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800604", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1143.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1143.json index 3cb02257c1c..6cd1e619eb6 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1143.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1143.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1143", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.730", - "lastModified": "2023-02-13T00:23:52.013", + "lastModified": "2024-11-21T01:36:31.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -473,6 +472,101 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800606", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800606", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1144.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1144.json index cb7276e14e0..594c7dbdbf1 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1144.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1144.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1144", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-25T10:10:18.777", - "lastModified": "2023-02-13T04:33:05.753", + "lastModified": "2024-11-21T01:36:31.777", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -461,6 +460,89 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48300", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2428", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/06/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026765", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1403-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=733512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1145.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1145.json index 2dcc080d814..87a474588a2 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1145.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1145.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1145", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-16T00:55:06.030", - "lastModified": "2022-02-03T20:00:08.163", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:31.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -128,6 +127,51 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0436.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48664", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.osvdb.org/81481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52832", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74498", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1146.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1146.json index 9a761c5031d..2980963c0a8 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1146.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1146.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1146", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-17T11:00:37.397", - "lastModified": "2023-02-13T04:33:06.237", + "lastModified": "2024-11-21T01:36:32.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -219,6 +218,86 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=371528caec553785c37f73fa3926ea0de84f986f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075781.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48898", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/48964", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800813", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73711", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1147.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1147.json index 1b88afd2157..40857c78c77 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1147.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1147.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1147", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T19:55:02.663", - "lastModified": "2021-01-25T15:44:35.543", + "lastModified": "2024-11-21T01:36:32.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -174,6 +173,48 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/xmlwf/readfilemap.c?r1=1.14&r2=1.15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/tracker/?func=detail&aid=2895533&group_id=10127&atid=110127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://trac.wxwidgets.org/ticket/11194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://trac.wxwidgets.org/ticket/11432", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1034344", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205637", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1148.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1148.json index f01967b264c..e623ec370f3 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1148.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1148.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1148", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T19:55:02.757", - "lastModified": "2021-01-25T15:44:35.543", + "lastModified": "2024-11-21T01:36:32.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -206,6 +205,84 @@ { "url": "https://support.apple.com/HT205637", "source": "secalert@redhat.com" + }, + { + "url": "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166&r2=1.167", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0731.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-0062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2016-2957.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49504", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51024", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/projects/expat/files/expat/2.1.0/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/tracker/?func=detail&atid=110127&aid=2958794&group_id=10127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id/1034344", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1527-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1613-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1613-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/HT205637", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1149.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1149.json index e6ae7b8afcd..839ccc9fc23 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1149.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1149.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1149", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-21T15:55:11.537", - "lastModified": "2023-02-13T00:23:54.857", + "lastModified": "2024-11-21T01:36:32.383", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -320,6 +319,149 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75692", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0089.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082168.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081319.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0705.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/46992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49373", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49392", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50692", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/60799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://securitytracker.com/id?1027068", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2473", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2487", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.libreoffice.org/advisories/cve-2012-1149/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:090", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:091", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openoffice.org/security/cves/CVE-2012-1149.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/81988", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53570", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75692", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1151.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1151.json index 05067a898ce..4a96b372cc9 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1151.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1151.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1151", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:05.213", - "lastModified": "2017-08-29T01:31:13.287", + "lastModified": "2024-11-21T01:36:32.673", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -733,6 +732,72 @@ { "url": "https://rt.cpan.org/Public/Bug/Display.html?id=75642", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1116.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48307", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48319", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48824", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201204-08.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:112", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/09/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/10/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801733", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73854", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73855", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://rt.cpan.org/Public/Bug/Display.html?id=75642", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1152.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1152.json index ac2d1ed66b1..4df4944a9dc 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1152.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1152.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1152", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:05.527", - "lastModified": "2017-08-29T01:31:13.383", + "lastModified": "2024-11-21T01:36:32.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -138,6 +137,73 @@ { "url": "https://rt.cpan.org/Public/Bug/Display.html?id=75365", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077782.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48317", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2432", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/09/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/10/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52381", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801738", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73856", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://rt.cpan.org/Public/Bug/Display.html?id=46507", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://rt.cpan.org/Public/Bug/Display.html?id=75365", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1162.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1162.json index d9682b06a81..633d191d0de 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1162.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1162.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1162", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-12T20:55:14.920", - "lastModified": "2012-07-13T14:50:48.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:34.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,36 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/03/29/11", "source": "secalert@redhat.com" + }, + { + "url": "http://nih.at/listarchive/libzip-discuss/msg00252.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-23.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.nih.at/libzip/NEWS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/21/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/29/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1163.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1163.json index abba0c7bb61..525d810b76e 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1163.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1163.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1163", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-12T20:55:15.000", - "lastModified": "2012-07-16T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:34.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,30 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/03/29/11", "source": "secalert@redhat.com" + }, + { + "url": "http://nih.at/listarchive/libzip-discuss/msg00252.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-23.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.nih.at/libzip/NEWS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/21/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/29/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1164.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1164.json index e6010648fa1..eb86a2c2940 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1164.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1164.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1164", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:03.327", - "lastModified": "2017-01-07T02:59:04.543", + "lastModified": "2024-11-21T01:36:34.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -240,6 +239,59 @@ { "url": "https://support.apple.com/kb/HT210788", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0899.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2019/Dec/26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48372", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49607", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:130", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openldap.org/its/index.cgi/Software%20Bugs?id=7143", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openldap.org/software/release/changes.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://seclists.org/bugtraq/2019/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT210788", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1165.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1165.json index 93a9f05842f..b325279fa05 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1165.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1165.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1165", "sourceIdentifier": "secalert@redhat.com", "published": "2012-03-15T17:55:00.977", - "lastModified": "2018-01-13T02:29:11.537", + "lastModified": "2024-11-21T01:36:34.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -516,6 +515,10 @@ "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", "source": "secalert@redhat.com" }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "secalert@redhat.com" + }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077086.html", "source": "secalert@redhat.com" @@ -536,6 +539,14 @@ "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", + "source": "secalert@redhat.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", "source": "secalert@redhat.com" @@ -611,6 +622,122 @@ { "url": "https://downloads.avaya.com/css/P8/documents/100162507", "source": "secalert@redhat.com" + }, + { + "url": "http://cvs.openssl.org/chngview?cn=22252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077221.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077666.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0426.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0488.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1306.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1307.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1308.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48899", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/12/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/12/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/12/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/13/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52764", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1424-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://downloads.avaya.com/css/P8/documents/100162507", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1172.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1172.json index ab971347f75..d578d2e4357 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1172.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1172.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1172", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-24T00:55:02.507", - "lastModified": "2018-01-18T02:29:12.023", + "lastModified": "2024-11-21T01:36:35.330", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -348,6 +347,10 @@ "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://openwall.com/lists/oss-security/2012/03/13/4", "source": "secalert@redhat.com" @@ -410,6 +413,108 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://isisblogs.poly.edu/2011/08/11/php-not-properly-checking-params/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080041.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080070.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/03/13/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5501", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/rfc1867.c?r1=321664&r2=321663&pathrev=321664", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://svn.php.net/viewvc?view=revision&revision=321664", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2465", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.php.net/ChangeLog-5.php#5.4.0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=48597", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=49683", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=54374", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=55500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://nealpoole.com/blog/2011/10/directory-traversal-via-php-multi-file-uploads/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://students.mimuw.edu.pl/~ai292615/php_multipleupload_overwrite.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1173.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1173.json index dadf4ae04c4..0ee601dac67 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1173.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1173.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1173", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-04T20:55:03.447", - "lastModified": "2023-02-13T00:23:58.090", + "lastModified": "2024-11-21T01:36:35.487", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -194,6 +193,129 @@ { "url": "https://hermes.opensuse.org/messages/14302713", "source": "secalert@redhat.com" + }, + { + "url": "http://bugzilla.maptools.org/attachment.cgi?id=477&action=diff", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2369", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://home.gdal.org/private/zdi-can-1221/zdi-can-1221.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077463.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078403.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078835.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0468.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48684", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48722", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48735", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48757", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48893", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50726", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5501", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-1416-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2447", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:054", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81025", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52891", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://downloads.avaya.com/css/P8/documents/100161772", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74656", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/14302713", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1174.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1174.json index 69b92bdb0c3..d79b66b8ce9 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1174.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1174.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1174", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-12T20:55:15.513", - "lastModified": "2012-08-14T03:35:28.973", + "lastModified": "2024-11-21T01:36:35.637", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -95,6 +94,30 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803358", "source": "secalert@redhat.com" + }, + { + "url": "http://cgit.freedesktop.org/systemd/systemd/commit/?id=5ebff5337594d690b322078c512eb222d34aaa82", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079075.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/16/21", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803358", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1175.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1175.json index 5e773c5299a..a84795f1a14 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1175.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1175.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1175", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T20:55:00.793", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:35.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,38 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803443", "source": "secalert@redhat.com" + }, + { + "url": "http://git.savannah.gnu.org/cgit/gnash.git/commit/?id=bb4dc77eecb6ed1b967e3ecbce3dac6c5e6f1527", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48466", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2435", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/14/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/14/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52446", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803443", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1176.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1176.json index 063198eedc9..8b27f672821 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1176.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1176.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1176", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T20:55:00.903", - "lastModified": "2017-08-29T01:31:13.647", + "lastModified": "2024-11-21T01:36:35.870", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -124,6 +123,58 @@ { "url": "https://github.com/pediapress/pyfribidi/issues/2%29:", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663189", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://groups.google.com/group/linux.debian.bugs.dist/browse_thread/thread/aacd036037217998/8d095f85f3665bff?lnk=raot", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075293.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/14/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/14/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52451", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/pediapress/pyfribidi/commit/d2860c655357975e7b32d84e6b45e98f0dcecd7a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/pediapress/pyfribidi/issues/2%29:", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1177.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1177.json index e78a7d382ac..eeb89c2458c 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1177.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1177.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1177", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T20:55:00.980", - "lastModified": "2013-04-05T03:09:06.800", + "lastModified": "2024-11-21T01:36:36.003", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -136,6 +135,54 @@ { "url": "https://bugzilla.novell.com/show_bug.cgi?id=752088", "source": "secalert@redhat.com" + }, + { + "url": "http://git.gnome.org/browse/libgdata/commit/?h=libgdata-0-10&id=8eff8fa9138859e03e58c2aa76600ab63eb5c29c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.gnome.org/browse/libgdata/commit/?id=6799f2c525a584dc998821a6ce897e463dad7840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50432", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2482", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/14/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1547-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/ubuntu/+source/libgdata/+bug/938812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=671535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=752088", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1178.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1178.json index b4a9befdfde..e3dae8e5a48 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1178.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1178.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1178", "sourceIdentifier": "secalert@redhat.com", "published": "2012-03-15T10:55:01.417", - "lastModified": "2018-01-18T02:29:12.240", + "lastModified": "2024-11-21T01:36:36.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -336,6 +335,45 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18019", "source": "secalert@redhat.com" + }, + { + "url": "http://developer.pidgin.im/ticket/14884", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://developer.pidgin.im/viewmtn/revision/diff/60f8379d0a610538cf42e0dd9ab1436c8b9308cd/with/3053d6a37cc6d8774aba7607b992a4408216adcd/libpurple/protocols/msn/oim.c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://developer.pidgin.im/viewmtn/revision/info/3053d6a37cc6d8774aba7607b992a4408216adcd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pidgin.im/news/security/?id=61", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:029", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52475", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18019", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1179.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1179.json index 67946a0d2b3..c49bfa02514 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1179.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1179.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1179", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-17T11:00:37.587", - "lastModified": "2017-12-29T02:29:12.957", + "lastModified": "2024-11-21T01:36:36.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:C", + "baseScore": 5.2, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.4, @@ -116,6 +115,50 @@ { "url": "https://github.com/torvalds/linux/commit/4a1d704194a441bf83c636004a479e01360ec850", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075781.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48404", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/15/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027084", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803793", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/4a1d704194a441bf83c636004a479e01360ec850", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1180.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1180.json index da7673e9443..ae1044943f7 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1180.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1180.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1180", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-17T21:55:01.227", - "lastModified": "2021-11-10T15:57:01.280", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:36.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -280,6 +279,166 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077966.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076646.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076671.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://nginx.org/download/patch.2012.memory.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://nginx.org/en/security_advisories.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/80124", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://seclists.org/bugtraq/2012/Mar/65", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201203-22.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://trac.nginx.org/nginx/changeset/4530/nginx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://trac.nginx.org/nginx/changeset/4531/nginx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2434", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:043", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/15/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/15/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026827", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803856", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74191", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/14173096", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1181.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1181.json index f4c0d8f50de..aa152648938 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1181.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1181.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1181", "sourceIdentifier": "secalert@redhat.com", "published": "2012-03-19T21:55:01.077", - "lastModified": "2017-08-29T01:31:13.867", + "lastModified": "2024-11-21T01:36:36.543", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -107,6 +106,37 @@ "tags": [ "Patch" ] + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=615814", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2436", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/15/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/16/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74181", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=49902", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1182.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1182.json index f293b5272a6..52288eb434e 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1182.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1182.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1182", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-10T21:55:02.203", - "lastModified": "2018-10-30T16:25:59.730", + "lastModified": "2024-11-21T01:36:36.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -848,6 +847,14 @@ "url": "http://marc.info/?l=bugtraq&m=133951282306605&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=133951282306605&w=2", + "source": "secalert@redhat.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134323086902585&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=134323086902585&w=2", "source": "secalert@redhat.com" @@ -918,6 +925,125 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133951282306605&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133951282306605&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134323086902585&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134323086902585&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48751", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48754", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48816", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48844", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48873", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48879", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48999", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5281", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2450", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.samba.org/samba/history/samba-3.6.4.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026913", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1423-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.samba.org/samba/security/CVE-2012-1182", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1185.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1185.json index b537b387ce7..a52550b3634 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1185.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1185.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1185", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-05T22:55:09.887", - "lastModified": "2023-11-07T02:10:13.767", + "lastModified": "2024-11-21T01:36:37.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -264,6 +263,111 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/47926", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/48974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49043", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49317", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://trac.imagemagick.org/changeset/6998/ImageMagick/branches/ImageMagick-6.7.5/magick/profile.c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://trac.imagemagick.org/changeset/6998/ImageMagick/branches/ImageMagick-6.7.5/magick/property.c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1435-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2462", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/19/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/80556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51957", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1185", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1186.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1186.json index 83445790b6a..95d3e49ffd3 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1186.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1186.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1186", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-05T22:55:09.950", - "lastModified": "2023-11-07T02:10:13.830", + "lastModified": "2024-11-21T01:36:37.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -257,6 +256,104 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/47926", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/48974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49043", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49317", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://trac.imagemagick.org/changeset/6998/ImageMagick/branches/ImageMagick-6.7.5/magick/profile.c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1435-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2462", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/19/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/80555", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51957", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1186", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76139", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1190.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1190.json index fcd5141b9a9..eba09b9fd90 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1190.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1190.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1190", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-03T04:08:25.170", - "lastModified": "2018-01-18T02:29:12.773", + "lastModified": "2024-11-21T01:36:37.833", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -181,6 +180,46 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079435.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079475.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079566.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2012-1.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52857", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75304", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/86073d532aed656550cb731aa5b4288b126ae7a6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1191.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1191.json index 01e69bb2f54..1c477eb7ba5 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1191.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1191.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1191", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-17T22:55:00.650", - "lastModified": "2012-02-20T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:38.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://www.isc.org/files/imce/ghostdomain_camera.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1192.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1192.json index cbda4c61de5..09ad441c1de 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1192.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1192.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1192", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-17T22:55:00.697", - "lastModified": "2012-02-20T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:38.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -256,6 +255,10 @@ { "url": "https://www.isc.org/files/imce/ghostdomain_camera.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://www.isc.org/files/imce/ghostdomain_camera.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1193.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1193.json index 835ad10d0f1..ddb75e6b799 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1193.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1193.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1193", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-17T22:55:00.747", - "lastModified": "2013-12-13T04:57:32.960", + "lastModified": "2024-11-21T01:36:38.280", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102729.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104173.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104177.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.isc.org/files/imce/ghostdomain_camera.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1194.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1194.json index 0ba7fd61107..43948e6831f 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1194.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1194.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1194", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-17T22:55:00.777", - "lastModified": "2012-02-20T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:38.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -89,6 +88,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://www.isc.org/files/imce/ghostdomain_camera.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1195.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1195.json index e63258022c9..76ac25d7641 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1195.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1195.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1195", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-18T00:55:02.543", - "lastModified": "2017-08-29T01:31:14.537", + "lastModified": "2024-11-21T01:36:38.557", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Vulnerabilidad de subida de ficheros sin restricci\u00f3n en andesk/managementsuite/core/core.anonymous/ServerSetup.asmx en el servicio web ServerSetup en Lenovo ThinkManagement Console v9.0.3 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante la subida de archivos con extensi\u00f3n ejecutable a trav\u00e9s de un comando PutUpdateFileCore en una petici\u00f3n RunAMTCommand SOAP, y accediendo al archivo a trav\u00e9s de una peticici\u00f3n directa al archivo en la ra\u00edz web." } ], - "vendorComments": [ - { - "organization": "LANDESK", - "comment": "LANDesk is aware of and has resolved this issue. For tracking purposes within LANDesk this vulnerability was given defect number 30319. This issue was resolved in the LD90-SP3-CP_BASE-2012-0412 component patch, available here: http://community.landesk.com/downloads/patch/component/LD90-SP3-CP_BASE-2012-0412a.exe . For details around other fixes contained in the component patch please refer to http://community.landesk.com/support/docs/DOC-24787", - "lastModified": "2012-05-08T00:00:00" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +93,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73207", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47666", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52023", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026693", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73207", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "vendorComments": [ + { + "organization": "LANDESK", + "comment": "LANDesk is aware of and has resolved this issue. For tracking purposes within LANDesk this vulnerability was given defect number 30319. This issue was resolved in the LD90-SP3-CP_BASE-2012-0412 component patch, available here: http://community.landesk.com/downloads/patch/component/LD90-SP3-CP_BASE-2012-0412a.exe . For details around other fixes contained in the component patch please refer to http://community.landesk.com/support/docs/DOC-24787", + "lastModified": "2012-05-08T00:00:00" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1196.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1196.json index 5cc33a85743..bdca77b24f9 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1196.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1196.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1196", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-18T00:55:02.590", - "lastModified": "2017-08-29T01:31:14.600", + "lastModified": "2024-11-21T01:36:38.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Vulnerabilidad de salto de directorio en el servicio web VulCore (WSVulnerabilityCore/VulCore.asmx) en Lenovo ThinkManagement Console v9.0.3, permite a atacantes remotos borrar archivos de su elecci\u00f3n a trav\u00e9s de .. (punto punto) en el par\u00e1metro filemane en una petici\u00f3n SetTaskLogByFile SOAP" } ], - "vendorComments": [ - { - "organization": "LANDESK", - "comment": "LANDesk is aware of and has resolved this issue. For tracking purposes within LANDesk this vulnerability was given defect number 30320. This issue was resolved in the LD90-SP3-CP_BASE-2012-0412 component patch, available here: http://community.landesk.com/downloads/patch/component/LD90-SP3-CP_BASE-2012-0412a.exe . For details around other fixes contained in the component patch please refer to http://community.landesk.com/support/docs/DOC-24787", - "lastModified": "2012-05-08T00:00:00" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -101,6 +93,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73208", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47666", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52023", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026693", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73208", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "vendorComments": [ + { + "organization": "LANDESK", + "comment": "LANDesk is aware of and has resolved this issue. For tracking purposes within LANDesk this vulnerability was given defect number 30320. This issue was resolved in the LD90-SP3-CP_BASE-2012-0412 component patch, available here: http://community.landesk.com/downloads/patch/component/LD90-SP3-CP_BASE-2012-0412a.exe . For details around other fixes contained in the component patch please refer to http://community.landesk.com/support/docs/DOC-24787", + "lastModified": "2012-05-08T00:00:00" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1197.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1197.json index e9b8cb03c96..07a01ebe92e 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1197.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1197.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1197", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-18T00:55:02.637", - "lastModified": "2017-08-29T01:31:14.663", + "lastModified": "2024-11-21T01:36:38.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73242", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73242", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1198.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1198.json index 1536cab910e..69de6deff5d 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1198.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1198.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1198", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-18T00:55:02.730", - "lastModified": "2017-08-29T01:31:14.710", + "lastModified": "2024-11-21T01:36:38.977", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73201", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109663/BASE-1.4.5-Remote-File-Inclusion-Shell-Creation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73201", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-11xx/CVE-2012-1199.json b/CVE-2012/CVE-2012-11xx/CVE-2012-1199.json index b1f447588f5..8cbbd635ed2 100644 --- a/CVE-2012/CVE-2012-11xx/CVE-2012-1199.json +++ b/CVE-2012/CVE-2012-11xx/CVE-2012-1199.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1199", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-18T00:55:02.777", - "lastModified": "2017-08-29T01:31:14.757", + "lastModified": "2024-11-21T01:36:39.113", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73200", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109663/BASE-1.4.5-Remote-File-Inclusion-Shell-Creation.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73200", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1200.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1200.json index e5cd6a21887..414c308ebbe 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1200.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1200.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1200", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-18T00:55:02.807", - "lastModified": "2017-08-29T01:31:14.820", + "lastModified": "2024-11-21T01:36:39.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73159", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109669/Nova-CMS-Remote-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51976", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73159", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1205.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1205.json index 328980dcd9e..56599bb0693 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1205.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1205.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1205", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:05.127", - "lastModified": "2012-02-24T13:55:05.127", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:39.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +126,39 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/79250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset/504380/relocate-upload", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/47976", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/relocate-upload/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/49693", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1206.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1206.json index 9b6bc9b15af..9cc32603f2d 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1206.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1206.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1206", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:06.750", - "lastModified": "2017-08-29T01:31:14.913", + "lastModified": "2024-11-21T01:36:39.683", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -102,6 +101,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73026", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/78906", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/78907", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47386", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.hancom.co.kr/notice.noticeView.do?targetRow=1¬ice_seqno=100", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51892", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73025", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73026", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1207.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1207.json index ad3825994c9..4043f7ab07e 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1207.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1207.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1207", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:07.343", - "lastModified": "2017-08-29T01:31:14.977", + "lastModified": "2024-11-21T01:36:39.823", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -100,6 +99,35 @@ "tags": [ "Patch" ] + }, + { + "url": "http://packetstormsecurity.org/files/109709/Fork-CMS-3.2.4-Cross-Site-Scripting-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.fork-cms.com/blog/detail/fork-cms-3-2-5-released", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51972", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73169", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/forkcms/forkcms/commit/a9986b86c53de0582248b39605660fbba0c21a29", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1208.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1208.json index dc36d29dab8..59f5d2d5fac 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1208.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1208.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1208", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:07.390", - "lastModified": "2012-02-24T13:55:07.390", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:39.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +119,55 @@ "Exploit", "Patch" ] + }, + { + "url": "http://packetstormsecurity.org/files/109709/Fork-CMS-3.2.4-Cross-Site-Scripting-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.fork-cms.com/blog/detail/fork-cms-3-2-5-released", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51972", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/forkcms/forkcms/commit/8fa74dd3e2e32723cd121177dce6aeac37e29df6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/forkcms/forkcms/commit/d65c083adc91c88d21bd9a0df4c2688df634c6ff", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/forkcms/forkcms/commit/df75e0797a6540c4d656969a2e7df7689603b2cf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1209.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1209.json index 6b93b2bb1f2..1876f6c19db 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1209.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1209.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1209", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:07.437", - "lastModified": "2018-01-11T02:29:03.733", + "lastModified": "2024-11-21T01:36:40.117", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,30 @@ "Exploit", "Patch" ] + }, + { + "url": "http://www.fork-cms.com/blog/detail/fork-cms-3-2-5-released", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73393", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/forkcms/forkcms/commit/c8ec9c58a6b3c46cdd924532c1de99bcda6072ed", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/forkcms/forkcms/commit/df75e0797a6540c4d656969a2e7df7689603b2cf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1210.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1210.json index 5b6bf5ffae1..1196293b6a3 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1210.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1210.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1210", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:07.703", - "lastModified": "2017-08-29T01:31:15.023", + "lastModified": "2024-11-21T01:36:40.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73166", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73166", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1211.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1211.json index 37f4f4b0e28..d5df451022f 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1211.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1211.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1211", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:07.733", - "lastModified": "2017-08-29T01:31:15.087", + "lastModified": "2024-11-21T01:36:40.410", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73165", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109670/Pfile-1.02-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73165", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1212.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1212.json index e81880cea29..09be911d5d0 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1212.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1212.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1212", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:07.877", - "lastModified": "2017-08-29T01:31:15.133", + "lastModified": "2024-11-21T01:36:40.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -154,6 +153,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73167", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109637/SMW-1.5.6-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47968", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://st2tea.blogspot.com/2012/02/smw-enterprise-wiki-156-cross-site.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51980", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73167", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1213.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1213.json index 7d651a1cdbb..ab2990709c3 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1213.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1213.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1213", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-24T13:55:07.907", - "lastModified": "2017-11-18T02:29:00.260", + "lastModified": "2024-11-21T01:36:40.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73168", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109710/Zimbra-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://st2tea.blogspot.com/2012/02/zimbra-cross-site-scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.zimbra.com/show_bug.cgi?id=63849", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73168", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1214.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1214.json index 57ded344734..00ac380a01d 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1214.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1214.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1214", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:21.750", - "lastModified": "2017-08-29T01:31:15.240", + "lastModified": "2024-11-21T01:36:40.833", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73149", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109618/#comment-10343", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.org/files/109618/Yoono-Desktop-1.8.16-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://support.yoono.com/yoono/topics/xss-w35in", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73149", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1215.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1215.json index d5c8ec817de..59357d72d26 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1215.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1215.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1215", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:21.830", - "lastModified": "2017-08-29T01:31:15.287", + "lastModified": "2024-11-21T01:36:40.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73150", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109617/#comment-10344", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.org/files/109617/Yoono-Firefox-7.7.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://support.yoono.com/yoono/topics/xss-w35in", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51970", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73150", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1216.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1216.json index 1b22ad8de38..6c097f11474 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1216.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1216.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1216", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:21.877", - "lastModified": "2012-02-24T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:41.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://packetstormsecurity.org/files/109706/PBBoard-2.1.4-Cross-Site-Request-Forgery-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47948", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1217.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1217.json index 001019ef8f9..54925103502 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1217.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1217.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1217", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:21.970", - "lastModified": "2017-08-29T01:31:15.350", + "lastModified": "2024-11-21T01:36:41.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73154", "source": "cve@mitre.org" + }, + { + "url": "http://0nto.wordpress.com/2012/02/13/sths-v2-web-portal-2-2-sql-injection-vulnerabilty/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.org/files/109665/STHS-v2-Web-Portal-2.2-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51991", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73154", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1218.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1218.json index 2e757489f16..2ca21685f28 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1218.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1218.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1218", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:46.063", - "lastModified": "2017-08-29T01:31:15.397", + "lastModified": "2024-11-21T01:36:41.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73105", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/47766", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51946", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=402", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73105", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1219.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1219.json index c257c85ff7b..3fc3644b563 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1219.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1219.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1219", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:46.093", - "lastModified": "2017-08-29T01:31:15.447", + "lastModified": "2024-11-21T01:36:41.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73104", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/47766", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51946", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=402", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73104", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1220.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1220.json index a619c471178..e682a4cba93 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1220.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1220.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1220", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:47.047", - "lastModified": "2017-08-29T01:31:15.507", + "lastModified": "2024-11-21T01:36:41.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -365,6 +364,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72991", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/47947", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18464", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72991", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1221.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1221.json index f1bd88c0f10..719908d57d5 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1221.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1221.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1221", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:47.423", - "lastModified": "2017-08-29T01:31:15.570", + "lastModified": "2024-11-21T01:36:41.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73114", "source": "cve@mitre.org" + }, + { + "url": "http://aluigi.org/adv/r2_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47966", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/79094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52061", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73114", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1222.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1222.json index ee9d28250b6..bc6bcdaa442 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1222.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1222.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1222", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:47.453", - "lastModified": "2017-08-29T01:31:15.633", + "lastModified": "2024-11-21T01:36:42.003", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -103,6 +102,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73113", "source": "cve@mitre.org" + }, + { + "url": "http://aluigi.org/adv/r2_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/79093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47966", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52061", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73113", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1223.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1223.json index a9f8059203f..b685215b3a9 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1223.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1223.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1223", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:47.487", - "lastModified": "2017-08-29T01:31:15.680", + "lastModified": "2024-11-21T01:36:42.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73115", "source": "cve@mitre.org" + }, + { + "url": "http://aluigi.org/adv/r2_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/79095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47966", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73115", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1224.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1224.json index 97a2fdb3e2d..431d3333576 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1224.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1224.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1224", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:47.767", - "lastModified": "2012-02-22T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:42.283", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/78833", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.darksecurity.de/advisories/2012/SSCHADV2012-004.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1225.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1225.json index 2dff239940e..be5521d7483 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1225.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1225.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1225", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:47.797", - "lastModified": "2022-11-17T17:21:59.260", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:42.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -157,6 +156,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0056.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/79011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47969", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/51956", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1226.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1226.json index dcf9085ffeb..0ee9a209d1d 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1226.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1226.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1226", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:47.830", - "lastModified": "2022-11-17T17:21:59.260", + "lastModified": "2024-11-21T01:36:42.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -105,6 +104,40 @@ { "url": "https://github.com/Dolibarr/dolibarr/commit/8f9b9987ffb42cfbe907fe31ded3001bfc1b3417", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0168.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18480", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/521583", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=428", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73136", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Dolibarr/dolibarr/commit/5381986e50dd6055f2b3b63281eaacffa0449da2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Dolibarr/dolibarr/commit/8f9b9987ffb42cfbe907fe31ded3001bfc1b3417", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1227.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1227.json index 34c4ce47ad9..82de30729d9 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1227.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1227.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1227", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:47.860", - "lastModified": "2012-02-24T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:42.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/79005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47934", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18474", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1234.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1234.json index f22987aad28..fb0f92e7302 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1234.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1234.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1234", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:57.297", - "lastModified": "2012-02-23T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:42.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -85,6 +84,14 @@ "Patch", "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-047-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1235.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1235.json index 5f62c7f421f..f7cd364ad90 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1235.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1235.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1235", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-21T13:31:57.330", - "lastModified": "2012-02-23T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:42.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -85,6 +84,14 @@ "Patch", "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-047-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1236.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1236.json index 5675d3fd2bc..a61f68c57e4 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1236.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1236.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1236", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-03-19T21:55:01.123", - "lastModified": "2012-06-09T03:41:31.540", + "lastModified": "2024-11-21T01:36:43.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -257,6 +256,26 @@ { "url": "http://secunia.com/advisories/48480", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://blog.janetter.net/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://janetter.net/history.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN83459967/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48480", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1237.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1237.json index 43e30de4a27..1b02b99f5de 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1237.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1237.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1237", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-04-06T18:55:01.917", - "lastModified": "2012-11-20T04:42:55.750", + "lastModified": "2024-11-21T01:36:43.200", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,25 @@ { "url": "http://www.securityfocus.com/bid/52900", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN44913777/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000029", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.icz.co.jp/news/?p=501", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52900", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1238.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1238.json index ae7eb67533f..7ad6fe17a19 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1238.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1238.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1238", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-04-06T18:55:01.980", - "lastModified": "2012-11-20T04:42:55.987", + "lastModified": "2024-11-21T01:36:43.303", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/384.html 'CWE-384: Session Fixation'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +99,30 @@ { "url": "http://www.securityfocus.com/bid/52900", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN97200417/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.icz.co.jp/news/?p=501", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://osvdb.org/81020", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52900", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/384.html 'CWE-384: Session Fixation'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1239.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1239.json index 06b340182ac..ad06bf35c70 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1239.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1239.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1239", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-04-06T19:55:01.480", - "lastModified": "2012-04-09T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:43.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -398,6 +397,18 @@ { "url": "http://www.toshibatec.co.jp/information/2012/20120405/", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN92830293/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000028", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.toshibatec.co.jp/information/2012/20120405/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1240.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1240.json index 91c1644bdc6..110396e18e6 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1240.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1240.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1240", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-04-16T16:55:01.667", - "lastModified": "2017-12-29T02:29:13.033", + "lastModified": "2024-11-21T01:36:43.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74893", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN90055996/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48813", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53008", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chrome.google.com/webstore/detail/cfmkbngdlheahmooldblflapbpngmmbg", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74893", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1241.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1241.json index ba9d762d821..b8b0fa5b152 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1241.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1241.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1241", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-04-16T16:55:01.727", - "lastModified": "2017-12-29T02:29:13.113", + "lastModified": "2024-11-21T01:36:43.633", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -401,6 +400,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74866", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-list/47170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN33283707/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48811", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74866", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1242.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1242.json index 5d1262acad5..46a9a214cf5 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1242.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1242.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1242", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-04-27T18:55:00.987", - "lastModified": "2017-12-14T02:29:00.433", + "lastModified": "2024-11-21T01:36:43.757", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -186,6 +184,26 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN95378720/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81472", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.justsystems.com/jp/info/js12001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1243.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1243.json index c7e7f6b0b4d..274d9ce2773 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1243.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1243.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1243", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-04-22T03:44:43.370", - "lastModified": "2017-12-29T02:29:13.190", + "lastModified": "2024-11-21T01:36:43.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -131,6 +130,34 @@ { "url": "https://play.google.com/store/apps/details?id=com.studiohitori.twitrocker2", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN00000601/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000033", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81447", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48894", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://play.google.com/store/apps/details?id=com.studiohitori.twitrocker2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1244.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1244.json index a5ecae34041..cc356961485 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1244.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1244.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1244", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-04-27T18:55:01.047", - "lastModified": "2017-12-14T02:29:00.497", + "lastModified": "2024-11-21T01:36:43.970", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -196,6 +195,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN82029095/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48955", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53254", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1245.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1245.json index 811930e35a7..68aad456e84 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1245.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1245.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1245", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-04-27T16:55:01.953", - "lastModified": "2017-12-14T02:29:00.560", + "lastModified": "2024-11-21T01:36:44.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75182", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN15503729/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://svn.osqa.net/changelog/OSQA/osqa/trunk?cs=1234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53259", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75182", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1246.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1246.json index a4dcc917264..495533579bb 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1246.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1246.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1246", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-05-15T20:55:01.697", - "lastModified": "2017-12-05T02:29:03.467", + "lastModified": "2024-11-21T01:36:44.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75673", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN47536971/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kent-web.com/cart/mart.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53539", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75673", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1247.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1247.json index 9562fe508d9..37a2a57714b 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1247.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1247.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1247", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-05-15T20:55:01.777", - "lastModified": "2017-12-05T02:29:03.527", + "lastModified": "2024-11-21T01:36:44.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -91,6 +90,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75674", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN63941302/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000042", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kent-web.com/cart/mart.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53541", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75674", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1248.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1248.json index 9fec83b2ee7..17a3cf0ad55 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1248.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1248.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1248", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-05-15T20:55:02.010", - "lastModified": "2021-09-14T12:10:01.390", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:44.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -255,6 +254,44 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://basercms.net/security/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN53465692/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000043", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53543", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75660", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1249.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1249.json index 2f4c3d51870..b016766273a 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1249.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1249.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1249", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-05-21T20:55:18.320", - "lastModified": "2013-01-04T04:36:51.133", + "lastModified": "2024-11-21T01:36:44.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -108,6 +107,30 @@ { "url": "https://play.google.com/store/apps/details?id=jp.co.lunascape.android.ilunascape", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN86044443/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53619", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://play.google.com/store/apps/details?id=jp.co.lunascape.android.ilunascape", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1250.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1250.json index 7fbc1ec267a..a3e5c006698 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1250.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1250.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1250", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-04T17:55:01.510", - "lastModified": "2022-02-25T18:40:35.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:44.627", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -131,6 +130,43 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN85934986/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://secunia.com/advisories/49289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.logitec.co.jp/info/2012/0516.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53685", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1251.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1251.json index 3ee0e86c144..30f199da2e8 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1251.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1251.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1251", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-04T17:55:01.633", - "lastModified": "2014-03-05T19:12:54.933", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:44.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -657,6 +656,26 @@ { "url": "http://www.opera.com/docs/changelogs/windows/963/", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN39707339/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/963/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/963/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/963/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1252.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1252.json index 9beb10fc7b4..66f3e6e53e5 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1252.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1252.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1252", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-04T15:55:01.790", - "lastModified": "2012-06-05T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:44.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -160,6 +159,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000048", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN77947437/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000048", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1253.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1253.json index 6f2089334ea..3e6f6d0c261 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1253.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1253.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1253", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-04T15:55:01.947", - "lastModified": "2012-06-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:44.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -219,6 +218,18 @@ { "url": "http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.7/", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN21422837/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.7/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1254.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1254.json index 5fa96e5b358..938429649e5 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1254.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1254.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1254", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-04T17:55:01.743", - "lastModified": "2021-04-06T13:27:48.527", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:45.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN29083866/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000052", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1255.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1255.json index a6afb534db6..00d5dc713ff 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1255.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1255.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1255", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-04T17:55:01.837", - "lastModified": "2021-04-06T13:28:44.437", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:45.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN97995841/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000053", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1256.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1256.json index 979f55c13e4..9576e5daae4 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1256.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1256.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1256", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-22T13:54:03.663", - "lastModified": "2012-03-21T03:54:00.630", + "lastModified": "2024-11-21T01:36:45.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,17 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://secunia.com/advisories/48124", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/273502", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1262.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1262.json index cefb1afd8c8..5c87a5d9085 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1262.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1262.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1262", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-03T04:04:57.797", - "lastModified": "2018-01-18T02:29:12.927", + "lastModified": "2024-11-21T01:36:46.160", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -763,6 +762,69 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN49836527/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000016", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/79470", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/110203/Movable-Type-Publishing-Platform-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Feb/407", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.movabletype.org/documentation/appendices/release-notes/513.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026738", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73411", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73480", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2012-003.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1264.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1264.json index 52302c9fb3d..ea890ae0b93 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1264.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1264.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1264", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-18T00:55:00.950", - "lastModified": "2018-01-11T02:29:03.793", + "lastModified": "2024-11-21T01:36:46.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74121", "source": "cve@mitre.org" + }, + { + "url": "http://gom.gomtv.com/gomIntro.html?type=4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74121", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1288.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1288.json index 090cfe7a10b..385c5984aab 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1288.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1288.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1288", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-23T12:33:55.470", - "lastModified": "2012-02-27T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:46.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/707254", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1289.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1289.json index bb6f88cc995..608c7f9264a 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1289.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1289.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1289", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-23T20:07:25.860", - "lastModified": "2017-08-29T01:31:15.990", + "lastModified": "2024-11-21T01:36:46.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -108,6 +107,43 @@ { "url": "https://service.sap.com/sap/support/notes/1585527", "source": "cve@mitre.org" + }, + { + "url": "http://dsecrg.com/pages/vul/show.php?id=412", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://dsecrg.com/pages/vul/show.php?id=413", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/47861", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sdn.sap.com/irj/sdn/index?rid=/webcontent/uuid/c05604f6-4eb3-2d10-eea7-ceb666083a6a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1585527", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1290.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1290.json index 5ef8d856111..8b592da6aeb 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1290.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1290.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1290", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-23T20:07:25.907", - "lastModified": "2012-02-24T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:46.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://service.sap.com/sap/support/notes/1583300", "source": "cve@mitre.org" + }, + { + "url": "http://dsecrg.com/pages/vul/show.php?id=414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47861", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sdn.sap.com/irj/sdn/index?rid=/webcontent/uuid/c05604f6-4eb3-2d10-eea7-ceb666083a6a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1583300", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1291.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1291.json index 0013e1abddb..fe295a31c3d 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1291.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1291.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1291", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-23T20:07:25.957", - "lastModified": "2012-02-24T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:46.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,29 @@ { "url": "https://service.sap.com/sap/support/notes/1585527", "source": "cve@mitre.org" + }, + { + "url": "http://dsecrg.com/pages/vul/show.php?id=415", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47861", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sdn.sap.com/irj/sdn/index?rid=/webcontent/uuid/c05604f6-4eb3-2d10-eea7-ceb666083a6a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1585527", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1292.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1292.json index e6ce809195f..98280091eb3 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1292.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1292.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1292", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-23T20:07:25.987", - "lastModified": "2012-02-27T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:47.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,29 @@ { "url": "https://service.sap.com/sap/support/notes/1585527", "source": "cve@mitre.org" + }, + { + "url": "http://dsecrg.com/pages/vul/show.php?id=416", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47861", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sdn.sap.com/irj/sdn/index?rid=/webcontent/uuid/c05604f6-4eb3-2d10-eea7-ceb666083a6a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1585527", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1294.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1294.json index b5385864e06..8c02bca45a3 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1294.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1294.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1294", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-23T20:12:01.033", - "lastModified": "2017-08-29T01:31:16.053", + "lastModified": "2024-11-21T01:36:47.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73303", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/109849/Impulsio-CMS-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52063", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73303", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1296.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1296.json index c797c5938bc..2f44c1746fc 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1296.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1296.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1296", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-26T20:55:01.043", - "lastModified": "2017-08-29T01:31:16.117", + "lastModified": "2024-11-21T01:36:47.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -133,6 +132,36 @@ { "url": "https://www.htbridge.com/advisory/HTB23076", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48118", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.elefantcms.com/forum/discussion/39/elefant-1.0.2-and-1.1.5-security-updates-released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.elefantcms.com/wiki/Changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73421", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23076", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-12xx/CVE-2012-1297.json b/CVE-2012/CVE-2012-12xx/CVE-2012-1297.json index 2a47778249c..d271c7cd4f1 100644 --- a/CVE-2012/CVE-2012-12xx/CVE-2012-1297.json +++ b/CVE-2012/CVE-2012-12xx/CVE-2012-1297.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1297", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:02.623", - "lastModified": "2019-06-11T13:02:30.000", + "lastModified": "2024-11-21T01:36:47.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -636,6 +635,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73479", "source": "cve@mitre.org" + }, + { + "url": "http://ivanobinetti.blogspot.com/2012/02/contaocms-fka-typolight-211-csrf-delete.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/110214/ContaoCMS-2.11.0-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48180", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18527", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73479", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1310.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1310.json index 4bcf8bb91ff..3f7f28a6ad0 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1310.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1310.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1310", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-03-29T11:01:16.387", - "lastModified": "2017-12-13T02:29:04.607", + "lastModified": "2024-11-21T01:36:48.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -109,6 +108,29 @@ { "url": "http://www.securitytracker.com/id?1026861", "source": "ykramarz@cisco.com" + }, + { + "url": "http://osvdb.org/80696", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-zbfw", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52753", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026861", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1311.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1311.json index 77695211661..4f171b370d4 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1311.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1311.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1311", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-03-29T11:01:16.433", - "lastModified": "2017-12-29T02:29:13.253", + "lastModified": "2024-11-21T01:36:48.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -138,6 +137,33 @@ { "url": "http://www.securitytracker.com/id?1026865", "source": "ykramarz@cisco.com" + }, + { + "url": "http://osvdb.org/80692", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48621", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-rsvp", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52754", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026865", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1312.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1312.json index 818a45d69d9..6bd7a95bd5d 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1312.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1312.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1312", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-03-29T11:01:16.463", - "lastModified": "2017-12-29T02:29:13.300", + "lastModified": "2024-11-21T01:36:48.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74429", "source": "ykramarz@cisco.com" + }, + { + "url": "http://osvdb.org/80703", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48595", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-mace", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52751", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026862", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74429", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1314.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1314.json index b5220a53b14..5b20e9e7219 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1314.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1314.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1314", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-03-29T11:01:16.527", - "lastModified": "2017-12-29T02:29:13.363", + "lastModified": "2024-11-21T01:36:48.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74428", "source": "ykramarz@cisco.com" + }, + { + "url": "http://osvdb.org/80702", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48595", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-mace", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52751", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026862", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74428", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1315.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1315.json index b7d1d95d661..5793e076e82 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1315.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1315.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1315", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-03-29T11:01:16.590", - "lastModified": "2017-12-13T02:29:04.670", + "lastModified": "2024-11-21T01:36:48.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -113,6 +112,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74437", "source": "ykramarz@cisco.com" + }, + { + "url": "http://osvdb.org/80699", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-zbfw", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52753", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026861", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74437", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1324.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1324.json index 6ca8e06382d..54593af7d9d 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1324.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1324.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1324", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-05-03T20:55:03.607", - "lastModified": "2017-12-07T02:29:10.460", + "lastModified": "2024-11-21T01:36:49.227", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75414", "source": "ykramarz@cisco.com" + }, + { + "url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-3TCAVS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75414", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1327.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1327.json index bbebf21c2ac..766c7f0678e 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1327.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1327.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1327", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-05-03T20:55:03.637", - "lastModified": "2017-12-07T02:29:10.523", + "lastModified": "2024-11-21T01:36:49.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -98,6 +97,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75413", "source": "ykramarz@cisco.com" + }, + { + "url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75413", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1328.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1328.json index b740fd702a3..985c79e1cf2 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1328.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1328.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1328", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-05-03T23:55:01.403", - "lastModified": "2017-12-07T02:29:10.570", + "lastModified": "2024-11-21T01:36:49.533", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -89,6 +88,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75412", "source": "ykramarz@cisco.com" + }, + { + "url": "http://www.cisco.com/en/US/docs/voice_ip_comm/cuipph/9971_9951_8961/firmware/9_2_3/release_notes/9900_8900_923.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75412", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1335.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1335.json index 1b31e6c2500..30eea9d97dd 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1335.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1335.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1335", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-04-05T13:25:16.163", - "lastModified": "2018-12-04T17:06:00.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:49.637", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -109,6 +108,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120404-webex", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1336.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1336.json index 5eadc9cd6c5..7b5a3a95013 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1336.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1336.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1336", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-04-05T13:25:16.210", - "lastModified": "2018-12-04T17:05:55.030", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:49.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -109,6 +108,21 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120404-webex", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1337.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1337.json index c6043561400..df6b4916953 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1337.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1337.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1337", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-04-05T13:25:16.240", - "lastModified": "2018-12-04T17:05:47.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:49.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -116,6 +115,28 @@ "tags": [ "VDB Entry" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120404-webex", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026888", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74606", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1338.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1338.json index dc350839aed..2662a372a20 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1338.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1338.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1338", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T17:55:00.697", - "lastModified": "2013-04-02T03:16:11.813", + "lastModified": "2024-11-21T01:36:49.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:C", + "baseScore": 6.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -134,6 +133,17 @@ { "url": "http://www.securitytracker.com/id?1027349", "source": "ykramarz@cisco.com" + }, + { + "url": "http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/15.0_1_se/release/notes/OL25302.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027349", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1339.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1339.json index 474772af5b7..275aa41df84 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1339.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1339.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1339", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T17:55:00.760", - "lastModified": "2018-10-30T16:26:47.373", + "lastModified": "2024-11-21T01:36:50.053", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id?1027350", "source": "ykramarz@cisco.com" + }, + { + "url": "http://www.cisco.com/en/US/docs/unified_computing/ucs/release/notes/OL_25363.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027350", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1340.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1340.json index cb14004e346..48b1347064c 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1340.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1340.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1340", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T17:55:00.807", - "lastModified": "2013-04-02T03:16:11.947", + "lastModified": "2024-11-21T01:36:50.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,17 @@ { "url": "http://www.securitytracker.com/id?1027348", "source": "ykramarz@cisco.com" + }, + { + "url": "http://www.cisco.com/en/US/docs/switches/datacenter/mds9000/sw/5_2/release/notes/nx-os/mds_nxos_rel_notes_522.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027348", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1342.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1342.json index 75b82dc453c..126242e5dbd 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1342.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1342.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1342", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T17:55:00.867", - "lastModified": "2020-03-24T18:19:35.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:50.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.8, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 1.4 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/cisco/software/release.html?mdfid=279506669&catid=268437899&flowid=1915&reltype=all&relind=AVAILABLE&release=3.9.2&softwareid=280867577", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1344.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1344.json index 4f23586c80c..7fda0464e53 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1344.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1344.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1344", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T18:55:00.837", - "lastModified": "2013-04-02T03:16:12.077", + "lastModified": "2024-11-21T01:36:50.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -87,6 +86,17 @@ { "url": "http://www.securitytracker.com/id?1027371", "source": "ykramarz@cisco.com" + }, + { + "url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027371", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1346.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1346.json index 0473f50384b..835af69e39e 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1346.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1346.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1346", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T18:55:00.883", - "lastModified": "2012-08-07T19:57:04.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:50.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.cisco.com/en/US/docs/voice_ip_comm/cer/8_7/english/release/notes/CER0_BK_CEE780BD_00_cisco-emergency-responder-87-release_chapter_00.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1348.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1348.json index be76e82316b..ee4bd787825 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1348.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1348.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1348", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T18:55:00.930", - "lastModified": "2012-08-07T20:02:35.780", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:50.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/app_ntwk_services/waas/waas/v501/release/notes/ws501xrn.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1350.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1350.json index d807a1c056d..088ffb6b5fa 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1350.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1350.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1350", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T18:55:00.977", - "lastModified": "2012-08-06T18:55:00.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:50.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -1690,6 +1689,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1357.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1357.json index b79ba6a90be..b3101940f25 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1357.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1357.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1357", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T18:55:01.023", - "lastModified": "2012-08-07T20:14:30.860", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:50.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/release/notes/Rel_5_1_3_N1_1/Nexus5000_Release_Notes_5_1_3_N1.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1361.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1361.json index 50703f2e1bb..edeff5e4805 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1361.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1361.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1361", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T18:55:01.070", - "lastModified": "2012-08-07T20:17:31.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:50.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,10 @@ { "url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-3TCAVS.html", "source": "ykramarz@cisco.com" + }, + { + "url": "http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-3TCAVS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1364.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1364.json index 9e2da0df810..bf6eba45a41 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1364.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1364.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1364", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T15:55:01.150", - "lastModified": "2018-10-30T16:26:47.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:51.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -83,6 +82,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/unified_computing/ucs/release/notes/OL_24086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1365.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1365.json index 7624552ffbd..971fc60a2eb 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1365.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1365.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1365", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T15:55:01.197", - "lastModified": "2018-10-30T16:26:47.373", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:51.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -83,6 +82,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/unified_computing/ucs/release/notes/OL_24086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1367.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1367.json index b4c79adbd8f..7f373030bec 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1367.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1367.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1367", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T15:55:01.243", - "lastModified": "2012-08-06T15:55:01.243", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:51.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,14 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/ios/12_2sr/release/notes/122SRcavs1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1370.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1370.json index 94146fc33fe..0a2d35b4101 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1370.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1370.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1370", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T15:55:01.290", - "lastModified": "2012-08-06T15:55:01.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:51.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -88,6 +87,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1380.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1380.json index 93c7c12c4cd..1cd391d86d7 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1380.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1380.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1380", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.350", - "lastModified": "2012-03-07T11:55:03.350", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:51.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1380-vulnerability-in-NetEaseWeibo.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1380-vulnerability-in-NetEaseWeibo.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1381.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1381.json index 5f04dfa6220..8090c7501a7 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1381.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1381.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1381", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.427", - "lastModified": "2012-03-07T11:55:03.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:51.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1381-vulnerability-in-NetEaseCloudAlbum.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1381-vulnerability-in-NetEaseCloudAlbum.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1382.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1382.json index 615956e6d66..c74df88ad19 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1382.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1382.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1382", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.507", - "lastModified": "2018-01-13T02:29:11.613", + "lastModified": "2024-11-21T01:36:51.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,14 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1382-vulnerability-in-YoudaoDictionary.html", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48356", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1382-vulnerability-in-YoudaoDictionary.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1383.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1383.json index 5227ad2322d..79b1d061649 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1383.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1383.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1383", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.537", - "lastModified": "2012-03-07T11:55:03.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:51.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1383-vulnerability-in-NetEaseReader.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1383-vulnerability-in-NetEaseReader.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1384.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1384.json index 1babe1cb6ee..28cee4070d1 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1384.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1384.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1384", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.583", - "lastModified": "2012-03-07T11:55:03.583", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:52.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1384-vulnerability-in-NetEasePmail.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1384-vulnerability-in-NetEasePmail.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1385.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1385.json index 274c05c8491..c9c53ee276e 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1385.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1385.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1385", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.617", - "lastModified": "2012-03-07T11:55:03.617", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:52.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1385-vulnerability-in-NetEaseWeiboHD.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1385-vulnerability-in-NetEaseWeiboHD.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1386.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1386.json index 09033684014..301b4dfe855 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1386.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1386.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1386", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.647", - "lastModified": "2012-03-07T11:55:03.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:52.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1386-vulnerability-in-YouMailVisualVoicemailPlus.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1386-vulnerability-in-YouMailVisualVoicemailPlus.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1387.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1387.json index ae1e77ce832..7a32f5d349c 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1387.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1387.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1387", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.677", - "lastModified": "2012-03-07T11:55:03.677", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:52.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1387-vulnerability-in-RealTalk.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1387-vulnerability-in-RealTalk.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1388.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1388.json index f8eacf6c219..84d411797cd 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1388.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1388.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1388", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.710", - "lastModified": "2012-03-07T11:55:03.710", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:52.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1388-vulnerability-in-XiXunTianTian.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1388-vulnerability-in-XiXunTianTian.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1389.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1389.json index 2778103589e..93e8aba50f1 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1389.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1389.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1389", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.740", - "lastModified": "2012-03-07T11:55:03.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:52.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1389-vulnerability-in-DiLongWeibo.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1389-vulnerability-in-DiLongWeibo.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1390.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1390.json index 1b137f343f9..0599a6dfa5c 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1390.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1390.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1390", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.787", - "lastModified": "2012-03-07T11:55:03.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:52.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1390-vulnerability-in-Miso.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1390-vulnerability-in-Miso.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1391.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1391.json index 5a9851a8c4b..f15e91923ca 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1391.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1391.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1391", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.817", - "lastModified": "2012-03-07T11:55:03.817", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:53.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1391-vulnerability-in-mOffice.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1391-vulnerability-in-mOffice.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1392.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1392.json index 86a1769b7a4..4aef9d51f62 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1392.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1392.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1392", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.850", - "lastModified": "2012-03-07T11:55:03.850", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:53.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -102,6 +101,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1392-vulnerability-in-DolphinBrowserHD.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1392-vulnerability-in-DolphinBrowserHD.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1393.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1393.json index b96c5bcc315..9bc8918c075 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1393.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1393.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1393", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.880", - "lastModified": "2012-03-07T11:55:03.880", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:53.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1393-vulnerability-in-GOSMSPro.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1393-vulnerability-in-GOSMSPro.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1394.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1394.json index ce99f92b2dd..164b99d1925 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1394.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1394.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1394", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.913", - "lastModified": "2012-03-07T11:55:03.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:53.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1394-vulnerability-in-GOEmailWidget.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1394-vulnerability-in-GOEmailWidget.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1395.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1395.json index a0522718932..153709a5625 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1395.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1395.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1395", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.943", - "lastModified": "2012-03-07T11:55:03.943", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:53.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1395-vulnerability-in-GOTwiWidget.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1395-vulnerability-in-GOTwiWidget.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1396.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1396.json index 4b3ccbab73b..acf8dad47dd 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1396.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1396.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1396", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:03.990", - "lastModified": "2012-03-07T11:55:03.990", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:53.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1396-vulnerability-in-GOFBWidget.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1396-vulnerability-in-GOFBWidget.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1397.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1397.json index 54e2b3d4a26..c15da5a351c 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1397.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1397.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1397", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:04.020", - "lastModified": "2012-03-07T11:55:04.020", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:53.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1397-vulnerability-in-GOQQWeiboWidget.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1397-vulnerability-in-GOQQWeiboWidget.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1398.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1398.json index b11e93a167f..478db9ab427 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1398.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1398.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1398", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:04.053", - "lastModified": "2012-03-07T11:55:04.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:53.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1398-vulnerability-in-GOWeiboWidget.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1398-vulnerability-in-GOWeiboWidget.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-13xx/CVE-2012-1399.json b/CVE-2012/CVE-2012-13xx/CVE-2012-1399.json index 443b386fe61..7f291351d22 100644 --- a/CVE-2012/CVE-2012-13xx/CVE-2012-1399.json +++ b/CVE-2012/CVE-2012-13xx/CVE-2012-1399.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1399", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:04.083", - "lastModified": "2012-03-07T11:55:04.083", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:54.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1399-vulnerability-in-U%2BBox.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1399-vulnerability-in-U%2BBox.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1400.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1400.json index db37838429a..b39112b6eff 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1400.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1400.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1400", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:04.117", - "lastModified": "2012-03-07T11:55:04.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:54.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1400-vulnerability-in-U%2BBoxPad.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1400-vulnerability-in-U%2BBoxPad.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1401.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1401.json index 25db8e5c5ae..afe3e0ac6e2 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1401.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1401.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1401", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:04.147", - "lastModified": "2012-03-07T11:55:04.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:54.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1401-vulnerability-in-CamScanner.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1401-vulnerability-in-CamScanner.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1402.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1402.json index 68b41b42cc5..2a95687e5b7 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1402.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1402.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1402", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:04.193", - "lastModified": "2012-03-07T11:55:04.193", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:54.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1402-vulnerability-in-QianXunYingShi.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1402-vulnerability-in-QianXunYingShi.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1403.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1403.json index 87c283a06da..b4e2a06a338 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1403.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1403.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1403", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:04.227", - "lastModified": "2012-03-07T11:55:04.227", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:54.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1403-vulnerability-in-DolphinBrowserCN.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1403-vulnerability-in-DolphinBrowserCN.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1404.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1404.json index aca5b11cf09..47255c67f92 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1404.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1404.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1404", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:04.257", - "lastModified": "2012-03-07T11:55:04.257", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:54.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1404-vulnerability-in-DolphinBrowserMini.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1404-vulnerability-in-DolphinBrowserMini.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1405.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1405.json index e771f90f9b3..000669a4b87 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1405.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1405.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1405", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:04.287", - "lastModified": "2012-03-07T11:55:04.287", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:54.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1405-vulnerability-in-GONoteWidget.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1405-vulnerability-in-GONoteWidget.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1406.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1406.json index 6be5e61b52e..974ec896566 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1406.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1406.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1406", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:04.317", - "lastModified": "2012-03-07T11:55:04.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:54.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1406-vulnerability-in-GOBookmarkWidget.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1406-vulnerability-in-GOBookmarkWidget.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1407.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1407.json index a7a379bedd7..302d438c271 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1407.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1407.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1407", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-07T11:55:04.367", - "lastModified": "2012-03-07T11:55:04.367", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:55.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1407-vulnerability-in-GOMessageWidget.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1407-vulnerability-in-GOMessageWidget.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1408.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1408.json index 0b93e66f867..1badd2165ba 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1408.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1408.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1408", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T03:28:49.717", - "lastModified": "2012-03-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:55.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1408-vulnerability-in-AppLock.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1408-vulnerability-in-AppLock.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1409.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1409.json index 67d1cb49419..6fcadf57ef3 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1409.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1409.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1409", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T03:28:49.747", - "lastModified": "2012-03-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:55.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1409-vulnerability-in-TinyPassword.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1409-vulnerability-in-TinyPassword.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1410.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1410.json index 0553cbd76c8..3f25713cbe0 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1410.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1410.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1410", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-29T11:55:05.940", - "lastModified": "2012-02-29T11:55:05.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:55.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -136,6 +135,61 @@ "Exploit", "Patch" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/02/27/26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/02/27/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=749036", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797777", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://gitorious.org/kadu/kadu/commit/91772e46541e22cbc2c7bf41a1a9798c2a58f6d6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://gitorious.org/kadu/kadu/commit/94e7479617d78a1649a0763960edade7ad09a0d0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://gitorious.org/kadu/kadu/commit/e9506be6d3dcdd408fdf83d8eb82416c9b798c84", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://gitorious.org/kadu/kadu/commit/ebe3674cf0f3aa9b36308c06e19cb293cc790b52", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1413.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1413.json index a82a7f7a126..61363c4e213 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1413.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1413.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1413", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T19:55:01.047", - "lastModified": "2012-05-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:55.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -196,6 +195,10 @@ { "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2012-004.txt", "source": "cve@mitre.org" + }, + { + "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2012-004.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1418.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1418.json index aa947634d4f..e94025a9352 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1418.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1418.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1418", "sourceIdentifier": "cve@mitre.org", "published": "2012-02-29T11:55:06.003", - "lastModified": "2012-04-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:56.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/02/stable-channel-update-for-chromebooks_24.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1419.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1419.json index baa269214d4..2c69cfbbf43 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1419.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1419.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1419", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.097", - "lastModified": "2012-08-14T03:35:48.627", + "lastModified": "2024-11-21T01:36:56.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,22 @@ { "url": "http://www.securityfocus.com/bid/52572", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52572", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1420.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1420.json index 1002bca33ed..d9534337860 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1420.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1420.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1420", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.130", - "lastModified": "2012-08-14T03:35:48.800", + "lastModified": "2024-11-21T01:36:56.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -145,6 +144,30 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80406", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80407", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1421.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1421.json index fee2b8cbe92..d556f18f803 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1421.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1421.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1421", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.177", - "lastModified": "2012-12-20T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:56.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,18 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1422.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1422.json index 73d8d37d46e..a99f0e8199e 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1422.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1422.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1422", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.253", - "lastModified": "2012-08-14T03:35:49.127", + "lastModified": "2024-11-21T01:36:56.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,22 @@ { "url": "http://www.securityfocus.com/bid/52583", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1423.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1423.json index fee39bdb9c3..343880c4c03 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1423.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1423.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1423", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.317", - "lastModified": "2012-08-14T03:35:49.300", + "lastModified": "2024-11-21T01:36:57.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -149,6 +148,34 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80393", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80395", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80396", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80406", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80407", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1424.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1424.json index b0086557ace..9a7b35dd0c2 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1424.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1424.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1424", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.347", - "lastModified": "2012-08-14T03:35:49.457", + "lastModified": "2024-11-21T01:36:57.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +119,30 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80390", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80391", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80392", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1425.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1425.json index 132d656e265..8953b4c90a1 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1425.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1425.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1425", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.397", - "lastModified": "2012-08-14T03:35:49.627", + "lastModified": "2024-11-21T01:36:57.320", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -182,6 +181,42 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80391", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80392", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80395", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80396", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1426.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1426.json index 4914a48e9e3..400b9d2cec1 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1426.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1426.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1426", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.443", - "lastModified": "2017-08-29T01:31:16.883", + "lastModified": "2024-11-21T01:36:57.467", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74241", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80406", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80407", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52585", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74241", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1427.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1427.json index 36ae22668ef..8e99d851425 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1427.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1427.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1427", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.473", - "lastModified": "2017-08-29T01:31:16.947", + "lastModified": "2024-11-21T01:36:57.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74242", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80390", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52587", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74242", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1428.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1428.json index 409ba73bccc..4ac7f2bcc1d 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1428.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1428.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1428", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.520", - "lastModified": "2017-08-29T01:31:17.007", + "lastModified": "2024-11-21T01:36:57.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74243", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80390", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74243", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1429.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1429.json index e11eb4654e5..585a5728852 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1429.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1429.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1429", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.550", - "lastModified": "2017-08-29T01:31:17.070", + "lastModified": "2024-11-21T01:36:57.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74244", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74244", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1430.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1430.json index 4b5da462266..9010818210c 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1430.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1430.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1430", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.583", - "lastModified": "2012-04-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:58.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -119,6 +118,14 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1431.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1431.json index a25d775adce..d668d0a09d9 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1431.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1431.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1431", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.630", - "lastModified": "2012-03-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:58.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,14 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1432.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1432.json index a1878c34a47..12a4d820c3d 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1432.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1432.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1432", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.660", - "lastModified": "2012-04-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:58.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,14 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1433.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1433.json index e3cdc96b1af..a6625a75a59 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1433.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1433.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1433", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.693", - "lastModified": "2012-03-21T10:11:47.693", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:58.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,14 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1434.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1434.json index 1a25b5c6ca0..9ab79c806eb 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1434.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1434.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1434", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.723", - "lastModified": "2012-04-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:58.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,14 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1435.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1435.json index e10a3d26ccf..0bac729d1ba 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1435.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1435.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1435", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.770", - "lastModified": "2012-03-21T10:11:47.770", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:58.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,14 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1436.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1436.json index ed1c582e602..6b3ebedf3ee 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1436.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1436.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1436", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.800", - "lastModified": "2012-04-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:58.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,14 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1437.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1437.json index e7bb4a64a6b..62903fab75d 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1437.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1437.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1437", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.847", - "lastModified": "2012-07-28T03:30:33.557", + "lastModified": "2024-11-21T01:36:58.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "http://www.securityfocus.com/bid/52597", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52597", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1438.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1438.json index 16fad04d2d5..33c4942da42 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1438.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1438.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1438", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.897", - "lastModified": "2012-03-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:59.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1439.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1439.json index 26c17e56d1c..706de1df902 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1439.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1439.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1439", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.927", - "lastModified": "2012-07-28T03:30:33.913", + "lastModified": "2024-11-21T01:36:59.223", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,18 @@ { "url": "http://www.securityfocus.com/bid/52602", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52602", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1440.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1440.json index dd0706b9dc8..04b5f5e2ae8 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1440.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1440.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1440", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:47.957", - "lastModified": "2012-03-21T10:11:47.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:59.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,14 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1441.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1441.json index 0c5e6683ff8..371edca4127 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1441.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1441.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1441", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.003", - "lastModified": "2012-04-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:36:59.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1442.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1442.json index 1f6456b091b..69cf9b89b8d 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1442.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1442.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1442", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.037", - "lastModified": "2012-07-28T03:30:34.523", + "lastModified": "2024-11-21T01:36:59.617", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -145,6 +144,30 @@ { "url": "http://www.securityfocus.com/bid/52598", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80426", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80428", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52598", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1443.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1443.json index 8712155d64c..55f885afa6f 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1443.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1443.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1443", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.083", - "lastModified": "2012-11-06T05:09:04.360", + "lastModified": "2024-11-21T01:36:59.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -314,6 +313,74 @@ { "url": "http://www.securityfocus.com/bid/52612", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80456", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80457", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80458", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80460", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80467", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80469", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80470", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80472", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52612", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1444.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1444.json index 39e8d5b58d8..2ac9b57c866 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1444.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1444.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1444", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.130", - "lastModified": "2012-07-28T03:30:34.930", + "lastModified": "2024-11-21T01:36:59.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,22 @@ { "url": "http://www.securityfocus.com/bid/52604", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80429", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52604", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1445.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1445.json index bc20c721702..deccd3faa15 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1445.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1445.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1445", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.207", - "lastModified": "2012-07-10T04:28:49.353", + "lastModified": "2024-11-21T01:37:00.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,18 @@ { "url": "http://www.securityfocus.com/bid/52605", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52605", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1446.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1446.json index 8403143b8ed..ca7507c87ad 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1446.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1446.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1446", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.270", - "lastModified": "2012-07-28T03:30:35.210", + "lastModified": "2024-11-21T01:37:00.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -168,6 +167,38 @@ { "url": "http://www.securityfocus.com/bid/52600", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80426", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80428", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80430", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52600", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1447.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1447.json index 304522524aa..b862467b0e5 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1447.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1447.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1447", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.333", - "lastModified": "2017-12-06T02:29:04.650", + "lastModified": "2024-11-21T01:37:00.330", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,22 @@ { "url": "http://www.securityfocus.com/bid/52601", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80432", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52601", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1448.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1448.json index 39dfe648c01..ee8527ff697 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1448.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1448.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1448", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.613", - "lastModified": "2012-11-06T05:09:05.313", + "lastModified": "2024-11-21T01:37:00.473", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,18 @@ { "url": "http://www.securityfocus.com/bid/52603", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52603", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1449.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1449.json index 555135dd419..de66524d009 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1449.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1449.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1449", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.647", - "lastModified": "2012-07-28T03:30:35.727", + "lastModified": "2024-11-21T01:37:00.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "http://www.securityfocus.com/bid/52616", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52616", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1450.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1450.json index 668ec49c0b6..1010b513129 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1450.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1450.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1450", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.693", - "lastModified": "2012-07-28T03:30:35.883", + "lastModified": "2024-11-21T01:37:00.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "http://www.securityfocus.com/bid/52617", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52617", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1451.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1451.json index bdf960b2e1c..83398863ea1 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1451.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1451.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1451", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.740", - "lastModified": "2012-04-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:00.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1452.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1452.json index 7cfefcf44fe..f0838d8f35f 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1452.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1452.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1452", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.770", - "lastModified": "2012-07-28T03:30:36.163", + "lastModified": "2024-11-21T01:37:01.007", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "http://www.securityfocus.com/bid/52619", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52619", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1453.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1453.json index 78c15620595..eea12fffab0 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1453.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1453.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1453", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:48.847", - "lastModified": "2012-11-06T05:09:05.987", + "lastModified": "2024-11-21T01:37:01.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -180,6 +179,50 @@ { "url": "http://www.securityfocus.com/bid/52621", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80482", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80483", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80486", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80489", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52621", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1454.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1454.json index 457e1cb0912..0859286992b 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1454.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1454.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1454", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:49.160", - "lastModified": "2012-07-28T03:30:36.540", + "lastModified": "2024-11-21T01:37:01.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,18 @@ { "url": "http://www.securityfocus.com/archive/1/522005", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80432", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1455.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1455.json index 50b497b440c..a080ea9fff2 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1455.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1455.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1455", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:49.193", - "lastModified": "2017-12-06T02:29:04.713", + "lastModified": "2024-11-21T01:37:01.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,18 @@ { "url": "http://www.securityfocus.com/bid/52607", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52607", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1456.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1456.json index 4fbeb10bec9..e7f96d3eb31 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1456.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1456.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1456", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:49.240", - "lastModified": "2017-08-29T01:31:17.133", + "lastModified": "2024-11-21T01:37:01.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -214,6 +213,54 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74289", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80390", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80391", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80395", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80396", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80406", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74289", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1457.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1457.json index a932b7aaa73..1f5d6d556b6 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1457.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1457.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1457", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:49.287", - "lastModified": "2018-01-18T02:29:13.083", + "lastModified": "2024-11-21T01:37:01.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -275,6 +274,70 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74293", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80391", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80392", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80393", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80395", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80396", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80406", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80407", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74293", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1458.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1458.json index 9eb04cb200c..7a4903930ef 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1458.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1458.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1458", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:49.317", - "lastModified": "2018-01-18T02:29:13.177", + "lastModified": "2024-11-21T01:37:01.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74301", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80473", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80474", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74301", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1459.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1459.json index 4674083449b..d8780976957 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1459.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1459.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1459", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:49.597", - "lastModified": "2018-01-18T02:29:13.273", + "lastModified": "2024-11-21T01:37:02.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -309,6 +308,74 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74302", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80390", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80391", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80392", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80393", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80395", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80396", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80406", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80407", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74302", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1460.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1460.json index f2f968e911b..dab15219f2d 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1460.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1460.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1460", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:49.630", - "lastModified": "2017-08-29T01:31:17.337", + "lastModified": "2024-11-21T01:37:02.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -122,6 +121,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74308", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52629", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74308", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1461.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1461.json index 614dce57e28..bb3d32e0c39 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1461.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1461.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1461", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:49.677", - "lastModified": "2012-11-06T05:09:07.283", + "lastModified": "2024-11-21T01:37:02.423", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -210,6 +209,50 @@ { "url": "http://www.securityfocus.com/bid/52626", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80501", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80502", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80505", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80510", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52626", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1462.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1462.json index bb42394114c..248316e7b14 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1462.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1462.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1462", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:49.707", - "lastModified": "2017-08-29T01:31:17.383", + "lastModified": "2024-11-21T01:37:02.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -132,6 +131,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74310", "source": "cve@mitre.org" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52613", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74310", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1463.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1463.json index ea843e5c77a..ff79dd89291 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1463.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1463.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1463", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-21T10:11:49.740", - "lastModified": "2017-08-29T01:31:17.447", + "lastModified": "2024-11-21T01:37:02.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -150,6 +149,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74311", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80426", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80433", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ieee-security.org/TC/SP2012/program.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74311", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1464.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1464.json index 329f7f6d6f0..47e81bb76a4 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1464.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1464.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1464", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T19:55:04.170", - "lastModified": "2017-12-06T02:29:04.820", + "lastModified": "2024-11-21T01:37:02.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -113,6 +112,47 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73549", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79653", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secpod.org/advisories/SecPod_Netmechanica_NetDecision_Dashboard_Server_Info_Disc_Vuln.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secpod.org/blog/?p=478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48168", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18543", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.netmechanica.com/news/?news_id=26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52645", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73549", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1465.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1465.json index 657ec09aa0a..44f9e604197 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1465.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1465.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1465", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T19:55:04.217", - "lastModified": "2017-08-29T01:31:17.570", + "lastModified": "2024-11-21T01:37:03.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -126,6 +125,60 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73528", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79651", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secpod.org/advisories/SecPod_Netmechanica_NetDecision_HTTP_Server_DoS_Vuln.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secpod.org/blog/?p=484", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48168", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.netmechanica.com/news/?news_id=26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52194", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52208", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73528", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1466.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1466.json index 4e81b204851..74aee5e0a25 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1466.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1466.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1466", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T19:55:04.267", - "lastModified": "2017-08-29T01:31:17.617", + "lastModified": "2024-11-21T01:37:03.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -116,6 +115,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73531", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79652", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secpod.org/advisories/SecPod_Netmechanica_NetDecision_Traffic_Grapher_Server_SourceCode_Disc_Vuln.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secpod.org/blog/?p=481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48168", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18542", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.netmechanica.com/news/?news_id=26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52196", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73531", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1467.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1467.json index bfd5ebcaf8e..0ee9af0e293 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1467.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1467.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1467", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:01.127", - "lastModified": "2012-09-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:03.307", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -83,6 +82,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://pkp.sfu.ca/support/forum/viewtopic.php?f=2&t=8431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1468.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1468.json index b42bfc6ac9a..db6d01cb467 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1468.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1468.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1468", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:01.160", - "lastModified": "2012-09-07T13:41:43.600", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html 'CWE-184: Incomplete Blacklist'", + "lastModified": "2024-11-21T01:37:03.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -88,6 +86,22 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://pkp.sfu.ca/ojs/RELEASE-2.3.7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pkp.sfu.ca/support/forum/viewtopic.php?f=2&t=8431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html 'CWE-184: Incomplete Blacklist'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1469.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1469.json index 3197a6e1492..47a647c3121 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1469.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1469.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1469", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:01.220", - "lastModified": "2018-01-12T02:29:00.257", + "lastModified": "2024-11-21T01:37:03.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -136,6 +135,70 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://pkp.sfu.ca/ojs/RELEASE-2.3.7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pkp.sfu.ca/support/forum/viewtopic.php?f=2&t=8431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48449", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48464", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/80255", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74225", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74226", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74227", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74228", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23079", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1472.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1472.json index 79f66c22960..9e426bfc736 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1472.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1472.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1472", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-13T03:12:26.337", - "lastModified": "2012-03-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:04.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -81,6 +80,10 @@ { "url": "http://www.vmware.com/security/advisories/VMSA-2012-0002.html", "source": "cve@mitre.org" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1474.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1474.json index 12944f75b5c..ff249ce78bd 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1474.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1474.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1474", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T03:28:49.777", - "lastModified": "2012-03-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:04.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1474-vulnerability-in-YouniSMS.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1474-vulnerability-in-YouniSMS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1475.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1475.json index 2224c0aaf51..e40e6e8a8b1 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1475.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1475.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1475", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T03:28:49.827", - "lastModified": "2012-03-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:04.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1475-vulnerability-in-YagattaTalkMessenger.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1475-vulnerability-in-YagattaTalkMessenger.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1476.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1476.json index 558a69f68df..fbacdd3db94 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1476.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1476.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1476", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T03:28:49.857", - "lastModified": "2012-03-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:04.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1476-vulnerability-in-KKtalk.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1476-vulnerability-in-KKtalk.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1477.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1477.json index 29729c302ee..5ab108b2112 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1477.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1477.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1477", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T03:28:49.887", - "lastModified": "2012-03-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:04.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,10 @@ { "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1477-vulnerability-in-Cnectd.html", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1477-vulnerability-in-Cnectd.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1478.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1478.json index 96673bf03e1..e4ca6e4c11b 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1478.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1478.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1478", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T03:28:49.920", - "lastModified": "2018-01-11T02:29:03.840", + "lastModified": "2024-11-21T01:37:04.687", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74024", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1478-vulnerability-in-UCMobileBloveStorm.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74024", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1479.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1479.json index 6558d0fb009..c0e689f5e80 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1479.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1479.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1479", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T03:28:49.967", - "lastModified": "2018-01-11T02:29:03.903", + "lastModified": "2024-11-21T01:37:04.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74025", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1479-vulnerability-in-AContact.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74025", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1480.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1480.json index c08271ebb46..6922f3c0633 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1480.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1480.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1480", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-14T03:28:49.997", - "lastModified": "2018-01-11T02:29:03.950", + "lastModified": "2024-11-21T01:37:04.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73963", "source": "cve@mitre.org" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1480-vulnerability-in-PansiSMS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73963", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1481.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1481.json index d6d864dfdad..f3be56bc703 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1481.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1481.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1481", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-15T17:55:01.040", - "lastModified": "2018-01-13T02:29:11.677", + "lastModified": "2024-11-21T01:37:05.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74052", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80168", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52490", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1481-vulnerability-in-Textdroid.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1482.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1482.json index 5bde52dde38..f21bd2d34ff 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1482.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1482.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1482", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-15T17:55:01.087", - "lastModified": "2018-01-13T02:29:11.737", + "lastModified": "2024-11-21T01:37:05.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74051", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80169", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52491", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1482-vulnerability-in-TouchPalContacts.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74051", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1483.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1483.json index 1357938bce9..af595fa9959 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1483.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1483.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1483", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-15T17:55:01.117", - "lastModified": "2018-01-13T02:29:11.800", + "lastModified": "2024-11-21T01:37:05.373", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74050", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52492", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1483-vulnerability-in-MessageForwarder.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74050", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1484.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1484.json index e09b9ff688c..0eca6bf9219 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1484.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1484.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1484", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-15T17:55:01.167", - "lastModified": "2018-01-13T02:29:11.863", + "lastModified": "2024-11-21T01:37:05.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74049", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52495", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1484-vulnerability-in-WaliSMSCN.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74049", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1485.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1485.json index f556ea52b72..0613b6753ca 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1485.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1485.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1485", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-15T17:55:01.213", - "lastModified": "2018-01-13T02:29:11.940", + "lastModified": "2024-11-21T01:37:05.653", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -108,6 +107,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74048", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48557", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52480", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1485-vulnerability-in-NetFrontLifeBrowser.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74048", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1493.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1493.json index 716520c7f8f..c8a1ee9912d 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1493.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1493.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1493", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-09T22:55:00.887", - "lastModified": "2012-07-10T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:05.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -676,6 +675,29 @@ { "url": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt", "source": "cve@mitre.org" + }, + { + "url": "http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.theregister.co.uk/2012/06/13/f5_kit_metasploit_exploit/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/f5_bigip_known_privkey.rb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://www.trustmatta.com/advisories/MATTA-2012-002.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1497.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1497.json index 13e4c0f14a0..901c888ae5d 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1497.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1497.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1497", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-03T04:04:57.843", - "lastModified": "2018-01-18T02:29:13.397", + "lastModified": "2024-11-21T01:37:06.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -720,6 +719,26 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.movabletype.org/documentation/appendices/release-notes/513.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1498.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1498.json index 44ad590b30d..a2623a7ab1d 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1498.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1498.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1498", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T19:55:04.360", - "lastModified": "2017-08-29T01:31:17.757", + "lastModified": "2024-11-21T01:37:06.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -171,6 +170,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73575", "source": "cve@mitre.org" + }, + { + "url": "http://ivanobinetti.blogspot.com/2012/02/webfoliocms-114-csrf-add-adminmodify.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/79658", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/110294/WebfolioCMS-1.1.4-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48190", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18536", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52218", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73575", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-14xx/CVE-2012-1499.json b/CVE-2012/CVE-2012-14xx/CVE-2012-1499.json index 939bfc3c9bf..b833310fa25 100644 --- a/CVE-2012/CVE-2012-14xx/CVE-2012-1499.json +++ b/CVE-2012/CVE-2012-14xx/CVE-2012-1499.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1499", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-11T10:39:26.530", - "lastModified": "2020-09-09T19:56:38.513", + "lastModified": "2024-11-21T01:37:06.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -109,6 +108,38 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805912", "source": "cve@mitre.org" + }, + { + "url": "http://code.google.com/p/openjpeg/source/detail?r=1330", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082923.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/083105.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openjpeg.googlecode.com/svn/branches/openjpeg-1.5/NEWS", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201206-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/en-us/security/msvr/msvr12-004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805912", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1502.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1502.json index 7e6ffbacf74..d53a9f92dce 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1502.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1502.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1502", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-16T00:55:06.327", - "lastModified": "2017-08-29T01:31:17.837", + "lastModified": "2024-11-21T01:37:06.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -124,6 +123,58 @@ { "url": "https://security.gentoo.org/glsa/201507-09", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-04/msg00027.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48312", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48332", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48746", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1395-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2430", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.lsexperts.de/advisories/lse-2012-03-01.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/79892", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73857", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201507-09", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1508.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1508.json index a37b98b01e3..d0a14f22f48 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1508.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1508.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1508", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-16T20:55:00.847", - "lastModified": "2017-12-13T02:29:04.810", + "lastModified": "2024-11-21T01:37:07.377", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -143,6 +142,52 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17183", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48378", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026814", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17183", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1509.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1509.json index 72cbdb8da10..b5dbed3505c 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1509.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1509.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1509", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-16T20:55:00.910", - "lastModified": "2017-09-19T01:34:44.947", + "lastModified": "2024-11-21T01:37:07.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -108,6 +107,42 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17151", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80116", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026814", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74096", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17151", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1510.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1510.json index 9cbff3e415c..6438806f1a2 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1510.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1510.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1510", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-16T20:55:01.003", - "lastModified": "2017-12-13T02:29:04.873", + "lastModified": "2024-11-21T01:37:07.660", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -147,6 +146,56 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17258", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80117", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48378", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026814", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74097", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17258", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1511.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1511.json index 165e18d74f8..6f743df775e 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1511.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1511.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1511", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-16T20:55:01.037", - "lastModified": "2017-12-06T02:29:04.947", + "lastModified": "2024-11-21T01:37:07.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,37 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16664", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80118", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52526", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026814", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16664", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1512.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1512.json index f92ca102d7f..b102b3c44d7 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1512.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1512.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1512", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-16T20:55:01.083", - "lastModified": "2018-01-06T02:29:37.630", + "lastModified": "2024-11-21T01:37:07.947", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74093", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48387", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74093", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1513.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1513.json index 1de1677924f..d988e187461 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1513.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1513.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1513", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-16T20:55:01.113", - "lastModified": "2018-01-06T02:29:37.693", + "lastModified": "2024-11-21T01:37:08.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74091", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48408", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026816", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74091", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1514.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1514.json index 89994d06b86..2b35fc41fbf 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1514.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1514.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1514", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-16T20:55:01.160", - "lastModified": "2017-08-29T01:31:18.303", + "lastModified": "2024-11-21T01:37:08.223", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74092", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026815", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74092", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1515.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1515.json index 442619a9ebf..3a5a6ea18ea 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1515.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1515.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1515", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-02T10:46:44.373", - "lastModified": "2018-10-12T22:02:28.480", + "lastModified": "2024-11-21T01:37:08.367", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 8.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.5, @@ -144,6 +143,44 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17110", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/52820", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026875", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-042", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74480", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17110", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1516.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1516.json index 3f7d3682717..292ee5bff81 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1516.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1516.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1516", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-04T16:55:01.420", - "lastModified": "2019-09-27T18:13:22.970", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:08.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +31,7 @@ "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.9, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.1, "impactScore": 6.0 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -205,6 +204,43 @@ "tags": [ "Tool Signature" ] + }, + { + "url": "http://www.securityfocus.com/bid/53369", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027018", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75373", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16810", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Tool Signature" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1517.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1517.json index 13b99b6cedc..4837a18a1ad 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1517.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1517.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1517", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-04T16:55:01.450", - "lastModified": "2017-12-13T02:29:05.060", + "lastModified": "2024-11-21T01:37:08.660", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -103,6 +102,33 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17231", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81692", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53369", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75374", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17231", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1518.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1518.json index 2e35ff98894..c929de49cb5 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1518.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1518.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1518", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-17T21:55:01.307", - "lastModified": "2017-12-29T02:29:13.503", + "lastModified": "2024-11-21T01:37:08.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 8.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.5, @@ -272,6 +271,37 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48782", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026923", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16745", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1520.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1520.json index b3b10219ea1..40d138acad2 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1520.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1520.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1520", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T20:55:01.667", - "lastModified": "2012-09-22T03:31:26.467", + "lastModified": "2024-11-21T01:37:08.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "cve@mitre.org" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1521.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1521.json index 7b11e49ed41..4c07b8b3c44 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1521.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1521.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1521", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-01T10:12:04.283", - "lastModified": "2020-04-13T17:17:26.470", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:09.093", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -212,6 +211,118 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=117110", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/04/stable-channel-update_30.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://osvdb.org/81644", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/48992", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201205-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75270", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15397", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1522.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1522.json index 866c08e46fa..372cfea67c6 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1522.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1522.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1522", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-10T21:55:05.480", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:09.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -128,6 +127,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15464", "source": "cve@mitre.org" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15464", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1523.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1523.json index 5d28b48a667..7a97ee2dc18 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1523.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1523.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1523", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-12T22:55:01.390", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:09.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -277,6 +276,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15579", "source": "cve@mitre.org" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15579", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1524.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1524.json index 8fd7f197e75..1883eb404fc 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1524.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1524.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1524", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-10T21:55:05.527", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:09.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -128,6 +127,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15595", "source": "cve@mitre.org" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15595", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1525.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1525.json index 6093f93b052..67cc3da0a1b 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1525.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1525.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1525", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T10:31:40.630", - "lastModified": "2017-09-19T01:34:45.997", + "lastModified": "2024-11-21T01:37:09.703", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16422", "source": "cve@mitre.org" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16422", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1526.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1526.json index 61d640a1831..456a28e52f7 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1526.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1526.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1526", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T01:55:01.273", - "lastModified": "2018-10-12T22:02:30.340", + "lastModified": "2024-11-21T01:37:09.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -91,6 +90,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15240", "source": "cve@mitre.org" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15240", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1535.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1535.json index bbb12da2783..0e950b0cf9e 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1535.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1535.json @@ -2,13 +2,8 @@ "id": "CVE-2012-1535", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T10:31:40.677", - "lastModified": "2024-07-16T17:38:08.570", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-03", - "cisaActionDue": "2022-03-24", - "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", - "cisaVulnerabilityName": "Adobe Flash Player Arbitrary Code Execution Vulnerability", + "lastModified": "2024-11-21T01:37:11.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-03-03", + "cisaActionDue": "2022-03-24", + "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", + "cisaVulnerabilityName": "Adobe Flash Player Arbitrary Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -239,6 +238,52 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=139455789818399&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1203.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1545.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1545.json index dfd4d8deff6..dbc6ff5894b 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1545.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1545.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1545", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-09T11:55:01.193", - "lastModified": "2021-07-23T15:12:53.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:12.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -232,6 +231,22 @@ { "url": "http://www.zdnet.com/blog/security/pwn2own-2012-ie-9-hacked-with-two-0day-vulnerabilities/10621", "source": "cve@mitre.org" + }, + { + "url": "http://arstechnica.com/business/news/2012/03/ie-9-on-latest-windows-gets-stomped-at-hacker-contest.ars", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pwn2own.zerodayinitiative.com/status.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://twitter.com/vupen/statuses/177895844828291073", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zdnet.com/blog/security/pwn2own-2012-ie-9-hacked-with-two-0day-vulnerabilities/10621", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1557.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1557.json index c4eb85140d0..50ebaaef0a9 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1557.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1557.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1557", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-12T19:55:01.417", - "lastModified": "2018-01-11T02:29:04.373", + "lastModified": "2024-11-21T01:37:12.537", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -381,6 +380,56 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73628", "source": "cve@mitre.org" + }, + { + "url": "http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-linux-updates-release-notes.html#10216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-windows-updates-release-notes.html#10216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://kb.parallels.com/en/113321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48262", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.cert.fi/haavoittuvuudet/2012/haavoittuvuus-2012-035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.h-online.com/security/news/item/Bug-in-Plesk-administration-software-is-being-actively-exploited-1446587.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/08/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79769", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026760", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73628", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1558.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1558.json index a80b77f6bd7..f9c776ae442 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1558.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1558.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1558", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-12T19:55:01.480", - "lastModified": "2018-01-06T02:29:37.833", + "lastModified": "2024-11-21T01:37:12.687", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -258,6 +257,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74095", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48634", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52828", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.yassl.com/yaSSL/Docs-cyassl-changelog.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74095", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1569.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1569.json index 9c61773cce1..d4473827a92 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1569.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1569.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1569", "sourceIdentifier": "secalert@redhat.com", "published": "2012-03-26T19:55:01.110", - "lastModified": "2018-01-18T02:29:13.553", + "lastModified": "2024-11-21T01:37:13.643", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -1314,6 +1313,147 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804920", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5932", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/53", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://article.gmane.org/gmane.comp.gnu.libtasn1.general/54", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://linux.oracle.com/errata/ELSA-2014-0596.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076856.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/076865.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077284.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077339.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078207.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076699.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0427.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0488.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48397", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48505", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48596", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50739", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/57260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2440", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gnu.org/software/gnutls/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:039", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/20/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/20/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/21/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026829", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1436-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804920", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1570.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1570.json index 26eafb42abe..85442c6b98e 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1570.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1570.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1570", "sourceIdentifier": "secalert@redhat.com", "published": "2012-03-28T10:55:00.317", - "lastModified": "2020-08-14T17:11:18.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:13.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -141,6 +140,68 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://osvdb.org/80192", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/48492", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.maradns.org/changelog.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/20/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/20/10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026821", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804770", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1571.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1571.json index 21954bc7a64..4d091a2b517 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1571.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1571.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1571", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-17T21:55:01.413", - "lastModified": "2014-03-08T04:55:12.187", + "lastModified": "2024-11-21T01:37:13.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,41 @@ "Exploit", "Patch" ] + }, + { + "url": "http://mx.gw.com/pipermail/file/2012/000914.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2123-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/glensc/file/commit/1859fdb4e67c49c463c4e0078054335cd46ba295", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/glensc/file/commit/1aec04dbf8a24b8a6ba64c4f74efa0628e36db0b", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1573.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1573.json index 1f53e80d4d9..aa82841b584 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1573.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1573.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1573", "sourceIdentifier": "secalert@redhat.com", "published": "2012-03-26T19:55:01.390", - "lastModified": "2023-11-07T02:10:16.163", + "lastModified": "2024-11-21T01:37:14.133", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -651,6 +650,120 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805432", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0099.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5910", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5912", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commit%3Bh=422214868061370aeeb0ac9cd0f021a5c350a57d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.savannah.gnu.org/gitweb/?p=gnutls.git%3Ba=commit%3Bh=b495740f2ff66550ca9395b3fda3ea32c3acb185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076496.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80259", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0429.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0488.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0531.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48596", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48712", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/57260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gnu.org/software/gnutls/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/21/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/21/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52667", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026828", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1418-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805432", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1574.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1574.json index c22aae051e9..e72ead89cef 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1574.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1574.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1574", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-12T10:45:14.580", - "lastModified": "2017-03-24T01:59:00.347", + "lastModified": "2024-11-21T01:37:14.280", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -182,6 +181,37 @@ { "url": "https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0051.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Apr/70", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48775", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48776", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52939", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ccp.cloudera.com/display/DOC/Cloudera+Security+Bulletin", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1575.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1575.json index 00d455e82c9..a2591dbd26a 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1575.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1575.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1575", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-22T18:55:04.560", - "lastModified": "2023-02-13T04:33:12.837", + "lastModified": "2024-11-21T01:37:14.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -112,6 +111,46 @@ { "url": "https://fedorahosted.org/pipermail/cumin-developers/2012-March/000796.html", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0476.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0477.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48810", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48829", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026921", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/attachment.cgi?id=571986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805712", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74844", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://fedorahosted.org/pipermail/cumin-developers/2012-March/000796.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1578.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1578.json index f254d63666b..205e05c515c 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1578.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1578.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1578", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:05.947", - "lastModified": "2017-08-29T01:31:19.163", + "lastModified": "2024-11-21T01:37:14.737", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -173,6 +172,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78911", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/80361", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48504", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=34212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78911", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1579.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1579.json index c2b16d6e298..18b407e4c3d 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1579.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1579.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1579", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:06.010", - "lastModified": "2012-09-10T17:02:12.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:14.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -171,6 +170,46 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48504", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=34907", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1580.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1580.json index 5c0040d6751..92417facd60 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1580.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1580.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1580", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:06.090", - "lastModified": "2017-08-29T01:31:19.227", + "lastModified": "2024-11-21T01:37:14.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -176,6 +175,51 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74286", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/80364", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48504", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74286", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1581.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1581.json index 3c60bd3355b..dd75d751b7a 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1581.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1581.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1581", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:06.137", - "lastModified": "2017-08-29T01:31:19.287", + "lastModified": "2024-11-21T01:37:15.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -172,6 +171,47 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78910", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48504", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35078", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78910", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1582.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1582.json index f1e48d78c2e..c96b7cb347f 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1582.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1582.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1582", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:06.183", - "lastModified": "2017-08-29T01:31:19.337", + "lastModified": "2024-11-21T01:37:15.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -176,6 +175,51 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74288", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/80363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48504", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35315", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74288", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1583.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1583.json index 5105706544f..7ac5a626373 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1583.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1583.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1583", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-16T21:55:02.920", - "lastModified": "2023-02-13T00:24:01.357", + "lastModified": "2024-11-21T01:37:15.283", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -1390,6 +1389,10 @@ "url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0488.html", "source": "secalert@redhat.com" @@ -1417,6 +1420,50 @@ "Exploit", "Patch" ] + }, + { + "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d0772b70faaf8e9f2013b6c4273d94d5eac8047a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0488.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48881", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026930", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=752304", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/d0772b70faaf8e9f2013b6c4273d94d5eac8047a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1584.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1584.json index 5b95f022dff..bebb1dcb5a8 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1584.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1584.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1584", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-06T18:55:01.207", - "lastModified": "2017-08-29T01:31:19.413", + "lastModified": "2024-11-21T01:37:15.427", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -185,6 +184,64 @@ "Exploit", "Patch" ] + }, + { + "url": "http://mail.kde.org/pipermail/taglib-devel/2012-March/002186.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mail.kde.org/pipermail/taglib-devel/2012-March/002191.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48211", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48792", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49688", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201206-16.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/05/19", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/21/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/26/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52290", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78909", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/taglib/taglib/commit/dcdf4fd954e3213c355746fa15b7480461972308", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1585.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1585.json index 17c5afc79ce..e4427337899 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1585.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1585.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1585", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-17T00:55:02.017", - "lastModified": "2018-11-14T18:35:01.967", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:15.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -95,6 +94,28 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://lwn.net/Alerts/491298/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://osdir.com/ml/openstack-cloud-computing/2012-03/msg01133.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://bugs.launchpad.net/nova/+bug/962515", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1586.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1586.json index 99878a01fc2..0941d2e79c3 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1586.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1586.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1586", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-27T23:55:01.507", - "lastModified": "2012-08-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:15.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -91,6 +90,26 @@ { "url": "https://bugzilla.samba.org/show_bug.cgi?id=8821", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665923", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/27/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/27/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.samba.org/show_bug.cgi?id=8821", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1589.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1589.json index 0bf717f8f42..2e8d5d73c27 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1589.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1589.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1589", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-18T20:55:06.097", - "lastModified": "2013-12-13T04:58:14.913", + "lastModified": "2024-11-21T01:37:15.873", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -242,6 +241,37 @@ { "url": "http://www.securityfocus.com/bid/53365", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1557938", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN45898075/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81679", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:074", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53365", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1593.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1593.json index 1465d995696..4464f2c378a 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1593.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1593.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1593", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-11T10:39:26.577", - "lastModified": "2017-12-29T02:29:13.817", + "lastModified": "2024-11-21T01:37:16.327", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'CWE-476: NULL Pointer Dereference'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -182,6 +180,62 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14991", "source": "secalert@redhat.com" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40962", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078769.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078770.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-04/msg00060.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/28/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026874", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-04.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6823", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74361", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14991", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'CWE-476: NULL Pointer Dereference'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1594.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1594.json index 28e8b2fd7df..04a81ca7907 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1594.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1594.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1594", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-11T10:39:26.623", - "lastModified": "2017-12-29T02:29:13.907", + "lastModified": "2024-11-21T01:37:16.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -139,6 +138,49 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15244", "source": "secalert@redhat.com" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=40967", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078770.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/28/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52738", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026874", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6809", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74362", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15244", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1595.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1595.json index b1a9dd42e81..223abcdcb6f 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1595.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1595.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1595", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-11T10:39:26.687", - "lastModified": "2023-02-13T04:33:14.297", + "lastModified": "2024-11-21T01:37:16.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -229,6 +228,69 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15548", "source": "secalert@redhat.com" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=41008", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078769.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078770.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-04/msg00060.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/28/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52737", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026874", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/news/20120327.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-06.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6804", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74364", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15548", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1596.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1596.json index 427b8be78ae..753a774dd3f 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1596.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1596.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1596", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-11T10:39:26.747", - "lastModified": "2017-12-29T02:29:14.067", + "lastModified": "2024-11-21T01:37:16.653", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -221,6 +220,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15194", "source": "secalert@redhat.com" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=41001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078769.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078770.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-04/msg00060.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/28/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52736", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026874", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6833", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15194", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-15xx/CVE-2012-1597.json b/CVE-2012/CVE-2012-15xx/CVE-2012-1597.json index b812f33c981..52e7c1630e8 100644 --- a/CVE-2012/CVE-2012-15xx/CVE-2012-1597.json +++ b/CVE-2012/CVE-2012-15xx/CVE-2012-1597.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1597", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-17T00:55:02.657", - "lastModified": "2012-08-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:16.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -93,6 +92,22 @@ "Exploit", "Patch" ] + }, + { + "url": "http://share.ez.no/community-project/security-advisories/ezsa-2012-006-xss-exploit-on-ezjscore-run-command-when-using-firefox", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/11/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ezsystems/ezjscore/commit/58854564c7b8672090c25c4b1677d08620d870f2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1601.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1601.json index ad4d955de68..cc97ad4ace5 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1601.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1601.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1601", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-17T11:00:37.757", - "lastModified": "2018-01-05T02:29:29.007", + "lastModified": "2024-11-21T01:37:17.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -116,6 +115,50 @@ { "url": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0571.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2469", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/30/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=808199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/9c895160d25a76c21b65bad141b08e8d4f99afef", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1605.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1605.json index e5bf88125d3..43bd1e7993c 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1605.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1605.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1605", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-04T20:55:01.153", - "lastModified": "2012-09-05T13:46:54.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:17.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -135,6 +134,25 @@ { "url": "http://www.securityfocus.com/bid/52771", "source": "secalert@redhat.com" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/30/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80759", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52771", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1606.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1606.json index 01b4c1d6f6e..256b1c3c4f4 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1606.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1606.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1606", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-04T20:55:01.233", - "lastModified": "2012-09-05T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:17.747", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -288,6 +287,43 @@ { "url": "http://www.securityfocus.com/bid/52771", "source": "secalert@redhat.com" + }, + { + "url": "http://osvdb.org/80760", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48622", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48647", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/30/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52771", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1607.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1607.json index 93fd81f698e..686fa162c32 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1607.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1607.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1607", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-04T20:55:01.297", - "lastModified": "2012-09-05T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:17.860", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -333,6 +332,43 @@ { "url": "http://www.securityfocus.com/bid/52771", "source": "secalert@redhat.com" + }, + { + "url": "http://osvdb.org/80761", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48622", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48647", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/30/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52771", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1608.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1608.json index b4bbd6df46d..c29a7e05168 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1608.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1608.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1608", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-04T20:55:01.357", - "lastModified": "2012-09-05T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:17.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -281,6 +280,36 @@ { "url": "http://www.securityfocus.com/bid/52771", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/48647", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2445", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/30/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80762", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52771", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1610.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1610.json index c0e3b488125..771ecb81c02 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1610.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1610.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1610", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-05T22:55:10.013", - "lastModified": "2020-08-14T18:47:03.687", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:18.087", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -258,6 +257,105 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49043", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49317", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1435-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2462", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=20629", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/04/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/81024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52898", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0259", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74660", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1611.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1611.json index 65eeea62db5..45d1665aa8d 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1611.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1611.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1611", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-06T21:55:01.317", - "lastModified": "2013-10-03T18:31:17.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:18.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -108,6 +107,28 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/04/03/5", "source": "secalert@redhat.com" + }, + { + "url": "http://developer.joomla.org/security/news/398-20120307-core-information-disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48683", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/03/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/03/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1612.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1612.json index 051a7e5ec7c..b306504d302 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1612.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1612.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1612", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-06T21:55:01.393", - "lastModified": "2012-09-07T13:46:49.210", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:18.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,36 @@ { "url": "http://www.securityfocus.com/bid/52859", "source": "secalert@redhat.com" + }, + { + "url": "http://developer.joomla.org/security/news/399-20120308-core-xss-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48683", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/03/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/03/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80880", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52859", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1613.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1613.json index fb80481e14e..0db246e84ea 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1613.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1613.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1613", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-04T20:55:01.873", - "lastModified": "2023-11-07T02:10:17.067", + "lastModified": "2024-11-21T01:37:19.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -428,6 +427,72 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0167.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://coppermine.svn.sourceforge.net/viewvc/coppermine/trunk/cpg1.6.x/edit_one_pic.php?r1=8348&r2=8354", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://forum.coppermine-gallery.net/index.php/topic%2C74682.0.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80731", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/111369/Coppermine-1.5.18-Cross-Site-Scripting-Path-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48643", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/30/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/30/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/03/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.waraxe.us/advisory-81.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1614.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1614.json index 405959553d2..f902440d51a 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1614.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1614.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1614", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-04T20:55:01.937", - "lastModified": "2023-11-07T02:10:17.147", + "lastModified": "2024-11-21T01:37:19.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -458,6 +457,92 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0167.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://coppermine.svn.sourceforge.net/viewvc/coppermine/trunk/cpg1.6.x/edit_one_pic.php?r1=8348&r2=8354", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://forum.coppermine-gallery.net/index.php/topic%2C74682.0.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/80733", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/80734", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/80735", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.org/files/111369/Coppermine-1.5.18-Cross-Site-Scripting-Path-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18680", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/30/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/30/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/03/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52818", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.waraxe.us/advisory-81.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1616.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1616.json index 27ec18c0d6a..ec61a4c7b14 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1616.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1616.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1616", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-21T15:55:12.380", - "lastModified": "2017-08-29T01:31:19.680", + "lastModified": "2024-11-21T01:37:20.090", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -245,6 +244,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75162", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079762.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49602", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201206-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.argyllcms.com/icc_readme.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81617", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53240", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=809697", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75162", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1620.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1620.json index 0817942308d..ad123c20e1c 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1620.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1620.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1620", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-12T19:55:05.577", - "lastModified": "2017-08-29T01:31:19.837", + "lastModified": "2024-11-21T01:37:20.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -120,6 +119,55 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74666", "source": "secalert@redhat.com" + }, + { + "url": "http://hg.suckless.org/slock/rev/891a4984aba6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48700", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/06/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/06/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=401645", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786310", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74666", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1635.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1635.json index 34e7d672582..4e376facbd7 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1635.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1635.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1635", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-28T17:55:01.407", - "lastModified": "2012-08-29T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:21.990", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -202,6 +201,25 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://drupal.org/node/1407456", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/1409268", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1641.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1641.json index 3dedf74fd30..fbfef949487 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1641.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1641.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1641", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-28T17:55:03.170", - "lastModified": "2012-08-29T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:22.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -555,6 +554,68 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://drupal.org/node/1432318", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1432320", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/finder.git/commit/bc0cc82", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47915", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/47943", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.madirish.net/content/drupal-finder-6x-19-xss-and-remote-code-execution-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/16/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/19/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/1432970", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1642.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1642.json index 54d0ab8f6a6..4411c1a0ef5 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1642.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1642.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1642", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-28T17:55:03.250", - "lastModified": "2012-08-29T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:22.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -145,6 +144,43 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://drupal.org/node/1440508", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/linkchecker.git/commit/fef0ddf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79315", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/1441252", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1643.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1643.json index ed30bd92cd0..0a8c443f9f2 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1643.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1643.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1643", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-28T17:55:03.313", - "lastModified": "2012-08-29T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:22.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -125,6 +124,43 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://drupal.org/node/1441556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/fp.git/commitdiff/39e7587", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/1441448", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1644.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1644.json index 146d92964b9..1cad2b47ba2 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1644.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1644.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1644", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-28T17:55:03.500", - "lastModified": "2017-08-29T01:31:20.523", + "lastModified": "2024-11-21T01:37:22.957", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -137,6 +136,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53902", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1441086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupalcode.org/project/og_vocab.git/commitdiff/cd8de08", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79336", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/1441450", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53902", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1645.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1645.json index 55947967f56..9277bbd08a8 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1645.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1645.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1645", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-28T17:55:03.577", - "lastModified": "2012-08-29T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:23.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -136,6 +135,54 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://drupal.org/node/1441480", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1441482", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/cdn.git/commitdiff/cd2a5ff", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/cdn.git/commitdiff/eca85e6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48032", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/1441502", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1647.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1647.json index 26d651d9e86..b426b7c41ab 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1647.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1647.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1647", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-28T17:55:03.877", - "lastModified": "2017-08-29T01:31:20.647", + "lastModified": "2024-11-21T01:37:23.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -227,6 +226,60 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73606", "source": "secalert@redhat.com" + }, + { + "url": "http://drupalcode.org/project/mediafront.git/commitdiff/6300750", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/mediafront.git/commitdiff/b3857aa", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79684", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52229", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/1460892", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://drupal.org/node/1460894", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://drupal.org/node/1461424", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73606", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1648.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1648.json index 52557a8b78e..97a65a4a823 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1648.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1648.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1648", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:06.307", - "lastModified": "2017-08-29T01:31:20.710", + "lastModified": "2024-11-21T01:37:23.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -158,6 +157,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73607", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1417186", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1461438", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/79712", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48196", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73607", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1649.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1649.json index 94e9e2653c1..10d10b1ec87 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1649.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1649.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1649", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:06.370", - "lastModified": "2017-08-29T01:31:20.757", + "lastModified": "2024-11-21T01:37:23.487", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -161,6 +160,43 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73608", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1417186", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1461438", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48196", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79772", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73608", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1650.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1650.json index aadb5b0ba26..3d031c72e1d 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1650.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1650.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1650", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-28T17:55:04.000", - "lastModified": "2017-08-29T01:31:20.820", + "lastModified": "2024-11-21T01:37:23.590", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -131,6 +130,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73609", "source": "secalert@redhat.com" + }, + { + "url": "http://drupalcode.org/project/zipcart.git/commitdiff/fe143c2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/79766", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/1460892", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://drupal.org/node/1461446", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73609", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1661.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1661.json index 4442d71a2a8..d115c8c6c7f 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1661.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1661.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1661", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T21:55:04.750", - "lastModified": "2024-10-10T14:30:09.217", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:24.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -111,6 +110,45 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://packetstormsecurity.org/files/113644/ESRI-ArcMap-Arbitrary-Code-Execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.cs.umb.edu/~joecohen/exploits/CVE-2012-1661/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/19138", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.osvdb.org/82986", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1662.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1662.json index 5ef59cd77dc..68443eb1346 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1662.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1662.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1662", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T03:28:04.423", - "lastModified": "2021-04-07T18:14:30.630", + "lastModified": "2024-11-21T01:37:24.877", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -114,6 +113,37 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0109.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52655", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026832", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74175", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7b983E3A52-8374-410A-82BD-B8788733C70F%7d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1663.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1663.json index 0512f696f94..69aacb86e47 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1663.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1663.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1663", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-13T22:55:03.067", - "lastModified": "2017-08-29T01:31:21.397", + "lastModified": "2024-11-21T01:37:25.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -907,6 +906,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74099", "source": "cve@mitre.org" + }, + { + "url": "http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/5866", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/24865", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74099", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1666.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1666.json index 044766a24e6..1194c6998f3 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1666.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1666.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1666", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-08T10:28:20.367", - "lastModified": "2012-09-10T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'", + "lastModified": "2024-11-21T01:37:25.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -219,6 +217,15 @@ { "url": "https://www.vmware.com/support/vsphere4/doc/vsp_esxi41_u3_rel_notes.html#resolvedissuessecurity", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-09/0013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.vmware.com/support/vsphere4/doc/vsp_esxi41_u3_rel_notes.html#resolvedissuessecurity", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1667.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1667.json index 601dcf66490..45734e3c641 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1667.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1667.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1667", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T16:55:01.277", - "lastModified": "2018-01-18T02:29:13.867", + "lastModified": "2024-11-21T01:37:25.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -1363,6 +1362,10 @@ "url": "http://marc.info/?l=bugtraq&m=134132772016230&w=2", "source": "cve@mitre.org" }, + { + "url": "http://marc.info/?l=bugtraq&m=134132772016230&w=2", + "source": "cve@mitre.org" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0717.html", "source": "cve@mitre.org" @@ -1416,6 +1419,80 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134132772016230&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134132772016230&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0717.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1110.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51096", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5501", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2486", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.isc.org/software/bind/advisories/cve-2012-1667", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/381699", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:089", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53772", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.isc.org/article/AA-00698", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1670.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1670.json index ff986eabc3d..48d0c8dc587 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1670.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1670.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1670", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-31T14:55:01.000", - "lastModified": "2017-12-13T02:29:06.263", + "lastModified": "2024-11-21T01:37:25.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -111,6 +110,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74292", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0115.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://downloads.sourceforge.net/project/php-gradebook/phpGradeBook%20-%20BETA/1.9.5/phpGradeBook1.9.5.zip", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://osvdb.org/80311", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18647/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52686", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74292", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1672.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1672.json index 2141239dd30..d4e17cb87ed 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1672.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1672.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1672", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-11T10:39:27.013", - "lastModified": "2017-08-29T01:31:21.493", + "lastModified": "2024-11-21T01:37:26.137", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74612", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18702/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52879", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74612", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1673.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1673.json index 7e2c1271644..81be6832857 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1673.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1673.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1673", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-11T10:39:27.043", - "lastModified": "2017-08-29T01:31:21.553", + "lastModified": "2024-11-21T01:37:26.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74613", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18700/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52878", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74613", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1674.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1674.json index a754abeab87..45d7e70e75b 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1674.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1674.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1674", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.170", - "lastModified": "2017-12-07T02:29:11.240", + "lastModified": "2024-11-21T01:37:26.393", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -114,6 +113,29 @@ { "url": "http://www.securitytracker.com/id?1026952", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/48885", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026952", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1675.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1675.json index c65c6ddf650..911ffb40d58 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1675.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1675.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1675", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-08T22:55:01.010", - "lastModified": "2018-08-23T12:51:09.087", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:26.503", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -179,6 +178,84 @@ "tags": [ "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Apr/204", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Apr/343", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/359816", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53308", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027000", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://blogs.oracle.com/security/entry/security_alert_for_cve_2012", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75303", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1676.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1676.json index fa94e6ca5f9..e6f0dd3ed81 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1676.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1676.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1676", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.217", - "lastModified": "2013-10-11T03:42:27.880", + "lastModified": "2024-11-21T01:37:26.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -106,6 +105,21 @@ { "url": "http://www.securitytracker.com/id?1026953", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026953", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1679.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1679.json index 8847abbf52c..4b8d98d3c49 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1679.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1679.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1679", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.247", - "lastModified": "2013-10-11T03:42:28.130", + "lastModified": "2024-11-21T01:37:26.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -106,6 +105,21 @@ { "url": "http://www.securitytracker.com/id?1026953", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026953", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1681.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1681.json index 6f40422a83b..3ead867d4bd 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1681.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1681.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1681", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.277", - "lastModified": "2017-12-07T02:29:11.287", + "lastModified": "2024-11-21T01:37:27.147", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -109,6 +108,29 @@ { "url": "http://www.securitytracker.com/id?1026940", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/48809", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026940", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1682.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1682.json index dc86e88ece0..f9c134e79ff 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1682.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1682.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1682", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-08-30T23:55:01.090", - "lastModified": "2013-10-31T03:24:30.020", + "lastModified": "2024-11-21T01:37:27.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -155,6 +154,10 @@ "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-1222.html", "source": "secalert_us@oracle.com" @@ -193,6 +196,65 @@ { "url": "http://www.ubuntu.com/usn/USN-1553-1", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1222.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1225.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1466.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51327", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1553-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1683.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1683.json index 2a71b31d12c..66c5f28a3d5 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1683.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1683.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1683", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.327", - "lastModified": "2017-12-07T02:29:11.350", + "lastModified": "2024-11-21T01:37:27.373", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:M/C:C/I:C/A:C", + "baseScore": 5.9, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "MULTIPLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.2, @@ -109,6 +108,29 @@ { "url": "http://www.securitytracker.com/id?1026940", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/48809", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026940", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1684.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1684.json index 645629cca8e..e66989ddf5b 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1684.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1684.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1684", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.357", - "lastModified": "2017-12-07T02:29:11.397", + "lastModified": "2024-11-21T01:37:27.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.1, @@ -109,6 +108,29 @@ { "url": "http://www.securitytracker.com/id?1026940", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/48809", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026940", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1687.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1687.json index 6381d29d316..f21370a0582 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1687.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1687.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1687", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.317", - "lastModified": "2017-08-29T01:31:21.790", + "lastModified": "2024-11-21T01:37:27.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:C", + "baseScore": 5.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "COMPLETE", - "baseScore": 5.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -115,6 +114,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77043", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83938", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54508", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77043", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1688.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1688.json index e5d7d46a4c8..d2a306fd474 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1688.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1688.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1688", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.387", - "lastModified": "2022-08-26T20:31:51.417", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:27.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -207,6 +206,79 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48890", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/49179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/51309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/53372", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53067", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026934", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1689.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1689.json index f3bbd4faf10..a59820f0fbe 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1689.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1689.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1689", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.350", - "lastModified": "2022-08-26T20:32:05.380", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:28.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -208,6 +207,80 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://osvdb.org/83980", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/53372", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54547", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027263", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1690.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1690.json index dac14f48543..76462519e20 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1690.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1690.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1690", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.420", - "lastModified": "2022-08-26T16:22:59.410", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:28.237", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -207,6 +206,79 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48890", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/49179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/51309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/53372", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53074", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026934", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1691.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1691.json index a3a53797426..ef254233fb6 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1691.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1691.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1691", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.467", - "lastModified": "2017-12-07T02:29:11.617", + "lastModified": "2024-11-21T01:37:28.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 6.6, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 2.7, @@ -102,6 +101,37 @@ { "url": "http://www.securitytracker.com/id?1026940", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/48809", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026940", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1692.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1692.json index d3388ea088e..f4b8b653360 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1692.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1692.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1692", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.497", - "lastModified": "2017-12-07T02:29:11.663", + "lastModified": "2024-11-21T01:37:28.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -116,6 +115,51 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://secunia.com/advisories/48809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://secunia.com/advisories/51388", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53125", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026940", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://downloads.avaya.com/css/P8/documents/100161091", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1693.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1693.json index 449a89f20b9..cf99061630a 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1693.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1693.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1693", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.527", - "lastModified": "2017-12-07T02:29:11.727", + "lastModified": "2024-11-21T01:37:28.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -119,6 +118,29 @@ { "url": "http://www.securitytracker.com/id?1026942", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026942", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1694.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1694.json index 5b534458a1c..440e1da52f4 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1694.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1694.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1694", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.560", - "lastModified": "2017-12-07T02:29:11.773", + "lastModified": "2024-11-21T01:37:28.737", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "http://www.securitytracker.com/id?1026940", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/48809", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026940", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1695.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1695.json index 593db0c3452..51c352e0122 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1695.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1695.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1695", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.607", - "lastModified": "2017-12-14T02:29:01.387", + "lastModified": "2024-11-21T01:37:28.837", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", - "availabilityImpact": "NONE", - "baseScore": 6.8, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.2, "impactScore": 4.0 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -257,6 +256,29 @@ { "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/48864", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujan2020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1696.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1696.json index 5b48f22db99..213726a87db 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1696.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1696.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1696", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.637", - "lastModified": "2019-12-17T20:23:43.220", + "lastModified": "2024-11-21T01:37:28.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -1412,6 +1411,41 @@ { "url": "http://www.securitytracker.com/id?1026934", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/48890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/53372", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53071", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026934", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1697.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1697.json index 0e04d8204d5..cdc96ab4a97 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1697.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1697.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1697", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.670", - "lastModified": "2022-08-26T20:32:57.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:29.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -149,6 +148,65 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://secunia.com/advisories/48890", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/49179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/53372", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53064", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026934", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-16xx/CVE-2012-1698.json b/CVE-2012/CVE-2012-16xx/CVE-2012-1698.json index 11c2680eee5..1a8ab31505d 100644 --- a/CVE-2012/CVE-2012-16xx/CVE-2012-1698.json +++ b/CVE-2012/CVE-2012-16xx/CVE-2012-1698.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1698", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.700", - "lastModified": "2017-12-07T02:29:12.070", + "lastModified": "2024-11-21T01:37:29.253", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -94,6 +93,29 @@ { "url": "http://www.securitytracker.com/id?1026940", "source": "secalert_us@oracle.com" + }, + { + "url": "http://secunia.com/advisories/48809", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026940", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1703.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1703.json index f047d3e2f7d..751b80a71e4 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1703.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1703.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1703", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.747", - "lastModified": "2022-07-01T14:10:24.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:29.827", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -216,6 +215,83 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48890", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Permissions Required" + ] + }, + { + "url": "http://secunia.com/advisories/49179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Permissions Required" + ] + }, + { + "url": "http://secunia.com/advisories/51309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Permissions Required" + ] + }, + { + "url": "http://secunia.com/advisories/53372", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Permissions Required" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026934", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1704.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1704.json index 605a6bab8ad..45f54603e82 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1704.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1704.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1704", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.777", - "lastModified": "2016-11-22T16:17:55.537", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:29.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -122,6 +121,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53094", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1706.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1706.json index 8ecdb08130c..41148090c3d 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1706.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1706.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1706", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.810", - "lastModified": "2013-10-11T03:42:31.207", + "lastModified": "2024-11-21T01:37:30.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:N", + "baseScore": 4.7, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "MULTIPLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.7 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.4, @@ -110,6 +109,25 @@ { "url": "http://www.securitytracker.com/id?1026953", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53116", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026953", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1707.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1707.json index 0bff536502b..73d33ae2fe8 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1707.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1707.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1707", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.857", - "lastModified": "2016-11-22T16:17:26.420", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:30.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -122,6 +121,37 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53107", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026953", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1708.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1708.json index ac71d91c1c4..bb27173c760 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1708.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1708.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1708", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.887", - "lastModified": "2017-09-09T01:29:01.143", + "lastModified": "2024-11-21T01:37:30.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,25 @@ { "url": "http://www.securitytracker.com/id?1026929", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026929", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1709.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1709.json index 4b55a73a98e..5a76e08bbc9 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1709.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1709.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1709", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.920", - "lastModified": "2017-12-07T02:29:12.210", + "lastModified": "2024-11-21T01:37:30.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "http://www.securitytracker.com/id?1026949", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026949", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1710.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1710.json index 0067f05146f..ee62237761f 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1710.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1710.json @@ -2,13 +2,8 @@ "id": "CVE-2012-1710", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-05-03T22:55:02.967", - "lastModified": "2024-06-28T17:24:50.570", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-05-25", - "cisaActionDue": "2022-06-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Oracle Fusion Middleware Unspecified Vulnerability", + "lastModified": "2024-11-21T01:37:30.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-05-25", + "cisaActionDue": "2022-06-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Oracle Fusion Middleware Unspecified Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -121,6 +120,30 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026949", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1711.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1711.json index 4023a7c9aa7..b51ff34c66e 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1711.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1711.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1711", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.077", - "lastModified": "2022-05-13T14:53:00.377", + "lastModified": "2024-11-21T01:37:30.883", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -153,6 +152,10 @@ "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", "source": "secalert_us@oracle.com" @@ -179,6 +182,45 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15996", "source": "secalert_us@oracle.com" + }, + { + "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53949", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15996", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1713.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1713.json index e850aea9fa0..e70042c9c30 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1713.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1713.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1713", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.157", - "lastModified": "2022-05-13T14:52:57.120", + "lastModified": "2024-11-21T01:37:31.117", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -185,6 +184,10 @@ "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", "source": "secalert_us@oracle.com" @@ -243,6 +246,93 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16502", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1243.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50659", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21615246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53946", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16502", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1715.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1715.json index ec86791c05e..01b85e3a761 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1715.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1715.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1715", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.397", - "lastModified": "2017-08-29T01:31:21.977", + "lastModified": "2024-11-21T01:37:31.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77015", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83954", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54558", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027269", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77015", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1716.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1716.json index fa21553e66f..d2ffef98a74 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1716.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1716.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1716", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.203", - "lastModified": "2022-05-13T14:52:55.690", + "lastModified": "2024-11-21T01:37:31.613", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -808,6 +807,10 @@ "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", "source": "secalert_us@oracle.com" @@ -850,6 +853,73 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16168", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21615246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16168", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1717.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1717.json index cea28e6e46c..d24a200a4b1 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1717.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1717.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1717", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.250", - "lastModified": "2022-12-13T17:00:38.410", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html\n\n'Applies to printing on the Solaris and Linux platforms. This vulnerability cannot be exploited through untrusted Java Web Start applications or untrusted Java applets. It also cannot be exploited by supplying data to APIs in the specified Component without using untrusted Java Web Start applications or untrusted Java applets, such as through a web service.'", + "lastModified": "2024-11-21T01:37:31.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -1122,6 +1120,141 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1243.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/51080", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21615246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53952", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html\n\n'Applies to printing on the Solaris and Linux platforms. This vulnerability cannot be exploited through untrusted Java Web Start applications or untrusted Java applets. It also cannot be exploited by supplying data to APIs in the specified Component without using untrusted Java Web Start applications or untrusted Java applets, such as through a web service.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1718.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1718.json index fdcb1d78b7f..918388b719d 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1718.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1718.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1718", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.297", - "lastModified": "2022-05-13T14:52:55.303", + "lastModified": "2024-11-21T01:37:32.213", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -169,6 +168,10 @@ "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", "source": "secalert_us@oracle.com" @@ -239,6 +242,105 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15923", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1243.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50659", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51326", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21620575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21615246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15923", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1719.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1719.json index c8b13a76ca6..f93830d9f6e 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1719.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1719.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1719", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.327", - "lastModified": "2022-05-13T14:52:56.570", + "lastModified": "2024-11-21T01:37:32.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -1199,6 +1198,10 @@ "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", "source": "secalert_us@oracle.com" @@ -1249,6 +1252,85 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16312", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1243.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50659", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21615246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16312", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1720.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1720.json index 0a990670d81..f05a015b17c 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1720.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1720.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1720", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.373", - "lastModified": "2022-05-13T14:52:53.353", + "lastModified": "2024-11-21T01:37:33.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 3.7, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.7 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -145,6 +144,10 @@ } ], "references": [ + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", "source": "secalert_us@oracle.com" @@ -179,6 +182,45 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16581", "source": "secalert_us@oracle.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21615246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53956", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16581", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1721.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1721.json index e717a1a34dc..cf6f2b2fb51 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1721.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1721.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1721", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.407", - "lastModified": "2022-05-13T14:52:54.230", + "lastModified": "2024-11-21T01:37:33.410", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -113,6 +112,10 @@ "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", "source": "secalert_us@oracle.com" @@ -139,6 +142,49 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16358", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53959", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16358", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1722.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1722.json index 20b7be56e1a..91dad9e61ee 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1722.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1722.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1722", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.467", - "lastModified": "2022-05-13T14:52:58.057", + "lastModified": "2024-11-21T01:37:33.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -113,6 +112,10 @@ "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", "source": "secalert_us@oracle.com" @@ -139,6 +142,49 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16214", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53953", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16214", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1723.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1723.json index 5fb058d5472..44631117a9b 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1723.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1723.json @@ -2,13 +2,8 @@ "id": "CVE-2012-1723", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.500", - "lastModified": "2024-07-16T17:38:00.953", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-03", - "cisaActionDue": "2022-03-24", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability", + "lastModified": "2024-11-21T01:37:33.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-03-03", + "cisaActionDue": "2022-03-24", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -802,6 +801,13 @@ "Mailing List" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com", + "tags": [ + "Mailing List" + ] + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", "source": "secalert_us@oracle.com", @@ -859,6 +865,85 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51080", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21615246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53960", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1724.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1724.json index 30a992624a8..b629fe071b0 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1724.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1724.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1724", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.547", - "lastModified": "2022-05-13T14:52:55.103", + "lastModified": "2024-11-21T01:37:33.983", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -449,6 +448,10 @@ "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", "source": "secalert_us@oracle.com" @@ -483,6 +486,53 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16659", "source": "secalert_us@oracle.com" + }, + { + "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53958", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16659", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1725.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1725.json index c8d33a0727b..ea42dc8b87d 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1725.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1725.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1725", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.577", - "lastModified": "2022-05-13T14:53:00.330", + "lastModified": "2024-11-21T01:37:34.177", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -808,6 +807,10 @@ "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", "source": "secalert_us@oracle.com" @@ -850,6 +853,73 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16513", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1456.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21615246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53954", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16513", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1726.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1726.json index e0d416a9d23..f00c2f5ba00 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1726.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1726.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1726", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-06-16T21:55:03.607", - "lastModified": "2017-09-19T01:34:48.370", + "lastModified": "2024-11-21T01:37:34.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -127,6 +126,10 @@ "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", "source": "secalert_us@oracle.com" @@ -145,6 +148,37 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16699", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16699", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1727.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1727.json index db4e063ba06..e1785278d7e 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1727.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1727.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1727", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.443", - "lastModified": "2017-08-29T01:31:22.040", + "lastModified": "2024-11-21T01:37:34.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -123,6 +122,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77017", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83956", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54565", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027269", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77017", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1728.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1728.json index 0d14bddd29f..910faa353d5 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1728.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1728.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1728", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.473", - "lastModified": "2017-08-29T01:31:22.100", + "lastModified": "2024-11-21T01:37:34.703", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77034", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83921", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54519", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77034", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1729.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1729.json index fd02cd78c87..eff7fa150cc 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1729.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1729.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1729", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.520", - "lastModified": "2017-08-29T01:31:22.163", + "lastModified": "2024-11-21T01:37:34.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77013", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83953", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54509", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027273", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77013", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1730.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1730.json index 73eb1bf6c30..9b99bb9408f 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1730.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1730.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1730", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.567", - "lastModified": "2017-08-29T01:31:22.210", + "lastModified": "2024-11-21T01:37:35.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77016", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83955", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54561", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027269", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77016", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1731.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1731.json index 3ac183d8545..bff738cc98a 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1731.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1731.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1731", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.600", - "lastModified": "2017-08-29T01:31:22.273", + "lastModified": "2024-11-21T01:37:35.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77033", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83924", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77033", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1732.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1732.json index 3187ec99045..b3f6c098d7b 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1732.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1732.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1732", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.630", - "lastModified": "2017-08-29T01:31:22.320", + "lastModified": "2024-11-21T01:37:36.053", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77038", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83919", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54538", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77038", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1733.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1733.json index 50e1f666642..69814c1840a 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1733.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1733.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1733", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.677", - "lastModified": "2017-08-29T01:31:22.367", + "lastModified": "2024-11-21T01:37:36.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -112,6 +111,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77029", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54539", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027265", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77029", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1734.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1734.json index 3dcc7440247..8879e9345fd 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1734.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1734.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1734", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.710", - "lastModified": "2022-08-29T20:53:59.950", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:36.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -208,6 +207,80 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://osvdb.org/83979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/53372", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54540", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027263", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77064", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1735.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1735.json index c050e59b4c0..a7b57f10f74 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1735.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1735.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1735", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.740", - "lastModified": "2022-07-01T14:05:38.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:36.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -136,6 +135,52 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://osvdb.org/83975", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54549", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027263", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1736.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1736.json index 73337345953..2d7ee352c93 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1736.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1736.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1736", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.770", - "lastModified": "2017-08-29T01:31:22.587", + "lastModified": "2024-11-21T01:37:36.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76995", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76995", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1737.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1737.json index 205dfe0b2e6..b307e754f81 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1737.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1737.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1737", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.803", - "lastModified": "2017-08-29T01:31:22.647", + "lastModified": "2024-11-21T01:37:36.983", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -132,6 +131,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77014", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83945", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54569", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77014", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1738.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1738.json index 6ee5c739de0..b5b3af2907a 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1738.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1738.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1738", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.850", - "lastModified": "2017-08-29T01:31:22.710", + "lastModified": "2024-11-21T01:37:37.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77058", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83974", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54515", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77058", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1739.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1739.json index 3fd9260b5a7..4c97efef55d 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1739.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1739.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1739", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.880", - "lastModified": "2017-08-29T01:31:22.757", + "lastModified": "2024-11-21T01:37:37.297", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -123,6 +122,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77018", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54566", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027269", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77018", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1740.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1740.json index b87c8d33a59..b0503067ae8 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1740.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1740.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1740", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.913", - "lastModified": "2013-10-11T03:42:33.910", + "lastModified": "2024-11-21T01:37:37.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -109,6 +108,29 @@ { "url": "http://www.securitytracker.com/id?1027270", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54498", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027270", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1741.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1741.json index b460c895ad8..e13e4ee52e9 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1741.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1741.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1741", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.960", - "lastModified": "2017-08-29T01:31:22.820", + "lastModified": "2024-11-21T01:37:38.107", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76994", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54492", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76994", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1742.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1742.json index 47beb33faf7..844aba1cf04 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1742.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1742.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1742", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:01.990", - "lastModified": "2017-08-29T01:31:22.883", + "lastModified": "2024-11-21T01:37:38.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -115,6 +114,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77035", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83922", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54521", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77035", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1743.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1743.json index 57975b12df9..92ff756ed82 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1743.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1743.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1743", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.020", - "lastModified": "2017-08-29T01:31:22.947", + "lastModified": "2024-11-21T01:37:38.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:M/C:P/I:N/A:N", + "baseScore": 2.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "MULTIPLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.8 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -108,6 +107,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77040", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027266", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77040", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1744.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1744.json index 8aae13b6038..24ad04bab51 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1744.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1744.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1744", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.053", - "lastModified": "2017-08-29T01:31:23.007", + "lastModified": "2024-11-21T01:37:38.640", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -104,6 +102,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77012", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77012", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1745.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1745.json index c62a1d4c291..aa099ba6463 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1745.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1745.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1745", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.100", - "lastModified": "2013-10-11T03:42:34.380", + "lastModified": "2024-11-21T01:37:38.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,33 @@ { "url": "http://www.securitytracker.com/id?1027260", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83946", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54501", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027260", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1746.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1746.json index 449e342a3a0..f490fba7130 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1746.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1746.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1746", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.130", - "lastModified": "2013-10-11T03:42:34.457", + "lastModified": "2024-11-21T01:37:38.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -131,6 +130,29 @@ { "url": "http://www.securitytracker.com/id?1027260", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54507", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027260", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1747.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1747.json index 960d25e8ceb..b1e1d97a975 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1747.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1747.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1747", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.163", - "lastModified": "2013-10-11T03:42:34.553", + "lastModified": "2024-11-21T01:37:39.117", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,29 @@ { "url": "http://www.securitytracker.com/id?1027260", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54518", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027260", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1748.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1748.json index 3d8a37b79f8..029999f07d9 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1748.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1748.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1748", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.210", - "lastModified": "2017-08-29T01:31:23.070", + "lastModified": "2024-11-21T01:37:39.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -114,6 +113,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77027", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83966", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54527", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027265", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77027", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1749.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1749.json index 83e8346b899..f529b85f28e 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1749.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1749.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1749", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.240", - "lastModified": "2017-08-29T01:31:23.133", + "lastModified": "2024-11-21T01:37:39.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76996", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83915", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54516", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76996", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1750.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1750.json index 2812a1349b8..ab9c2cacd16 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1750.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1750.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1750", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.270", - "lastModified": "2017-08-29T01:31:23.197", + "lastModified": "2024-11-21T01:37:39.643", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -109,6 +108,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77051", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83933", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77051", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1752.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1752.json index 224c9bfa0bb..4a9b315c47a 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1752.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1752.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1752", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.303", - "lastModified": "2017-08-29T01:31:23.243", + "lastModified": "2024-11-21T01:37:39.943", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77049", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83940", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54530", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77049", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1753.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1753.json index 06cadb80f16..3cf76820a32 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1753.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1753.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1753", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.333", - "lastModified": "2017-08-29T01:31:23.303", + "lastModified": "2024-11-21T01:37:40.870", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:M/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "MULTIPLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -112,6 +111,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77025", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54544", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027265", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77025", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1754.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1754.json index 5e1ca73e15b..4910041fa8e 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1754.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1754.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1754", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.380", - "lastModified": "2017-08-29T01:31:23.350", + "lastModified": "2024-11-21T01:37:41.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77039", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54542", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77039", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1756.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1756.json index 4fcec83a764..b978783cd5c 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1756.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1756.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1756", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T22:55:02.413", - "lastModified": "2022-08-29T20:53:51.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:41.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -136,6 +135,52 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://osvdb.org/83978", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54524", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027263", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77063", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1757.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1757.json index e5404ca5cd4..5cf1dfa9abd 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1757.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1757.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1757", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.130", - "lastModified": "2022-08-29T20:53:46.647", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:41.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -136,6 +135,52 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://osvdb.org/83977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54526", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027263", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77062", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1758.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1758.json index 51a8eba2f9d..affd4916c16 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1758.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1758.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1758", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.177", - "lastModified": "2017-08-29T01:31:23.570", + "lastModified": "2024-11-21T01:37:41.777", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -115,6 +114,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77020", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54571", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027268", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77020", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1759.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1759.json index 80a81fc3cce..b32c334bbda 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1759.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1759.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1759", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.210", - "lastModified": "2017-08-29T01:31:23.633", + "lastModified": "2024-11-21T01:37:41.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -118,6 +117,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77021", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83962", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54555", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027268", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77021", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1760.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1760.json index 4d73f691bf2..4e0b5eed82e 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1760.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1760.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1760", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.257", - "lastModified": "2017-08-29T01:31:23.710", + "lastModified": "2024-11-21T01:37:42.113", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -115,6 +114,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77036", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54529", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77036", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1761.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1761.json index 301172a3460..2e0e405b7eb 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1761.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1761.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1761", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.303", - "lastModified": "2017-08-29T01:31:23.773", + "lastModified": "2024-11-21T01:37:42.313", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77037", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83923", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77037", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1762.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1762.json index 6818f91bf97..9ac4faa01b3 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1762.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1762.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1762", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.333", - "lastModified": "2017-08-29T01:31:23.837", + "lastModified": "2024-11-21T01:37:42.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -112,6 +111,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77031", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83970", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027265", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1764.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1764.json index 0d08e5b3461..c2ffbc8997a 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1764.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1764.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1764", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.380", - "lastModified": "2017-08-29T01:31:23.897", + "lastModified": "2024-11-21T01:37:42.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -112,6 +111,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77030", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83969", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54545", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027265", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77030", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1765.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1765.json index 4be9a5ec1a2..0b6e09d91fc 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1765.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1765.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1765", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.413", - "lastModified": "2017-08-29T01:31:23.960", + "lastModified": "2024-11-21T01:37:42.907", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:C/A:N", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 4.7 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77050", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83934", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54532", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77050", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1766.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1766.json index 98136f4ec97..47c499ab77b 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1766.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1766.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1766", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.460", - "lastModified": "2018-10-12T22:02:33.607", + "lastModified": "2024-11-21T01:37:43.060", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -131,6 +129,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15724", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54531", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76999", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15724", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1767.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1767.json index 5ead63b5f85..5f71c8ec4f7 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1767.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1767.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1767", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.490", - "lastModified": "2018-10-12T22:02:34.747", + "lastModified": "2024-11-21T01:37:43.247", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -131,6 +129,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15812", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54536", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15812", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1768.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1768.json index 4fe81c387d7..54d5082358b 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1768.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1768.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1768", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.537", - "lastModified": "2018-10-12T22:02:35.857", + "lastModified": "2024-11-21T01:37:43.417", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -126,6 +124,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15275", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15275", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1769.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1769.json index be520e1ce4b..78983f4f469 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1769.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1769.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1769", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.567", - "lastModified": "2018-10-12T22:02:36.980", + "lastModified": "2024-11-21T01:37:43.597", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -131,6 +129,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15721", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15721", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1770.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1770.json index a1f96ddd31d..285e363c1d4 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1770.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1770.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1770", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.617", - "lastModified": "2018-10-12T22:02:38.263", + "lastModified": "2024-11-21T01:37:43.750", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -131,6 +129,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14882", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54541", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14882", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1771.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1771.json index c30a40d6efb..66d6bbb89a8 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1771.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1771.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1771", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.647", - "lastModified": "2018-10-12T22:02:39.450", + "lastModified": "2024-11-21T01:37:43.920", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -131,6 +129,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15668", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54543", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15668", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1772.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1772.json index f0e00338424..ff24c656998 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1772.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1772.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1772", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.677", - "lastModified": "2018-10-12T22:02:40.637", + "lastModified": "2024-11-21T01:37:44.083", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -131,6 +129,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15323", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54497", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15323", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1773.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1773.json index 0be68bfafea..c607f71e745 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1773.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1773.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1773", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.710", - "lastModified": "2018-10-12T22:02:41.917", + "lastModified": "2024-11-21T01:37:44.753", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -131,6 +129,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15568", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15568", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1774.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1774.json index 46bbb3ec97c..4712bc9ec56 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1774.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1774.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1774", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-18T00:55:01.013", - "lastModified": "2018-01-06T02:29:37.897", + "lastModified": "2024-11-21T01:37:44.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74120", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80203", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://player.gomlab.com/eng/download/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74120", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1775.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1775.json index 65de733d490..b2de6c141f5 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1775.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1775.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1775", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T16:55:01.123", - "lastModified": "2023-11-07T02:10:19.270", + "lastModified": "2024-11-21T01:37:45.137", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -629,6 +628,33 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14820", "source": "cve@mitre.org" + }, + { + "url": "http://git.videolan.org/?p=vlc/vlc-2.0.git%3Ba=commit%3Bh=11a95cce96fffdbaba1be6034d7b42721667821c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18825", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53391", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.videolan.org/security/sa1201.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14820", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1776.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1776.json index cadcfefc15c..db0bb4e30b7 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1776.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1776.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1776", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T16:55:01.170", - "lastModified": "2018-01-06T02:29:37.973", + "lastModified": "2024-11-21T01:37:45.377", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -625,6 +624,29 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14817", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80189", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.videolan.org/security/sa1202.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74118", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14817", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1777.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1777.json index c5b6faf4fdc..60e7fb29cf3 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1777.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1777.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1777", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-05T14:55:05.327", - "lastModified": "2018-01-06T02:29:38.050", + "lastModified": "2024-11-21T01:37:45.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -119,6 +118,44 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.org/files/111276/F5-FirePass-SSL-VPN-6.x-7.x-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Mar/324", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.f5.com/kb/en-us/solutions/public/13000/400/sol13463.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026834", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74198", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74450", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/files/20120328-0_F5_FirePass_SSL_VPN_unauthenticated_remote_root_v1.0.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1778.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1778.json index f75b7dc40e5..8bc7040d101 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1778.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1778.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1778", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:02.687", - "lastModified": "2017-08-29T01:31:24.617", + "lastModified": "2024-11-21T01:37:45.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73483", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18525", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73483", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1779.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1779.json index d34469813a6..837711c4784 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1779.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1779.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1779", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:02.733", - "lastModified": "2018-01-11T02:29:04.450", + "lastModified": "2024-11-21T01:37:45.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73505", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/110212/idev-BusinessDirectory-3.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48173", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52171", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73505", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1780.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1780.json index 2caac134d8b..efceb7e87b7 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1780.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1780.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1780", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:02.813", - "lastModified": "2017-08-29T01:31:24.710", + "lastModified": "2024-11-21T01:37:45.993", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,39 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73440", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79458", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/110043/SocialCMS-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/44313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48082", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73440", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1781.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1781.json index d864e63e1d9..80a20e53d9b 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1781.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1781.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1781", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:02.860", - "lastModified": "2017-08-29T01:31:24.773", + "lastModified": "2024-11-21T01:37:46.143", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73442", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79457", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/110043/SocialCMS-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48082", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52109", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73442", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1782.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1782.json index 8e94c21100c..90864c7a8db 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1782.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1782.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1782", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:03.110", - "lastModified": "2012-03-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:46.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "http://www.vulnerability-lab.com/get_content.php?id=461", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0164.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52184", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=461", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1783.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1783.json index 67641a6279b..139c60c8ccb 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1783.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1783.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1783", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:03.140", - "lastModified": "2017-08-29T01:31:24.820", + "lastModified": "2024-11-21T01:37:46.433", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73482", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18524", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73482", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1784.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1784.json index ccf3be801d2..f039d7c8f87 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1784.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1784.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1784", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:03.217", - "lastModified": "2018-01-11T02:29:04.497", + "lastModified": "2024-11-21T01:37:46.573", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73503", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/110225/MyJobList-0.1.3-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48169", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52168", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1785.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1785.json index 71348e8f692..1b62b84b93b 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1785.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1785.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1785", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:03.313", - "lastModified": "2017-08-29T01:31:24.930", + "lastModified": "2024-11-21T01:37:46.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -150,6 +149,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73508", "source": "cve@mitre.org" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fvideo-embed-thumbnail-generator&old=507924&new_path=%2Fvideo-embed-thumbnail-generator&new=507924", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48087", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/video-embed-thumbnail-generator/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52180", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73508", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1786.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1786.json index fd8b3e89cde..573f918d90a 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1786.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1786.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1786", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:03.373", - "lastModified": "2012-11-06T05:10:14.580", + "lastModified": "2024-11-21T01:37:46.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -139,6 +138,21 @@ { "url": "http://www.securityfocus.com/bid/52652", "source": "cve@mitre.org" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fvideo-embed-thumbnail-generator&old=507924&new_path=%2Fvideo-embed-thumbnail-generator&new=507924", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/video-embed-thumbnail-generator/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52652", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1787.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1787.json index f8d5a6103ef..2c6c501d8f0 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1787.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1787.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1787", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:03.420", - "lastModified": "2018-01-11T02:29:04.577", + "lastModified": "2024-11-21T01:37:46.997", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -348,6 +347,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73485", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79648", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/110219/Webglimpse-Brute-Force-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48049", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://websecurity.com.ua/3089/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73485", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1788.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1788.json index 836f635bc76..4b3c4c60f24 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1788.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1788.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1788", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:03.467", - "lastModified": "2018-01-11T02:29:04.637", + "lastModified": "2024-11-21T01:37:47.160", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,39 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73502", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/79647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/110224/WonderDesk-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48167", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://st2tea.blogspot.com/2012/02/wonderdesk-cross-site-scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73502", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1789.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1789.json index 73e5b7508ed..8cfa781a7b1 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1789.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1789.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1789", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:03.517", - "lastModified": "2017-08-29T01:31:25.100", + "lastModified": "2024-11-21T01:37:47.310", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73510", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52178", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73510", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1790.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1790.json index 0ba6febee93..a421f478bda 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1790.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1790.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1790", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-19T18:55:03.577", - "lastModified": "2018-08-30T17:17:10.400", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:47.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -109,6 +108,44 @@ "tags": [ "VDB Entry" ] + }, + { + "url": "http://code.google.com/p/webgrind/issues/detail?id=66", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://packetstormsecurity.org/files/110216", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18523", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5075.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73509", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1792.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1792.json index bf0d53857c5..0515fcc440c 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1792.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1792.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1792", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T19:55:01.093", - "lastModified": "2012-05-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:47.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -99,6 +98,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2012-005.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1795.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1795.json index 61af01bc1f1..38783ecd5cf 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1795.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1795.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1795", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-20T18:55:02.053", - "lastModified": "2018-01-12T02:29:00.303", + "lastModified": "2024-11-21T01:37:47.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -327,6 +326,26 @@ { "url": "http://www.securitytracker.com/id?1026825", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80344", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48452", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/364363", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026825", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1796.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1796.json index 05a02c81812..75a9ddec536 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1796.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1796.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1796", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-20T20:55:01.460", - "lastModified": "2018-01-10T02:29:29.927", + "lastModified": "2024-11-21T01:37:47.880", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -185,6 +184,28 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14526", "source": "cve@mitre.org" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC79970", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21586193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74325", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14526", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1797.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1797.json index 3871fd45b6c..8cc77c3b509 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1797.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1797.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1797", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-20T20:55:01.553", - "lastModified": "2018-01-10T02:29:29.987", + "lastModified": "2024-11-21T01:37:48.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14922", "source": "cve@mitre.org" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?crawler=1&uid=swg1IC79518", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC79518", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74326", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14922", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1798.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1798.json index ce6bffe7707..126c927d97c 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1798.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1798.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1798", "sourceIdentifier": "cret@cert.org", "published": "2012-06-05T22:55:10.060", - "lastModified": "2020-07-31T18:43:04.807", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:48.170", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -270,6 +269,102 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0544.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48974", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/49063", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/49068", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/49317", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2462", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=20629", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/81023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52898", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027032", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74659", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-17xx/CVE-2012-1799.json b/CVE-2012/CVE-2012-17xx/CVE-2012-1799.json index e38ae0a2c6d..0b551e7d56c 100644 --- a/CVE-2012/CVE-2012-17xx/CVE-2012-1799.json +++ b/CVE-2012/CVE-2012-17xx/CVE-2012-1799.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1799", "sourceIdentifier": "cret@cert.org", "published": "2012-04-18T10:33:34.887", - "lastModified": "2012-12-06T04:18:02.030", + "lastModified": "2024-11-21T01:37:48.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -126,6 +125,28 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://osvdb.org/81033", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.automation.siemens.com/WW/view/en/59869684", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-268149.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1800.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1800.json index 510a57aabd1..36906ad6831 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1800.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1800.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1800", "sourceIdentifier": "cret@cert.org", "published": "2012-04-18T10:33:34.933", - "lastModified": "2012-11-20T04:44:07.500", + "lastModified": "2024-11-21T01:37:48.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -126,6 +125,28 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://osvdb.org/81034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.automation.siemens.com/WW/view/en/59869684", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-268149.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1801.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1801.json index df6b74daa39..6702bfe43af 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1801.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1801.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1801", "sourceIdentifier": "cret@cert.org", "published": "2012-04-18T10:33:35.417", - "lastModified": "2023-11-07T02:10:20.220", + "lastModified": "2024-11-21T01:37:48.583", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 7.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 5.1, @@ -120,6 +119,25 @@ { "url": "http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/35df9dc4a94ae83ac12579ca0043acc1/%24file/SI10231A2%20rev%200.pdf", "source": "cret@cert.org" + }, + { + "url": "http://secunia.com/advisories/48693", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-095-01A.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/35df9dc4a94ae83ac12579ca0043acc1/%24file/SI10231A2%20rev%200.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1802.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1802.json index 436187ce184..975a090638e 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1802.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1802.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1802", "sourceIdentifier": "cret@cert.org", "published": "2012-04-18T10:33:35.450", - "lastModified": "2012-11-20T04:44:08.140", + "lastModified": "2024-11-21T01:37:48.693", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -319,6 +318,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://osvdb.org/81032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-130874.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-04.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1803.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1803.json index c9da59e82bb..e3b08150bf1 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1803.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1803.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1803", "sourceIdentifier": "cret@cert.org", "published": "2012-04-28T00:55:01.203", - "lastModified": "2022-02-01T16:53:48.353", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:48.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -169,6 +168,102 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0186.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://arstechnica.com/business/news/2012/04/backdoor-in-mission-critical-hardware-threatens-power-traffic-control-systems.ars", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-146-01A", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Apr/277", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18779", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/889195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8RCPEN", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.ruggedcom.com/productbulletin/ros-security-page/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53215", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-116-01A.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.wired.com/threatlevel/2012/04/ruggedcom-backdoor/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1804.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1804.json index 2e7f62c5fff..e8c234a79f2 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1804.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1804.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1804", "sourceIdentifier": "cret@cert.org", "published": "2012-05-14T20:55:01.417", - "lastModified": "2013-10-03T18:30:59.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:48.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,25 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://osvdb.org/81814", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-131-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1805.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1805.json index e819d0c6cd9..dbe3464144c 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1805.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1805.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1805", "sourceIdentifier": "cret@cert.org", "published": "2012-04-13T17:55:01.133", - "lastModified": "2017-12-20T02:29:00.817", + "lastModified": "2024-11-21T01:37:49.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -117,6 +116,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74875", "source": "cret@cert.org" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74875", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1806.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1806.json index cfc7952d47a..0343a953743 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1806.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1806.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1806", "sourceIdentifier": "cret@cert.org", "published": "2012-04-13T17:55:01.180", - "lastModified": "2017-12-20T02:29:00.880", + "lastModified": "2024-11-21T01:37:49.153", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -117,6 +116,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74876", "source": "cret@cert.org" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74876", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1807.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1807.json index 431dbc01543..29533f894d9 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1807.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1807.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1807", "sourceIdentifier": "cret@cert.org", "published": "2012-04-13T17:55:01.213", - "lastModified": "2012-04-16T13:53:40.070", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:49.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1808.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1808.json index 3d0b1d93ff2..0acc18c7ebf 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1808.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1808.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1808", "sourceIdentifier": "cret@cert.org", "published": "2012-04-13T17:55:01.260", - "lastModified": "2017-12-20T02:29:00.943", + "lastModified": "2024-11-21T01:37:49.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -117,6 +116,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74878", "source": "cret@cert.org" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74878", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1809.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1809.json index 90bdba7324c..ba944621eec 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1809.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1809.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1809", "sourceIdentifier": "cret@cert.org", "published": "2012-04-13T17:55:01.307", - "lastModified": "2012-04-16T13:59:58.603", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:49.453", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -113,6 +112,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1814.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1814.json index 8fee1107b08..25a08bf9b4b 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1814.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1814.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1814", "sourceIdentifier": "cret@cert.org", "published": "2012-06-08T18:55:01.503", - "lastModified": "2012-10-30T04:03:16.643", + "lastModified": "2024-11-21T01:37:49.990", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -130,6 +129,25 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://osvdb.org/81996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49210", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53591", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-138-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1815.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1815.json index e5038ca8ef8..4e38f40bc8d 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1815.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1815.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1815", "sourceIdentifier": "cret@cert.org", "published": "2012-06-08T18:55:01.567", - "lastModified": "2012-10-30T04:03:16.830", + "lastModified": "2024-11-21T01:37:50.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,25 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://osvdb.org/82011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49210", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53591", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-138-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1816.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1816.json index 153c62e982f..a5d64ed47db 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1816.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1816.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1816", "sourceIdentifier": "cret@cert.org", "published": "2012-06-08T18:55:01.610", - "lastModified": "2012-10-13T03:22:21.867", + "lastModified": "2024-11-21T01:37:50.217", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -130,6 +129,25 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://osvdb.org/82012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49210", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53591", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-138-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1817.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1817.json index ea22928fb86..b3f82099a5b 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1817.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1817.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1817", "sourceIdentifier": "cret@cert.org", "published": "2012-06-08T18:55:01.657", - "lastModified": "2012-10-13T03:22:22.040", + "lastModified": "2024-11-21T01:37:50.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,25 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://osvdb.org/82013", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49210", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53591", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-138-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1818.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1818.json index 0b182e7443b..36e33b76cdb 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1818.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1818.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1818", "sourceIdentifier": "cret@cert.org", "published": "2012-06-08T18:55:01.707", - "lastModified": "2012-10-13T03:22:22.197", + "lastModified": "2024-11-21T01:37:50.433", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -130,6 +129,25 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://osvdb.org/82014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49210", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53591", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-138-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1819.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1819.json index 1e40e9e8e49..3f10e244abe 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1819.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1819.json @@ -2,11 +2,8 @@ "id": "CVE-2012-1819", "sourceIdentifier": "cret@cert.org", "published": "2012-05-02T22:55:02.140", - "lastModified": "2017-12-14T02:29:01.590", + "lastModified": "2024-11-21T01:37:50.547", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/lists/426.html\r\n\r\n'Untrusted Search Path'", - "evaluatorImpact": "Per: http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf\r\n\r\n'This vulnerability is remotely exploitable but may require the use of social engineering to exploit.'", "descriptions": [ { "lang": "en", @@ -25,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -96,6 +93,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309", "source": "cret@cert.org" + }, + { + "url": "http://en.wellintech.com/news/detail.aspx?contentid=168", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53316", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75309", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/lists/426.html\r\n\r\n'Untrusted Search Path'", + "evaluatorImpact": "Per: http://www.us-cert.gov/control_systems/pdf/ICSA-12-122-01.pdf\r\n\r\n'This vulnerability is remotely exploitable but may require the use of social engineering to exploit.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1820.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1820.json index 505e29c1b89..3ffd871281a 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1820.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1820.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1820", "sourceIdentifier": "cret@cert.org", "published": "2012-06-13T15:55:01.057", - "lastModified": "2013-03-02T04:40:49.207", + "lastModified": "2024-11-21T01:37:50.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -299,6 +298,33 @@ { "url": "http://www.ubuntu.com/usn/USN-1605-1", "source": "cret@cert.org" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1259.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50941", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2497", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/962587", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53775", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1605-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1821.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1821.json index 8fbb3ff5407..22a740f8065 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1821.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1821.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1821", "sourceIdentifier": "cret@cert.org", "published": "2012-05-24T00:55:02.727", - "lastModified": "2018-01-05T02:29:29.227", + "lastModified": "2024-11-21T01:37:50.767", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -150,6 +149,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/82147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49221", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/149070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/50358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120522_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1823.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1823.json index 2b0ad68de37..6bee3b657e1 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1823.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1823.json @@ -2,13 +2,8 @@ "id": "CVE-2012-1823", "sourceIdentifier": "cret@cert.org", "published": "2012-05-11T10:15:48.043", - "lastModified": "2024-07-16T17:48:42.937", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-25", - "cisaActionDue": "2022-04-15", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "PHP-CGI Query String Parameter Vulnerability", + "lastModified": "2024-11-21T01:37:50.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-03-25", + "cisaActionDue": "2022-04-15", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "PHP-CGI Query String Parameter Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -325,6 +324,13 @@ "Broken Link" ] }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "cret@cert.org", + "tags": [ + "Broken Link" + ] + }, { "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html", "source": "cret@cert.org", @@ -364,6 +370,13 @@ "Mailing List" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", + "source": "cret@cert.org", + "tags": [ + "Mailing List" + ] + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-0546.html", "source": "cret@cert.org", @@ -527,6 +540,238 @@ "Mailing List", "Release Notes" ] + }, + { + "url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Exploit" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0546.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0547.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0568.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0569.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0570.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49014", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49085", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49087", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://support.apple.com/kb/HT5501", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2465", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/520827", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/673343", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:068", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/06/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.php.net/ChangeLog-5.php#5.4.2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Release Notes" + ] + }, + { + "url": "http://www.php.net/archive/2012.php#id2012-05-03-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=61910", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Release Notes" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1824.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1824.json index 8f2146efd91..3228508253a 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1824.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1824.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1824", "sourceIdentifier": "cret@cert.org", "published": "2012-05-25T19:55:01.493", - "lastModified": "2012-05-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:51.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -93,6 +92,21 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.measuresoft.net/downloads/Measuresoft%20SCADA%204.4.6/issue_disks/Client/DOCUMENTATION/ReleaseNotes.doc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.measuresoft.net/downloads/Measuresoft%20SCADA%204.4.6/issue_disks/Server/DOCUMENTATION/ReleaseNotes.doc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-145-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1825.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1825.json index 42afe1670a9..998f636ae34 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1825.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1825.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1825", "sourceIdentifier": "cret@cert.org", "published": "2012-06-11T23:55:00.970", - "lastModified": "2012-06-12T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:51.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/815532", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8TWMEJ", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1826.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1826.json index 46c4c2ea7a5..249c2c7ecd5 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1826.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1826.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1826", "sourceIdentifier": "cret@cert.org", "published": "2012-06-08T16:55:00.877", - "lastModified": "2012-11-27T04:41:22.567", + "lastModified": "2024-11-21T01:37:51.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -111,6 +110,41 @@ { "url": "https://github.com/dotCMS/dotCMS/issues/281", "source": "cret@cert.org" + }, + { + "url": "http://dotcms.com/dotCMSVersions/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82240", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/898083", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53688", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gist.github.com/2627440", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/dotCMS/dotCMS/issues/261", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/dotCMS/dotCMS/issues/281", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1827.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1827.json index 0c3a736368f..5b65254fd24 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1827.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1827.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1827", "sourceIdentifier": "cret@cert.org", "published": "2012-06-13T19:55:00.897", - "lastModified": "2012-09-29T03:17:03.300", + "lastModified": "2024-11-21T01:37:51.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -99,6 +98,28 @@ { "url": "http://www.securityfocus.com/bid/53716", "source": "cret@cert.org" + }, + { + "url": "http://secunia.com/advisories/49335", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/773035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8RQL83", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53716", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1828.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1828.json index f148434e7cb..bb28f9e81cc 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1828.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1828.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1828", "sourceIdentifier": "cret@cert.org", "published": "2012-06-13T19:55:00.943", - "lastModified": "2012-09-29T03:17:03.470", + "lastModified": "2024-11-21T01:37:51.497", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -99,6 +98,28 @@ { "url": "http://www.securityfocus.com/bid/53716", "source": "cret@cert.org" + }, + { + "url": "http://secunia.com/advisories/49335", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/773035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8RQL83", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53716", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1829.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1829.json index b93fa2145b2..d251759440a 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1829.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1829.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1829", "sourceIdentifier": "cret@cert.org", "published": "2012-06-13T19:55:00.990", - "lastModified": "2012-09-29T03:17:03.643", + "lastModified": "2024-11-21T01:37:51.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -94,6 +93,28 @@ { "url": "http://www.securityfocus.com/bid/53716", "source": "cret@cert.org" + }, + { + "url": "http://secunia.com/advisories/49335", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/773035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8RQL83", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53716", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1830.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1830.json index 5addff3b6f0..b67be93f062 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1830.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1830.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1830", "sourceIdentifier": "cret@cert.org", "published": "2012-07-05T03:23:18.230", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorImpact": "Per: http://www.wellintech.com/index.php/news/33-patch-for-kingview653\r\n\r\n\"KingView with the version 65.30.17249( TouchExplorer: 65.30.2003.17249; TouchVew: 65.30.2003.17376) and also the previous version is affected.\"", + "lastModified": "2024-11-21T01:37:51.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -114,6 +112,23 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorImpact": "Per: http://www.wellintech.com/index.php/news/33-patch-for-kingview653\r\n\r\n\"KingView with the version 65.30.17249( TouchExplorer: 65.30.2003.17249; TouchVew: 65.30.2003.17376) and also the previous version is affected.\"" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1831.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1831.json index ad54fbb91ca..b377c78d1bd 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1831.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1831.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1831", "sourceIdentifier": "cret@cert.org", "published": "2012-07-05T03:23:18.277", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:51.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -113,6 +112,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1832.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1832.json index 2db96fb9170..438c0c5bb1e 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1832.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1832.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1832", "sourceIdentifier": "cret@cert.org", "published": "2012-07-05T03:23:18.323", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:51.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -113,6 +112,22 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1835.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1835.json index 19ce1f6a820..1aff63bef91 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1835.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1835.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1835", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T21:55:00.923", - "lastModified": "2012-08-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:52.347", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -109,6 +108,27 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0071.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52986", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23082", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1836.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1836.json index d34ebaef6dd..ac9e79d8b1c 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1836.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1836.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1836", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T03:28:04.470", - "lastModified": "2020-09-14T12:33:22.683", + "lastModified": "2024-11-21T01:37:52.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,42 @@ "Exploit", "Patch" ] + }, + { + "url": "http://osvdb.org/80263", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48474", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2448", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/212651", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52561", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/inspircd/inspircd/commit/fe7dbd2c104c37f6f3af7d9f1646a3c332aea4a4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1837.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1837.json index 651c29c30b5..4659da3a94d 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1837.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1837.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1837", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T03:28:04.517", - "lastModified": "2018-01-10T02:29:30.083", + "lastModified": "2024-11-21T01:37:52.637", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -89,6 +88,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74038", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48352", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21587743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74038", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1838.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1838.json index 33f5ce34bbc..fae863fbdee 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1838.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1838.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1838", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T10:17:09.410", - "lastModified": "2018-01-10T02:29:30.143", + "lastModified": "2024-11-21T01:37:52.773", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74237", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80370", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/523027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74237", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1839.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1839.json index a0458df7a54..0b79deb1ce1 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1839.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1839.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1839", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T10:17:10.923", - "lastModified": "2018-01-11T02:29:04.700", + "lastModified": "2024-11-21T01:37:52.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -156,6 +155,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73671", "source": "cve@mitre.org" + }, + { + "url": "http://ajaxplorer.info/ajaxplorer-4-0-4/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48226", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/504019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "http://www.osvdb.org/79810", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52298", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73671", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1840.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1840.json index 7628cfe558b..948ce280ba3 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1840.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1840.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1840", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T10:17:10.970", - "lastModified": "2018-01-10T02:29:30.190", + "lastModified": "2024-11-21T01:37:53.057", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -140,6 +139,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74305", "source": "cve@mitre.org" + }, + { + "url": "http://ajaxplorer.info/ajaxplorer-4-0-4/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/504019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74305", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1841.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1841.json index 0d2db72236f..22a98100e18 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1841.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1841.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1841", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T10:17:11.003", - "lastModified": "2018-01-10T02:29:30.270", + "lastModified": "2024-11-21T01:37:53.200", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Una vulnerabilidad de salto de directorio absoluto en logShow.htm en la biblioteca de cinta Quantum Scalar i500 con el firmware anterior a i7.0.3 (604G.GS00100), que tambi\u00e9n se distribuye como la biblioteca de cintas Dell ML6000 con el firmware anterior a A20-00 (590G.GS00100), permite a atacantes remotos leer archivos de su elecci\u00f3n a trav\u00e9s de una ruta completa en el par\u00e1metro file." } ], - "vendorComments": [ - { - "organization": "Quantum Corporation", - "comment": "The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.", - "lastModified": "2012-06-13T00:00:00" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -241,6 +233,46 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://osvdb.org/80226", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/913483", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + } + ], + "vendorComments": [ + { + "organization": "Quantum Corporation", + "comment": "The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.", + "lastModified": "2012-06-13T00:00:00" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1842.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1842.json index 5368ef7c889..b9d7e92e8ee 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1842.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1842.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1842", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T10:17:11.050", - "lastModified": "2018-01-10T02:29:30.347", + "lastModified": "2024-11-21T01:37:53.357", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en checkQKMProg.htm en la biblioteca de cintas Quantum Scalar i500 con el firmware anterior a i7.0.3 (604G.GS00100), que tambi\u00e9n se distribuye como la biblioteca de cintas Dell ML6000 con el firmware anterior a A20-00 (590G.GS00100), permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados." } ], - "vendorComments": [ - { - "organization": "Quantum Corporation", - "comment": "An authentication is required to exploit this issue. The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.", - "lastModified": "2012-06-13T00:00:00" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -245,6 +237,50 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://osvdb.org/80225", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80239", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/913483", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + } + ], + "vendorComments": [ + { + "organization": "Quantum Corporation", + "comment": "An authentication is required to exploit this issue. The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.", + "lastModified": "2012-06-13T00:00:00" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1843.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1843.json index f99c408d1ac..92f57079d59 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1843.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1843.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1843", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T10:17:11.097", - "lastModified": "2018-01-10T02:29:30.410", + "lastModified": "2024-11-21T01:37:53.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "Una vulnerabilidad de falsificaci\u00f3n de peticiones en sitios cruzados (CSRF) en saveRestore.htm en la librer\u00eda de cintas Quantum Scalar i500 con el firmware anterior a i7.0.3 (604G.GS00100), que tambi\u00e9n se distribuye como la librer\u00eda de cintas Dell ML6000 con el firmware anterior a A20-00 (590G.GS00100 ), permite a atacantes remotos secuestrar la autenticaci\u00f3n de los usuarios para las solicitudes que ejecutan comandos de Linux a trav\u00e9s del par\u00e1metro fileName. Esta vulnerabilidad esta relacionada con una vulnerabilidad de \"inyecci\u00f3n de comandos\"." } ], - "vendorComments": [ - { - "organization": "Quantum Corporation", - "comment": "An authentication is required to exploit this issue. The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.", - "lastModified": "2012-06-13T00:00:00" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -245,6 +237,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74161", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80227", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48403", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/913483", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74161", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "vendorComments": [ + { + "organization": "Quantum Corporation", + "comment": "An authentication is required to exploit this issue. The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.", + "lastModified": "2012-06-13T00:00:00" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1844.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1844.json index f37cb240285..0f046ea570c 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1844.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1844.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1844", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T10:17:11.127", - "lastModified": "2018-01-10T02:29:30.487", + "lastModified": "2024-11-21T01:37:53.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "La librer\u00eda de cintas Quantum Scalar i500 con el firmware antes de i7.0.3 (604G.GS00100), que tambi\u00e9n se distribuye como la librer\u00eda de cintas Dell ML6000 con el firmware antes de A20-00 (590G.GS00100) y como la librer\u00eda de cintas IBM TS3310 con el firmware antes de R6C (606G. GS001), utiliza contrase\u00f1as por defecto para las cuentas de usuario no especificados, lo cual facilita a los atacantes remotos a la hora de obtener acceso a trav\u00e9s de vectores desconocidos." } ], - "vendorComments": [ - { - "organization": "Quantum Corporation", - "comment": "The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.", - "lastModified": "2012-06-13T00:00:00" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -277,6 +269,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80372", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/913483", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8NNKN8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8NVRPY", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MORO-8QNJLE", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74322", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "vendorComments": [ + { + "organization": "Quantum Corporation", + "comment": "The vulnerability has never been exploited. However to make sure our customers are protected, all newly shipped versions of the product contain the update that fixes this issue. An official firmware release that fixes the vulnerability is also available for all existing customers. The customer data stored on tape cannot be exploited by this vulnerability.", + "lastModified": "2012-06-13T00:00:00" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1845.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1845.json index 2c0d69ae1a4..00bde6b7493 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1845.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1845.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1845", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T16:55:02.067", - "lastModified": "2020-04-16T15:41:25.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:53.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -117,6 +116,51 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://pwn2own.zerodayinitiative.com/status.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://twitter.com/vupen/statuses/177576000761237505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Press/Media Coverage" + ] + }, + { + "url": "http://www.zdnet.com/blog/security/pwn2own-2012-google-chrome-browser-sandbox-first-to-fall/10588", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Press/Media Coverage" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74323", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14843", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1846.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1846.json index c539d2fc752..86963d6320a 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1846.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1846.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1846", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-22T16:55:02.113", - "lastModified": "2020-04-16T15:27:25.657", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:37:54.050", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,49 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://pwn2own.zerodayinitiative.com/status.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://twitter.com/vupen/statuses/177576000761237505", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Press/Media Coverage" + ] + }, + { + "url": "http://www.zdnet.com/blog/security/pwn2own-2012-google-chrome-browser-sandbox-first-to-fall/10588", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Press/Media Coverage" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74324", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14940", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1847.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1847.json index e71dffcae9e..622e9522134 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1847.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1847.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1847", "sourceIdentifier": "secure@microsoft.com", "published": "2012-05-09T00:55:01.977", - "lastModified": "2018-10-12T22:02:43.230", + "lastModified": "2024-11-21T01:37:54.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -147,6 +146,37 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15575", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/49112", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53379", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-129A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15575", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1848.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1848.json index 44d24078dbe..1aecc09ff8c 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1848.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1848.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1848", "sourceIdentifier": "secure@microsoft.com", "published": "2012-05-09T00:55:02.007", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:54.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -144,6 +143,29 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15555", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/53327", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027039", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-129A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15555", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1849.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1849.json index f3616a49f7d..185f8195415 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1849.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1849.json @@ -2,11 +2,8 @@ "id": "CVE-2012-1849", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.420", - "lastModified": "2018-10-12T22:02:44.387", + "lastModified": "2024-11-21T01:37:54.437", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'", - "evaluatorImpact": "Per: http://technet.microsoft.com/en-us/security/bulletin/ms12-039\r\n\r\nAV:N per \"How could an attacker exploit the vulnerability? \r\nAn attacker could convince a user to open a legitimate Microsoft Lync related file (such as an .ocsmeet file) that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Microsoft Lync could attempt to load the DLL file and execute any code it contained.\r\n\r\nIn an email attack scenario, an attacker could exploit the vulnerability by sending a legitimate Microsoft Lync-related file (such as an .ocsmeet file) to a user, and convincing the user to place the attachment into a directory that contains a specially crafted DLL file and to open the legitimate file. Then, while opening the legitimate file, Microsoft Lync could attempt to load the DLL file and execute any code it contained.\r\n\r\nIn a network attack scenario, an attacker could place a legitimate Microsoft Lync-related file and a specially crafted DLL in a network share, a UNC, or WebDAV location and then convince the user to open the file.\"", "descriptions": [ { "lang": "en", @@ -25,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +105,23 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14874", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-039", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14874", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'", + "evaluatorImpact": "Per: http://technet.microsoft.com/en-us/security/bulletin/ms12-039\r\n\r\nAV:N per \"How could an attacker exploit the vulnerability? \r\nAn attacker could convince a user to open a legitimate Microsoft Lync related file (such as an .ocsmeet file) that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Microsoft Lync could attempt to load the DLL file and execute any code it contained.\r\n\r\nIn an email attack scenario, an attacker could exploit the vulnerability by sending a legitimate Microsoft Lync-related file (such as an .ocsmeet file) to a user, and convincing the user to place the attachment into a directory that contains a specially crafted DLL file and to open the legitimate file. Then, while opening the legitimate file, Microsoft Lync could attempt to load the DLL file and execute any code it contained.\r\n\r\nIn a network attack scenario, an attacker could place a legitimate Microsoft Lync-related file and a specially crafted DLL in a network share, a UNC, or WebDAV location and then convince the user to open the file.\"" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1850.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1850.json index b380f4806c5..f26e2e1cebd 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1850.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1850.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1850", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.320", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:54.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -146,6 +145,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15669", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-054", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15669", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1851.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1851.json index f5eab3d2b17..7e871f0c828 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1851.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1851.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1851", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.367", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:54.667", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -146,6 +145,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15531", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-054", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15531", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1852.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1852.json index 5f55be24a9c..892f0d3a169 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1852.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1852.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1852", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.397", - "lastModified": "2018-10-12T22:02:45.310", + "lastModified": "2024-11-21T01:37:54.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15079", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-054", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15079", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1853.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1853.json index e940359a767..c2dfa0ec4a7 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1853.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1853.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1853", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.443", - "lastModified": "2018-10-12T22:02:45.607", + "lastModified": "2024-11-21T01:37:54.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15408", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-054", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15408", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1854.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1854.json index db511a37fb6..b9b9242b2c7 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1854.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1854.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1854", "sourceIdentifier": "secure@microsoft.com", "published": "2012-07-10T21:55:05.587", - "lastModified": "2018-10-12T22:02:45.903", + "lastModified": "2024-11-21T01:37:55.010", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -127,6 +125,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14950", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-046", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14950", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1855.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1855.json index b0c96df93ed..1d89eb4f8a8 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1855.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1855.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1855", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.467", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:55.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -287,6 +286,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14717", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-038", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14717", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1856.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1856.json index d8ebbdf39a5..ec842d7a6ec 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1856.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1856.json @@ -2,13 +2,8 @@ "id": "CVE-2012-1856", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.490", - "lastModified": "2024-07-16T17:37:32.647", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-03", - "cisaActionDue": "2022-03-24", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft Office MSCOMCTL.OCX Remote Code Execution Vulnerability", + "lastModified": "2024-11-21T01:37:55.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-03-03", + "cisaActionDue": "2022-03-24", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft Office MSCOMCTL.OCX Remote Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -229,6 +228,38 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://www.securityfocus.com/bid/54948", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15447", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1857.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1857.json index 4f1e867c128..a8fa813209f 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1857.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1857.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1857", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.513", - "lastModified": "2018-10-12T22:02:46.980", + "lastModified": "2024-11-21T01:37:55.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -82,6 +81,17 @@ { "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-040", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-040", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1858.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1858.json index 3e601dfa00f..dd7e914e9e4 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1858.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1858.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1858", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.547", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:55.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -280,6 +279,36 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15530", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-039", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15530", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1859.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1859.json index 742a623c029..c4a6452f437 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1859.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1859.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1859", "sourceIdentifier": "secure@microsoft.com", "published": "2012-07-10T21:55:05.747", - "lastModified": "2018-10-12T22:02:48.027", + "lastModified": "2024-11-21T01:37:55.617", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15589", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15589", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1860.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1860.json index 5ab11612c4e..f053c3b4efb 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1860.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1860.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1860", "sourceIdentifier": "secure@microsoft.com", "published": "2012-07-10T21:55:05.790", - "lastModified": "2018-10-12T22:02:48.340", + "lastModified": "2024-11-21T01:37:55.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -109,6 +108,14 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15265", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15265", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1861.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1861.json index f5f0c00d7ab..2a67051afc7 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1861.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1861.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1861", "sourceIdentifier": "secure@microsoft.com", "published": "2012-07-10T21:55:05.917", - "lastModified": "2018-10-12T22:02:48.577", + "lastModified": "2024-11-21T01:37:55.843", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15544", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15544", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1862.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1862.json index 1063c5a56a8..ff02a224602 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1862.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1862.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1862", "sourceIdentifier": "secure@microsoft.com", "published": "2012-07-10T21:55:05.980", - "lastModified": "2018-10-12T22:02:48.873", + "lastModified": "2024-11-21T01:37:55.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,14 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15657", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15657", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1863.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1863.json index 0fc5657383c..3dec46d5571 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1863.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1863.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1863", "sourceIdentifier": "secure@microsoft.com", "published": "2012-07-10T21:55:06.027", - "lastModified": "2018-10-12T22:02:49.123", + "lastModified": "2024-11-21T01:37:56.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -131,6 +130,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15689", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15689", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1864.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1864.json index 6e32e01133d..0650e40735a 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1864.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1864.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1864", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.607", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:56.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -151,6 +150,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15496", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15496", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1865.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1865.json index 9f8c442ea57..cf7119661f0 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1865.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1865.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1865", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.640", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:56.307", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -151,6 +150,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15649", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15649", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1866.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1866.json index a9774c97a19..729f9566efe 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1866.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1866.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1866", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.670", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:56.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -151,6 +150,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15096", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15096", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1867.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1867.json index f434760b570..930b001444d 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1867.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1867.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1867", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.717", - "lastModified": "2024-10-17T20:35:05.733", + "lastModified": "2024-11-21T01:37:56.537", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.4, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.5, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -188,6 +187,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15510", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15510", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1868.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1868.json index 9a3ecfd08dd..fc17d1ad736 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1868.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1868.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1868", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.750", - "lastModified": "2018-10-12T22:02:50.747", + "lastModified": "2024-11-21T01:37:56.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -86,6 +85,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15647", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15647", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1870.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1870.json index 4900e478801..ae2cdbc82a2 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1870.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1870.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1870", "sourceIdentifier": "secure@microsoft.com", "published": "2012-07-10T21:55:06.073", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:56.907", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -146,6 +145,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15644", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15644", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1872.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1872.json index 58be3994084..3568af761fb 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1872.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1872.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1872", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.797", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:57.023", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -205,6 +204,14 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15629", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15629", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1873.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1873.json index 7c00e91d101..e46dbff39cc 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1873.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1873.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1873", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.827", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:57.133", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -235,6 +234,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15026", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15026", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1874.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1874.json index fabba245aee..ae434067be8 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1874.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1874.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1874", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.857", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:57.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -173,6 +172,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15425", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15425", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1875.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1875.json index 2c879d1bf1d..b88e2bf211d 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1875.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1875.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1875", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.907", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:57.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -168,6 +167,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15663", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15663", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1876.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1876.json index 1f0db8761ec..194f02a274b 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1876.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1876.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1876", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.937", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:57.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -308,6 +307,37 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15539", "source": "secure@microsoft.com" + }, + { + "url": "http://arstechnica.com/business/news/2012/03/ie-9-on-latest-windows-gets-stomped-at-hacker-contest.ars", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pwn2own.zerodayinitiative.com/status.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://twitter.com/vupen/statuses/177895844828291073", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.zdnet.com/blog/security/pwn2own-2012-ie-9-hacked-with-two-0day-vulnerabilities/10621", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15539", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1877.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1877.json index 577c50d08be..0db88dea139 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1877.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1877.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1877", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:01.967", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:57.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -339,6 +338,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15472", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15472", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1878.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1878.json index 85a9c8452ef..78de321c597 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1878.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1878.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1878", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:02.013", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:57.737", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -339,6 +338,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15632", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15632", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1879.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1879.json index 2da9181745b..8229876551d 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1879.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1879.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1879", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:02.047", - "lastModified": "2024-10-17T19:35:03.163", + "lastModified": "2024-11-21T01:37:57.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.1, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.2, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -314,6 +313,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15588", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15588", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1880.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1880.json index 49c69896b4b..0ebb394cd6f 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1880.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1880.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1880", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:02.077", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:58.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -282,6 +281,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14975", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14975", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1881.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1881.json index 938d98b232e..b265829c388 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1881.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1881.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1881", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:02.107", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:58.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -173,6 +172,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15378", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-164A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15378", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1882.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1882.json index 9a8c2fa7e2b..4a717ce63c1 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1882.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1882.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1882", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-12T22:55:02.157", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:58.287", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -275,6 +274,14 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15367", "source": "secure@microsoft.com" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15367", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1888.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1888.json index 24017cbff9c..e2d80ce4aaa 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1888.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1888.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1888", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.537", - "lastModified": "2018-10-12T22:02:58.123", + "lastModified": "2024-11-21T01:37:58.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -101,6 +100,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15811", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-059", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15811", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1889.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1889.json index ada8416003b..abfb5773d3c 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1889.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1889.json @@ -2,13 +2,8 @@ "id": "CVE-2012-1889", "sourceIdentifier": "secure@microsoft.com", "published": "2012-06-13T04:46:46.190", - "lastModified": "2024-06-28T14:18:20.617", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-06-08", - "cisaActionDue": "2022-06-22", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Microsoft XML Core Services Memory Corruption Vulnerability", + "lastModified": "2024-11-21T01:37:58.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -34,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 @@ -49,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -68,6 +63,10 @@ } ] }, + "cisaExploitAdd": "2022-06-08", + "cisaActionDue": "2022-06-22", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Microsoft XML Core Services Memory Corruption Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -299,6 +298,44 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://technet.microsoft.com/security/advisory/2719615", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-174A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-043", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1890.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1890.json index 3e8dcfc5868..0fe69c393f2 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1890.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1890.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1890", "sourceIdentifier": "secure@microsoft.com", "published": "2012-07-10T21:55:06.120", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:59.047", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -146,6 +145,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15416", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15416", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1891.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1891.json index a85ca91949b..0c909316631 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1891.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1891.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1891", "sourceIdentifier": "secure@microsoft.com", "published": "2012-07-10T21:55:06.150", - "lastModified": "2024-10-17T19:35:04.003", + "lastModified": "2024-11-21T01:37:59.163", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -259,6 +258,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14783", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14783", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1892.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1892.json index 77cf641cff0..e1e1e117cd9 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1892.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1892.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1892", "sourceIdentifier": "secure@microsoft.com", "published": "2012-09-11T18:55:01.003", - "lastModified": "2018-10-12T22:02:59.733", + "lastModified": "2024-11-21T01:37:59.393", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,33 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15779", "source": "secure@microsoft.com" + }, + { + "url": "http://secunia.com/advisories/50463", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-255A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-061", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15779", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1893.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1893.json index e4e53bb31d9..dd350ca450b 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1893.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1893.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1893", "sourceIdentifier": "secure@microsoft.com", "published": "2012-07-10T21:55:06.197", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:37:59.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -146,6 +145,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15654", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15654", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1894.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1894.json index 07452345222..8b878112887 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1894.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1894.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1894", "sourceIdentifier": "secure@microsoft.com", "published": "2012-07-10T21:55:06.247", - "lastModified": "2018-10-12T22:03:00.623", + "lastModified": "2024-11-21T01:37:59.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -86,6 +85,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15602", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-192A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15602", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1902.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1902.json index 8611b03ffa7..922f48962e0 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1902.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1902.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1902", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-06T19:55:01.717", - "lastModified": "2018-01-18T02:29:15.740", + "lastModified": "2024-11-21T01:38:00.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -177,6 +176,42 @@ { "url": "https://github.com/phpmyadmin/phpmyadmin/commit/c51817d3b8cb05ff54dca9373c0667e29b8498d4", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079435.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079475.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079566.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2012-2.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52858", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/c51817d3b8cb05ff54dca9373c0667e29b8498d4", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1904.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1904.json index 6aa298e67b2..52368eb4e29 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1904.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1904.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1904", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-28T10:55:00.363", - "lastModified": "2012-08-25T03:26:22.443", + "lastModified": "2024-11-21T01:38:01.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -278,6 +277,21 @@ { "url": "http://www.securitytracker.com/id?1027076", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/111162/RealPlayer-1.1.4-Memory-Corruption.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027076", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1906.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1906.json index 535bd0c4d67..107985e5846 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1906.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1906.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1906", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-29T20:55:07.213", - "lastModified": "2019-07-11T15:09:06.720", + "lastModified": "2024-11-21T01:38:01.217", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -327,6 +326,57 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74793", "source": "cve@mitre.org" + }, + { + "url": "http://projects.puppetlabs.com/issues/13260", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-1906/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48743", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48748", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48789", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1419-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2451", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52975", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74793", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1907.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1907.json index 9d5adc98262..c87561e46f0 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1907.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1907.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1907", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-28T10:55:00.470", - "lastModified": "2012-04-05T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:01.393", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/521948/30/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1908.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1908.json index 16b16e51975..297be34b932 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1908.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1908.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1908", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-17T00:55:02.827", - "lastModified": "2012-08-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:01.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -208,6 +207,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.splunk.com/view/SP-CAAAGTK#38585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1909.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1909.json index facaf99ff37..e29dc1fd4a2 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1909.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1909.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1909", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:01.400", - "lastModified": "2020-03-18T17:37:31.590", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:01.687", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -165,6 +164,44 @@ "Exploit", "Patch" ] + }, + { + "url": "http://r6.ca/blog/20120206T005236Z.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=CAPg%2BsBhmGHnMResVxPDZdfpmWTb9uqD0RrQD7oSXBQq7oHpm8g%40mail.gmail.com&forum_name=bitcoin-development", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bitcointalk.org/index.php?topic=67738.0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=407793", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://en.bitcoin.it/wiki/BIP_0030", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://en.bitcoin.it/wiki/CVEs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/sipa/bitcoin/commit/a206b0ea12eb4606b93323268fc81a4f1f952531", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1910.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1910.json index c69a1f07213..93365626d28 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1910.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1910.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1910", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:01.773", - "lastModified": "2020-03-18T17:31:05.473", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:01.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -148,6 +147,26 @@ "Exploit", "Patch" ] + }, + { + "url": "http://gavintech.blogspot.com/2012/03/full-disclosure-bitcoin-qt-on-windows.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bitcointalk.org/index.php?topic=69120.0", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://en.bitcoin.it/wiki/CVEs", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/bitcoin/bitcoin/commit/8864019f6d88b13d3442843d9e6ebeb8dd938831", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1911.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1911.json index 07b0fa8f032..67f64577fe8 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1911.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1911.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1911", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-09T21:55:06.650", - "lastModified": "2017-08-29T01:31:26.243", + "lastModified": "2024-11-21T01:38:02.013", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -625,6 +624,39 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73943", "source": "cve@mitre.org" + }, + { + "url": "http://sourceforge.net/tracker/?func=detail&aid=3496653&group_id=157964&atid=805929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/tracker/?func=detail&aid=3501716&group_id=157964&atid=805929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.darksecurity.de/advisories/2012/SSCHADV2012-007.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52396", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73943", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1912.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1912.json index 04bb1ce8783..080b5d42317 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1912.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1912.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1912", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-09T21:55:06.697", - "lastModified": "2017-08-29T01:31:26.337", + "lastModified": "2024-11-21T01:38:02.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -667,6 +666,71 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73944", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/42781", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49212", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.net/tracker/?func=detail&aid=3496653&group_id=157964&atid=805929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/tracker/?func=detail&aid=3501716&group_id=157964&atid=805929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/tracker/?func=detail&aid=3527242&group_id=157964&atid=805929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.darksecurity.de/advisories/2012/SSCHADV2012-007.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.darksecurity.de/index.php?/215-SSCHADV2012-013-PHP-Address-Book-7.0.0-Multiple-security-vulnerabilities.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52396", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53598", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73944", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1916.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1916.json index 9c96dd4e716..7354734bc1a 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1916.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1916.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1916", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-27T19:55:02.367", - "lastModified": "2012-08-29T03:48:16.067", + "lastModified": "2024-11-21T01:38:02.540", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://www.kb.cert.org/vuls/id/743555 'CWE-434: Unrestricted Upload of File with Dangerous Type'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +93,29 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://atmail.org/download/atmailopen.tgz", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://en.securitylab.ru/lab/PT-2011-48", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/743555", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "Per: http://www.kb.cert.org/vuls/id/743555 'CWE-434: Unrestricted Upload of File with Dangerous Type'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1917.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1917.json index 14bf414a07a..605094e547c 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1917.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1917.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1917", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-27T19:55:02.410", - "lastModified": "2012-08-29T03:48:16.287", + "lastModified": "2024-11-21T01:38:02.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://atmail.org/download/atmailopen.tgz", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://en.securitylab.ru/lab/PT-2011-48", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/743555", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1918.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1918.json index ac7a5ff47fe..28f3a857f88 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1918.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1918.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1918", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-27T19:55:02.457", - "lastModified": "2017-12-13T02:29:06.733", + "lastModified": "2024-11-21T01:38:02.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74504", "source": "cve@mitre.org" + }, + { + "url": "http://atmail.org/download/atmailopen.tgz", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://en.securitylab.ru/lab/PT-2011-48", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/743555", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74504", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1919.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1919.json index b2110c3fb90..a68138097fa 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1919.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1919.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1919", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-27T19:55:02.507", - "lastModified": "2012-08-29T03:48:16.630", + "lastModified": "2024-11-21T01:38:03.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -94,6 +93,28 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://atmail.org/download/atmailopen.tgz", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://en.securitylab.ru/lab/PT-2011-48", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/743555", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1920.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1920.json index 5f9880a43bb..d340427ef2a 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1920.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1920.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1920", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-27T19:55:02.553", - "lastModified": "2017-12-13T02:29:06.780", + "lastModified": "2024-11-21T01:38:03.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74282", "source": "cve@mitre.org" + }, + { + "url": "http://en.securitylab.ru/lab/PT-2011-48", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/743555", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74282", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1921.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1921.json index 30dee9a5fa1..5dcb564caa8 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1921.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1921.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1921", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-26T20:55:01.090", - "lastModified": "2013-01-24T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:03.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://packetstormsecurity.org/files/110770/Sitecom-WLM-2501-Cross-Site-Request-Forgery.html", "source": "cve@mitre.org" + }, + { + "url": "http://ivanobinetti.blogspot.com/2012/03/sitecom-wlm-2501-change-wireless.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/110770/Sitecom-WLM-2501-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1923.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1923.json index c5f58c5837b..d00971f9722 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1923.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1923.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1923", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-17T04:26:07.917", - "lastModified": "2017-12-29T02:29:14.207", + "lastModified": "2024-11-21T01:38:03.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -133,6 +132,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74673", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0062.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://helixproducts.real.com/docs/security/SecurityUpdate04022012HS.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/secunia_research/2012-8/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74673", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1924.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1924.json index 0c579a3e6ff..93b55fb301d 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1924.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1924.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1924", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-28T03:22:10.190", - "lastModified": "2018-01-05T02:29:29.413", + "lastModified": "2024-11-21T01:38:03.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -732,6 +731,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74349", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80620", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1010/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74349", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1925.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1925.json index 88e1c32ed3f..5c04a311bfe 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1925.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1925.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1925", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-28T03:22:10.223", - "lastModified": "2018-01-05T02:29:29.507", + "lastModified": "2024-11-21T01:38:03.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -732,6 +731,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74503", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80621", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1011/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1926.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1926.json index 206a3ca1d72..282dedd19b4 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1926.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1926.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1926", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-28T03:22:10.270", - "lastModified": "2018-01-06T02:29:38.270", + "lastModified": "2024-11-21T01:38:04.153", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -729,6 +728,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74351", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80622", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1012/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74351", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1927.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1927.json index ab626fe09e2..ea2d4005d9c 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1927.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1927.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1927", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-28T03:22:10.317", - "lastModified": "2018-01-06T02:29:38.363", + "lastModified": "2024-11-21T01:38:04.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -732,6 +731,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74502", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1013/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74502", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1928.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1928.json index 0fdfe96fb97..eaf4c528c78 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1928.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1928.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1928", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-28T03:22:10.347", - "lastModified": "2018-01-06T02:29:38.473", + "lastModified": "2024-11-21T01:38:04.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -732,6 +731,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74353", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1014/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74353", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1929.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1929.json index d8ed5796832..4f21bfa2eb4 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1929.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1929.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1929", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-28T03:22:10.397", - "lastModified": "2018-01-05T02:29:29.897", + "lastModified": "2024-11-21T01:38:04.707", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -725,6 +724,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74352", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1009/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.opera.com/support/kb/view/1013/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74352", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1930.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1930.json index 8e5f653a14a..36a33a15e04 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1930.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1930.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1930", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-28T03:22:10.440", - "lastModified": "2018-01-05T02:29:29.993", + "lastModified": "2024-11-21T01:38:04.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -717,6 +716,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74501", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1015/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74501", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1931.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1931.json index 4c51b0358d2..de0fcb543ec 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1931.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1931.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1931", "sourceIdentifier": "cve@mitre.org", "published": "2012-03-28T03:22:10.503", - "lastModified": "2018-01-05T02:29:30.087", + "lastModified": "2024-11-21T01:38:05.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -717,6 +716,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74500", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48535", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1162/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1015/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74500", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1933.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1933.json index 96cb9318599..e5d7e369f59 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1933.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1933.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1933", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-27T21:55:01.210", - "lastModified": "2017-08-29T01:31:26.680", + "lastModified": "2024-11-21T01:38:05.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -143,6 +142,53 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0130.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://dev.sourcefabric.org/browse/CS-4179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18752", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.sourcefabric.org/en/newscoop/latestrelease/1141/Newscoop-355-and-Newscoop-4-RC4-security-releases.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23084", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1934.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1934.json index 506bc1f5d7d..82d2612197e 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1934.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1934.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1934", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-27T21:55:01.257", - "lastModified": "2017-08-29T01:31:26.743", + "lastModified": "2024-11-21T01:38:05.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -157,6 +156,67 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0130.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://dev.sourcefabric.org/browse/CS-4179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://dev.sourcefabric.org/browse/CS-4181", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18752", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52941", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.sourcefabric.org/en/newscoop/latestrelease/1141/Newscoop-355-and-Newscoop-4-RC4-security-releases.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74780", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23084", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1935.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1935.json index d0fc8100fde..e057649e481 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1935.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1935.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1935", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-27T21:55:01.337", - "lastModified": "2017-08-29T01:31:26.803", + "lastModified": "2024-11-21T01:38:05.733", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -166,6 +165,76 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0130.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://dev.sourcefabric.org/browse/CS-4179", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://dev.sourcefabric.org/browse/CS-4182", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://dev.sourcefabric.org/browse/CS-4183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18752", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52941", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.sourcefabric.org/en/newscoop/latestrelease/1141/Newscoop-355-and-Newscoop-4-RC4-security-releases.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23084", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1936.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1936.json index b14fbbf6cc9..3e0025cf227 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1936.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1936.json @@ -2,7 +2,7 @@ "id": "CVE-2012-1936", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-03T20:55:03.840", - "lastModified": "2024-08-06T20:15:17.180", + "lastModified": "2024-11-21T01:38:05.900", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -508,6 +508,25 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/18791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.webapp-security.com/2012/04/wordpress-3-3-1-multiple-csrf-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.webapp-security.com/wp-content/uploads/2012/04/Wordpress-3.3.1-Multiple-CSRF-Vulnerabilities6.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1937.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1937.json index 4cdde0ea6d8..557370f8676 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1937.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1937.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1937", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.467", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:06.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -970,6 +969,69 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17055", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0710.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2489", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:088", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-34.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=643967", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=723465", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=745254", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=745494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=745580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17055", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1938.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1938.json index b853ae83ee5..b5eb23c18d2 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1938.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1938.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1938", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.513", - "lastModified": "2020-08-28T13:20:36.753", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:06.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -344,6 +343,156 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0710.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:088", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-34.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53796", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=670317", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=699594", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=708688", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=716067", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718852", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=723773", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=723971", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=730415", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=736012", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=748948", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17058", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1939.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1939.json index 83691d93f31..c726ed8e230 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1939.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1939.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1939", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.560", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:06.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -157,6 +156,37 @@ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=748613", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0710.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:088", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-34.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=748613", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1940.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1940.json index 0e45ab55298..af4bcfaea6d 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1940.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1940.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1940", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.607", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:06.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -958,6 +957,57 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17054", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0710.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2489", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:088", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-40.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=747688", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17054", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1941.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1941.json index 3e8d3763e8a..d4d4291742a 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1941.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1941.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1941", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.637", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:06.773", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -942,6 +941,41 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16985", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0710.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:088", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-40.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=750066", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16985", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1942.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1942.json index 15a8bf1a313..1794dd3691f 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1942.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1942.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1942", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.687", - "lastModified": "2017-12-29T02:29:14.923", + "lastModified": "2024-11-21T01:38:06.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -116,6 +115,29 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16951", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-35.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2013/mfsa2013-45.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=748764", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16951", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1943.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1943.json index 9e8c68a57a7..4d673a4eb83 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1943.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1943.json @@ -2,10 +2,8 @@ "id": "CVE-2012-1943", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.733", - "lastModified": "2017-12-29T02:29:14.987", + "lastModified": "2024-11-21T01:38:07.080", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -113,6 +111,26 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16924", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-35.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=750850", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16924", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1944.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1944.json index e29f739c208..fddffb43255 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1944.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1944.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1944", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.763", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:07.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -952,6 +951,51 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17005", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0710.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49981", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:088", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-36.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=751422", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17005", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1945.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1945.json index b5327671134..ef132e402d1 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1945.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1945.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1945", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.793", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:07.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -942,6 +941,41 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16743", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0710.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:088", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-37.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=670514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16743", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1946.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1946.json index 1d901858440..6fc0213e79e 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1946.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1946.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1946", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.840", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:07.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -952,6 +951,51 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17010", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0710.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49981", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:088", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-38.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=750109", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17010", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1947.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1947.json index bbcb83ee449..c1446836681 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1947.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1947.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1947", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.887", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:07.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -950,6 +949,49 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16911", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0710.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2489", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:088", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-40.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=744541", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16911", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1948.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1948.json index 17492b1317a..f7744f7efb0 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1948.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1948.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1948", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.470", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:07.873", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -893,6 +892,157 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16744", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84007", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49963", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-42.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=732233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=746103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=746896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=749385", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=750575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=754989", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=756600", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=758471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=763225", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=772282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16744", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1949.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1949.json index 6f6e5e14cd7..71a4e299b18 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1949.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1949.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1949", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.533", - "lastModified": "2017-12-29T02:29:15.783", + "lastModified": "2024-11-21T01:38:08.067", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -793,6 +792,137 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17027", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-42.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=712914", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=717488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=718290", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=725499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=738841", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=743876", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=752662", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=754725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=757431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=765179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=766018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=766304", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17027", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1950.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1950.json index 9195ae86c06..fc61c121217 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1950.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1950.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1950", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.580", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:08.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -334,6 +333,89 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16970", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84008", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-43.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=724247", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=724599", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=725611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16970", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1951.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1951.json index 94837786fdf..9591e458cbf 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1951.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1951.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1951", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.627", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:08.427", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -841,6 +840,105 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16077", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83997", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-44.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=752902", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16077", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1952.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1952.json index 15734a4570f..28692a28d53 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1952.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1952.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1952", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.673", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:08.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -841,6 +840,105 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16942", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83999", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-44.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=759249", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16942", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1953.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1953.json index 6c475c1090a..38d8a1fcf18 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1953.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1953.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1953", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.737", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:08.787", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -841,6 +840,105 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16894", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83998", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-44.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=765218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16894", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1954.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1954.json index abdf57db143..b0dab2bdbd9 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1954.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1954.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1954", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.783", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:08.983", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -857,6 +856,121 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16984", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83995", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49963", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-44.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=765139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16984", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1955.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1955.json index 308981448c0..9beb25ba4d2 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1955.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1955.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1955", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.813", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:09.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -841,6 +840,105 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17004", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-45.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54586", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=757376", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17004", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1956.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1956.json index f8f772df353..cbf2d37337f 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1956.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1956.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1956", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:39.737", - "lastModified": "2017-09-19T01:34:54.183", + "lastModified": "2024-11-21T01:38:09.417", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1772,6 +1771,49 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16367", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1351.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-59.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=756719", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16367", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1957.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1957.json index 11206c7d896..bf7256ea852 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1957.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1957.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1957", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.860", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:09.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -841,6 +840,105 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16844", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-47.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=750096", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16844", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1958.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1958.json index 4f381ead9a9..9e91fde4c6a 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1958.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1958.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1958", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.890", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:09.823", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -841,6 +840,105 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16434", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-48.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54574", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=750820", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16434", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1959.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1959.json index 0ebf090bbdc..17377d99a00 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1959.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1959.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1959", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.937", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:10.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -845,6 +844,109 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16920", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-49.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=737559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=754044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16920", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1960.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1960.json index 7542a05da8c..674a86729e3 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1960.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1960.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1960", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:48.970", - "lastModified": "2017-12-29T02:29:17.363", + "lastModified": "2024-11-21T01:38:10.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -749,6 +748,93 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16735", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84010", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-50.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=761014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16735", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1961.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1961.json index d6f6f37a25d..2aed40aa5c5 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1961.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1961.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1961", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.017", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:10.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -841,6 +840,105 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16993", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-51.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54584", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=761655", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16993", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1962.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1962.json index 0fd5c8ed1a9..41908ccca37 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1962.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1962.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1962", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.047", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:10.617", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -841,6 +840,105 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16729", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-52.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54575", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=764296", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16729", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1963.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1963.json index 780ad2a1546..281e626d374 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1963.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1963.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1963", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.093", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:10.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -841,6 +840,105 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17056", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-53.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54582", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=767778", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17056", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1964.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1964.json index 37c65c0e013..2c36475f508 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1964.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1964.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1964", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.127", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:10.983", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -812,6 +811,81 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16783", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-54.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=633691", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16783", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1965.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1965.json index 26c24cec3a4..d9b67ee1ca6 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1965.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1965.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1965", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.173", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:11.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -318,6 +317,73 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17001", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84012", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-55.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=758990", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17001", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1966.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1966.json index 65487589519..52e2ae69638 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1966.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1966.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1966", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.203", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:11.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -326,6 +325,81 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17037", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-46.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=734076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17037", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1967.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1967.json index a3a28ec0629..5af9eab6917 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1967.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1967.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1967", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T10:26:49.250", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:38:11.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -857,6 +856,121 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17025", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84013", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1088.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49963", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49994", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2514", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-56.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54573", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1509-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1510-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=758344", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17025", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1968.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1968.json index d2e7ff07a8f..a430c5958cc 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1968.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1968.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1968", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-30T13:55:10.707", - "lastModified": "2013-10-03T18:50:03.497", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:11.687", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -134,6 +133,24 @@ "tags": [ "Patch" ] + }, + { + "url": "http://secunia.com/advisories/50040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.bugzilla.org/security/3.6.9/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=777398", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1969.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1969.json index 813d3b3e582..86a71740508 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1969.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1969.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1969", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-30T13:55:10.783", - "lastModified": "2013-12-13T04:59:06.353", + "lastModified": "2024-11-21T01:38:11.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -997,6 +996,22 @@ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=777586", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/50040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.bugzilla.org/security/3.6.9/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:066", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=777586", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1970.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1970.json index 5f9b2610465..4a13d4796f8 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1970.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1970.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1970", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:39.787", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:12.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -401,6 +400,164 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-57.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55266", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=745158", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=758408", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=761831", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=764176", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=775206", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=777806", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=778765", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16910", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1971.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1971.json index cc4a486e642..aa16e5aa804 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1971.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1971.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1971", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:39.847", - "lastModified": "2017-09-19T01:34:55.543", + "lastModified": "2024-11-21T01:38:12.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -1820,6 +1819,97 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16841", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-57.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=719750", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=730208", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=732870", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=748119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=749039", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=752038", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=752087", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=753162", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=754150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=754242", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=755916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=765936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=773097", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=779849", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=780712", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16841", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1972.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1972.json index 5d393471262..63357384bdf 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1972.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1972.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1972", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:39.910", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:12.420", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -353,6 +352,116 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55314", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=778428", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17017", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1973.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1973.json index cc208d94416..7f28b6256f9 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1973.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1973.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1973", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:39.973", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:12.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -353,6 +352,116 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55316", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=773207", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17045", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1974.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1974.json index 60de0265c57..51735266045 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1974.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1974.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1974", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.020", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:12.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -352,6 +351,115 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55317", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=769303", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17015", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1975.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1975.json index 61cf0c61bf9..c22e61ac3a3 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1975.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1975.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1975", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.067", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:12.983", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -353,6 +352,116 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55318", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=777578", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17040", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1976.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1976.json index 343c09f5e1f..61c08075652 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1976.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1976.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1976", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.113", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:13.177", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -333,6 +332,116 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55319", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=776213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16818", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1977.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1977.json index 2db3d8f9e21..883e1a9d3ef 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1977.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1977.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1977", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-05-09T10:33:15.020", - "lastModified": "2012-08-29T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:13.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.1 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://dsecrg.com/pages/vul/show.php?id=405", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-129-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1979.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1979.json index 5dba2890ac9..f17c25e1c78 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1979.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1979.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1979", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-17T18:55:01.380", - "lastModified": "2017-08-29T01:31:26.867", + "lastModified": "2024-11-21T01:38:13.727", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -157,6 +156,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74545", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/111405/SyndeoCMS-3.0.01-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18686/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.webapp-security.com/wp-content/uploads/2012/03/syndeocms_3.0.01-Persistent-XSS.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74545", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1982.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1982.json index 81d2fe123d6..4ed3909f6c1 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1982.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1982.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1982", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-05T14:55:05.670", - "lastModified": "2017-08-29T01:31:26.930", + "lastModified": "2024-11-21T01:38:13.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -83,6 +82,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74540", "source": "cve@mitre.org" + }, + { + "url": "http://www.webapp-security.com/wp-content/uploads/2012/03/SocialCMS-1.0.2-XSS-Persistent-and-Reflected-Vulnerabilities1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74540", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1984.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1984.json index 08d63580024..d40cfd8bda9 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1984.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1984.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1984", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-17T04:26:07.963", - "lastModified": "2017-12-29T02:29:18.393", + "lastModified": "2024-11-21T01:38:14.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74677", "source": "cve@mitre.org" + }, + { + "url": "http://helixproducts.real.com/docs/security/SecurityUpdate04022012HS.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74677", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1985.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1985.json index 5d80e8b5951..050d5ea75d0 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1985.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1985.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1985", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-17T04:26:08.010", - "lastModified": "2017-12-29T02:29:18.457", + "lastModified": "2024-11-21T01:38:14.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74678", "source": "cve@mitre.org" + }, + { + "url": "http://helixproducts.real.com/docs/security/SecurityUpdate04022012HS.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74678", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1986.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1986.json index d5c9f3e86b3..43600915960 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1986.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1986.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1986", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-29T20:55:07.540", - "lastModified": "2019-07-11T15:09:06.720", + "lastModified": "2024-11-21T01:38:14.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -355,6 +354,85 @@ { "url": "https://hermes.opensuse.org/messages/15087408", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://projects.puppetlabs.com/issues/13511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-1986/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48743", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48748", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48789", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49136", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1419-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2451", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52975", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/14523305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15087408", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1987.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1987.json index d5b49191fba..db52c723ecf 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1987.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1987.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1987", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-29T20:55:07.603", - "lastModified": "2019-07-11T15:09:06.720", + "lastModified": "2024-11-21T01:38:14.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -373,6 +372,103 @@ { "url": "https://hermes.opensuse.org/messages/15087408", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://projects.puppetlabs.com/issues/13552", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://projects.puppetlabs.com/issues/13553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-1987/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-1987/hotfixes/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48743", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48748", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48789", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49136", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1419-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2451", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81308", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52975", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/14523305", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15087408", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1988.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1988.json index 9f87ca79845..78b7f2c4189 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1988.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1988.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1988", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-29T20:55:08.243", - "lastModified": "2024-02-02T15:14:09.640", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:14.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -308,6 +307,137 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://projects.puppetlabs.com/issues/13518", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-1988/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48743", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48748", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48789", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49136", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1419-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2451", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/81309", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52975", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74796", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/14523305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15087408", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1989.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1989.json index 3a53c54d600..20959897d6c 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1989.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1989.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1989", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-27T18:55:01.430", - "lastModified": "2019-07-11T15:09:06.720", + "lastModified": "2024-11-21T01:38:14.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -232,6 +231,62 @@ { "url": "https://hermes.opensuse.org/messages/15087408", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://projects.puppetlabs.com/issues/13606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.7.13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-1989/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48743", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48748", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49136", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1419-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52975", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74797", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15087408", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1990.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1990.json index 91d1efb55be..8f94090eb91 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1990.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1990.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1990", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-22T16:55:01.180", - "lastModified": "2013-05-15T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:15.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,21 @@ { "url": "http://www.securityfocus.com/bid/53409", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.phocean.net/2012/05/08/cve-2012-1990-kerwebkerwin-xss-vulnerabilities.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53409", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1992.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1992.json index a6802d1a765..2d4deecaf19 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1992.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1992.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1992", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-11T10:39:27.107", - "lastModified": "2012-11-20T04:44:35.157", + "lastModified": "2024-11-21T01:38:15.227", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -665,6 +664,14 @@ { "url": "http://www.webapp-security.com/wp-content/uploads/2012/04/CMS-Made-Simple-1.10.3-XSS-Vulnerability2.txt", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/52850", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.webapp-security.com/wp-content/uploads/2012/04/CMS-Made-Simple-1.10.3-XSS-Vulnerability2.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-19xx/CVE-2012-1993.json b/CVE-2012/CVE-2012-19xx/CVE-2012-1993.json index 20e58d1c2d1..29d9a45b772 100644 --- a/CVE-2012/CVE-2012-19xx/CVE-2012-1993.json +++ b/CVE-2012/CVE-2012-19xx/CVE-2012-1993.json @@ -2,9 +2,8 @@ "id": "CVE-2012-1993", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-04-18T10:33:35.480", - "lastModified": "2017-12-19T02:29:39.643", + "lastModified": "2024-11-21T01:38:15.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 3.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.2 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.1, @@ -388,6 +387,10 @@ } ], "references": [ + { + "url": "http://www.securityfocus.com/archive/1/522374", + "source": "hp-security-alert@hp.com" + }, { "url": "http://www.securityfocus.com/archive/1/522374", "source": "hp-security-alert@hp.com" @@ -399,6 +402,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74918", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://www.securityfocus.com/archive/1/522374", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522374", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74918", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2000.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2000.json index b81fd0707fb..cebbfe0d558 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2000.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2000.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2000", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-05-02T21:55:01.077", - "lastModified": "2017-12-14T02:29:01.823", + "lastModified": "2024-11-21T01:38:16.403", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -150,6 +149,10 @@ "url": "http://www.securityfocus.com/archive/1/522549", "source": "hp-security-alert@hp.com" }, + { + "url": "http://www.securityfocus.com/archive/1/522549", + "source": "hp-security-alert@hp.com" + }, { "url": "http://www.securityfocus.com/bid/53336", "source": "hp-security-alert@hp.com" @@ -161,6 +164,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75316", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://osvdb.org/81670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522549", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522549", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53336", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026998", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75316", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2001.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2001.json index aad41000484..bd18c2a0573 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2001.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2001.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2001", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-05-02T22:55:02.203", - "lastModified": "2017-12-14T02:29:01.887", + "lastModified": "2024-11-21T01:38:16.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -135,6 +134,10 @@ "url": "http://www.securityfocus.com/archive/1/522546", "source": "hp-security-alert@hp.com" }, + { + "url": "http://www.securityfocus.com/archive/1/522546", + "source": "hp-security-alert@hp.com" + }, { "url": "http://www.securityfocus.com/bid/53338", "source": "hp-security-alert@hp.com" @@ -146,6 +149,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75317", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://osvdb.org/81696", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53338", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75317", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2002.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2002.json index 2cee9a3244f..d498ec538bd 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2002.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2002.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2002", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-05-02T22:55:02.250", - "lastModified": "2017-12-14T02:29:01.950", + "lastModified": "2024-11-21T01:38:16.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:P/A:P", + "baseScore": 8.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 8.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -135,6 +134,10 @@ "url": "http://www.securityfocus.com/archive/1/522546", "source": "hp-security-alert@hp.com" }, + { + "url": "http://www.securityfocus.com/archive/1/522546", + "source": "hp-security-alert@hp.com" + }, { "url": "http://www.securityfocus.com/bid/53340", "source": "hp-security-alert@hp.com" @@ -146,6 +149,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75318", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://osvdb.org/81697", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53340", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75318", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2003.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2003.json index bc327697c76..f8a4f4da418 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2003.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2003.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2003", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-05-02T22:55:02.327", - "lastModified": "2019-02-26T14:04:00.853", + "lastModified": "2024-11-21T01:38:16.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -272,6 +271,10 @@ "url": "http://www.securityfocus.com/archive/1/522548", "source": "hp-security-alert@hp.com" }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "hp-security-alert@hp.com" + }, { "url": "http://www.securityfocus.com/bid/53341", "source": "hp-security-alert@hp.com" @@ -283,6 +286,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75312", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://osvdb.org/81666", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49054", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53341", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75312", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2004.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2004.json index 8065d98f5b8..e44d7eb96ec 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2004.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2004.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2004", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-05-02T22:55:02.407", - "lastModified": "2019-02-26T14:04:00.853", + "lastModified": "2024-11-21T01:38:16.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:P/A:P", + "baseScore": 8.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 8.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -272,6 +271,10 @@ "url": "http://www.securityfocus.com/archive/1/522548", "source": "hp-security-alert@hp.com" }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "hp-security-alert@hp.com" + }, { "url": "http://www.securityfocus.com/bid/53341", "source": "hp-security-alert@hp.com" @@ -283,6 +286,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75313", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://osvdb.org/81667", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49054", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53341", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75313", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2005.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2005.json index 251846e226d..cd784e83d84 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2005.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2005.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2005", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-05-02T22:55:02.467", - "lastModified": "2019-02-26T14:04:00.853", + "lastModified": "2024-11-21T01:38:16.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -272,6 +271,10 @@ "url": "http://www.securityfocus.com/archive/1/522548", "source": "hp-security-alert@hp.com" }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "hp-security-alert@hp.com" + }, { "url": "http://www.securityfocus.com/bid/53341", "source": "hp-security-alert@hp.com" @@ -283,6 +286,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75314", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://osvdb.org/81668", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49054", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53341", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75314", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2006.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2006.json index d2ba0d330b8..2a5fd35223c 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2006.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2006.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2006", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-05-02T22:55:02.547", - "lastModified": "2019-02-26T14:04:00.853", + "lastModified": "2024-11-21T01:38:17.107", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -272,6 +271,10 @@ "url": "http://www.securityfocus.com/archive/1/522548", "source": "hp-security-alert@hp.com" }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "hp-security-alert@hp.com" + }, { "url": "http://www.securityfocus.com/bid/53341", "source": "hp-security-alert@hp.com" @@ -283,6 +286,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75315", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://osvdb.org/81669", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49054", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53341", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027003", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75315", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2007.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2007.json index 1395ce29034..b8bce67a4e2 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2007.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2007.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2007", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-05-09T10:33:15.207", - "lastModified": "2017-11-22T02:29:01.100", + "lastModified": "2024-11-21T01:38:17.223", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,13 @@ } ], "references": [ + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", "source": "hp-security-alert@hp.com", @@ -105,6 +111,32 @@ { "url": "http://www.securitytracker.com/id?1027031", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53415", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2008.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2008.json index 48c02ddde60..49e5374fd3d 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2008.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2008.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2008", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-05-09T10:33:15.257", - "lastModified": "2017-11-22T02:29:01.147", + "lastModified": "2024-11-21T01:38:17.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,13 @@ } ], "references": [ + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", "source": "hp-security-alert@hp.com", @@ -105,6 +111,32 @@ { "url": "http://www.securitytracker.com/id?1027031", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53415", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2009.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2009.json index eb6e558784b..85d75930bf8 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2009.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2009.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2009", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-05-09T10:33:15.303", - "lastModified": "2017-11-22T02:29:01.210", + "lastModified": "2024-11-21T01:38:17.423", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -87,6 +86,13 @@ } ], "references": [ + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", "source": "hp-security-alert@hp.com", @@ -105,6 +111,32 @@ { "url": "http://www.securitytracker.com/id?1027031", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03312417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53415", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2010.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2010.json index bca444f3135..a18b23bac71 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2010.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2010.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2010", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-05-18T20:55:06.783", - "lastModified": "2017-12-05T02:29:03.607", + "lastModified": "2024-11-21T01:38:17.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -111,6 +110,34 @@ { "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03333494", "source": "hp-security-alert@hp.com" + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03333494", + "source": "hp-security-alert@hp.com" + }, + { + "url": "http://osvdb.org/82015", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53613", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027074", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75729", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03333494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03333494", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2011.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2011.json index f1afe295740..58c766e7483 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2011.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2011.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2011", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-06-13T20:55:02.363", - "lastModified": "2013-03-22T03:09:56.263", + "lastModified": "2024-11-21T01:38:17.613", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -77,6 +76,13 @@ } ], "references": [ + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03331603", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03331603", "source": "hp-security-alert@hp.com", @@ -87,6 +93,24 @@ { "url": "http://www.securitytracker.com/id?1027138", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03331603", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03331603", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027138", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2012.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2012.json index ea564095f09..f7376feae65 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2012.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2012.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2012", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-06-29T22:55:01.017", - "lastModified": "2019-10-09T23:04:50.747", + "lastModified": "2024-11-21T01:38:17.713", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2013.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2013.json index 62bad74592b..1a9256bb656 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2013.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2013.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2013", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-06-29T22:55:01.063", - "lastModified": "2019-10-09T23:04:51.043", + "lastModified": "2024-11-21T01:38:17.837", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2014.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2014.json index 7d17b6e3dd3..d1c2bce5d24 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2014.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2014.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2014", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-06-29T22:55:01.110", - "lastModified": "2019-10-09T23:04:51.197", + "lastModified": "2024-11-21T01:38:17.947", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -467,6 +466,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2015.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2015.json index 80810c77122..39d8f50780a 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2015.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2015.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2015", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-06-29T22:55:01.157", - "lastModified": "2019-10-09T23:04:51.387", + "lastModified": "2024-11-21T01:38:18.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -467,6 +466,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2016.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2016.json index 61deefc2289..0f62993ae11 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2016.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2016.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2016", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-06-29T22:55:01.187", - "lastModified": "2019-10-09T23:04:51.543", + "lastModified": "2024-11-21T01:38:18.197", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -467,6 +466,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "hp-security-alert@hp.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2017.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2017.json index 751163a7874..97e896efaaf 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2017.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2017.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2017", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-06-30T10:15:04.827", - "lastModified": "2013-03-22T03:09:56.770", + "lastModified": "2024-11-21T01:38:18.317", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,13 @@ } ], "references": [ + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02931414", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02931414", "source": "hp-security-alert@hp.com", @@ -107,6 +113,24 @@ { "url": "http://www.securitytracker.com/id?1027213", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02931414", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02931414", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027213", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2018.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2018.json index 595aba26ab1..af4c1b9244c 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2018.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2018.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2018", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-07-05T22:55:01.120", - "lastModified": "2013-03-22T03:09:56.840", + "lastModified": "2024-11-21T01:38:18.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -137,6 +136,13 @@ } ], "references": [ + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03343724", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03343724", "source": "hp-security-alert@hp.com", @@ -147,6 +153,24 @@ { "url": "http://www.securitytracker.com/id?1027215", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03343724", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03343724", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027215", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2019.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2019.json index a00da37e359..0f8b62af043 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2019.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2019.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2019", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-07-11T04:54:29.490", - "lastModified": "2019-10-09T23:04:51.840", + "lastModified": "2024-11-21T01:38:18.527", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -139,6 +138,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03397769", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03397769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03397769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2020.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2020.json index d7b2d134b89..ed28f8ca436 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2020.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2020.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2020", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-07-11T04:54:29.537", - "lastModified": "2019-10-09T23:04:52.010", + "lastModified": "2024-11-21T01:38:18.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -139,6 +138,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03397769", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03397769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03397769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2021.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2021.json index 817928296e3..93cbfc17188 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2021.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2021.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2021", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-07-16T20:49:19.503", - "lastModified": "2019-10-09T23:04:52.107", + "lastModified": "2024-11-21T01:38:18.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03403333", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03403333", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03403333", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2022.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2022.json index 93e5f79226d..9b8033db2ac 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2022.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2022.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2022", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-08-07T19:55:01.203", - "lastModified": "2019-10-09T23:04:52.230", + "lastModified": "2024-11-21T01:38:18.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -133,6 +132,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03405705", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03405705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03405705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2023.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2023.json index 5f2e0175fcf..bcb7a50bf43 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2023.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2023.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2023", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-09T04:36:39.150", - "lastModified": "2017-08-29T01:31:27.413", + "lastModified": "2024-11-21T01:38:18.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -157,6 +156,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75446", "source": "psirt@adobe.com" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75446", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2024.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2024.json index c93d23f984d..e5e35715640 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2024.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2024.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2024", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-09T04:36:39.197", - "lastModified": "2017-08-29T01:31:27.477", + "lastModified": "2024-11-21T01:38:19.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -161,6 +160,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75447", "source": "psirt@adobe.com" + }, + { + "url": "http://osvdb.org/81756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75447", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2025.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2025.json index 4ebfdd3ff5c..7ea991eddea 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2025.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2025.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2025", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-09T04:36:39.243", - "lastModified": "2017-08-29T01:31:27.523", + "lastModified": "2024-11-21T01:38:19.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -161,6 +160,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75448", "source": "psirt@adobe.com" + }, + { + "url": "http://osvdb.org/81757", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75448", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2026.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2026.json index c7827e6e183..0e01f4a08d5 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2026.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2026.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2026", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-09T04:36:40.183", - "lastModified": "2017-08-29T01:31:27.587", + "lastModified": "2024-11-21T01:38:19.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -157,6 +156,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75449", "source": "psirt@adobe.com" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75449", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2027.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2027.json index 62079352622..f3037bb2d2e 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2027.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2027.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2027", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-09T04:36:41.167", - "lastModified": "2014-06-21T04:17:07.790", + "lastModified": "2024-11-21T01:38:19.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -219,6 +218,18 @@ { "url": "http://www.securityfocus.com/bid/52634", "source": "psirt@adobe.com" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-11.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52634", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2028.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2028.json index a5981cd1ca6..4fd1bf3c00d 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2028.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2028.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2028", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-09T04:36:41.213", - "lastModified": "2017-11-22T02:29:01.273", + "lastModified": "2024-11-21T01:38:19.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -227,6 +226,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75457", "source": "psirt@adobe.com" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-11.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53421", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027046", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75457", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2029.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2029.json index 71c9870e613..b3d865cdb16 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2029.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2029.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2029", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-09T04:36:41.243", - "lastModified": "2017-11-22T02:29:01.333", + "lastModified": "2024-11-21T01:38:19.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -341,6 +340,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458", "source": "psirt@adobe.com" + }, + { + "url": "http://secunia.com/advisories/49086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53420", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2030.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2030.json index f246f0a3e30..f38abb8d259 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2030.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2030.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2030", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-09T04:36:41.277", - "lastModified": "2017-11-22T02:29:01.397", + "lastModified": "2024-11-21T01:38:19.707", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -341,6 +340,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459", "source": "psirt@adobe.com" + }, + { + "url": "http://secunia.com/advisories/49086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53420", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2031.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2031.json index fbee2a19a2a..dbc709be584 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2031.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2031.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2031", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-09T04:36:41.323", - "lastModified": "2017-11-22T02:29:01.460", + "lastModified": "2024-11-21T01:38:19.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -341,6 +340,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460", "source": "psirt@adobe.com" + }, + { + "url": "http://secunia.com/advisories/49086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53420", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2032.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2032.json index aded7cf47ae..87c46120e76 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2032.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2032.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2032", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-09T04:36:41.387", - "lastModified": "2017-11-22T02:29:01.537", + "lastModified": "2024-11-21T01:38:20.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -341,6 +340,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461", "source": "psirt@adobe.com" + }, + { + "url": "http://secunia.com/advisories/49086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53420", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2033.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2033.json index 2d2d62205ba..7ef1a1560d1 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2033.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2033.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2033", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-09T04:36:41.417", - "lastModified": "2017-11-22T02:29:01.600", + "lastModified": "2024-11-21T01:38:20.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -341,6 +340,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462", "source": "psirt@adobe.com" + }, + { + "url": "http://secunia.com/advisories/49086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53420", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2034.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2034.json index 78aa1967768..6cdc66873a7 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2034.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2034.json @@ -2,13 +2,8 @@ "id": "CVE-2012-2034", "sourceIdentifier": "psirt@adobe.com", "published": "2012-06-09T00:55:00.987", - "lastModified": "2021-09-08T17:19:28.477", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-28", - "cisaActionDue": "2022-04-18", - "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", - "cisaVulnerabilityName": "Adobe Flash Player Memory Corruption Vulnerability", + "lastModified": "2024-11-21T01:38:21.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -46,6 +41,10 @@ } ] }, + "cisaExploitAdd": "2022-03-28", + "cisaActionDue": "2022-04-18", + "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", + "cisaVulnerabilityName": "Adobe Flash Player Memory Corruption Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -311,6 +310,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2035.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2035.json index d7cdda21298..08b37950518 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2035.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2035.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2035", "sourceIdentifier": "psirt@adobe.com", "published": "2012-06-09T00:55:01.033", - "lastModified": "2021-09-08T17:19:28.560", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:21.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -307,6 +306,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2036.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2036.json index d1c0f42a5b8..82bcf19d553 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2036.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2036.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2036", "sourceIdentifier": "psirt@adobe.com", "published": "2012-06-09T00:55:01.067", - "lastModified": "2021-09-08T17:19:28.613", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:21.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -307,6 +306,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2037.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2037.json index 132dbe1a732..f2ab6ff7f02 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2037.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2037.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2037", "sourceIdentifier": "psirt@adobe.com", "published": "2012-06-09T00:55:01.110", - "lastModified": "2021-09-08T17:19:28.663", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:21.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -307,6 +306,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2038.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2038.json index 7e03301f009..770a25ba75f 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2038.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2038.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2038", "sourceIdentifier": "psirt@adobe.com", "published": "2012-06-09T00:55:01.157", - "lastModified": "2021-09-08T17:19:28.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:21.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -307,6 +306,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2039.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2039.json index 42bf66654b5..284a78462bc 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2039.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2039.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2039", "sourceIdentifier": "psirt@adobe.com", "published": "2012-06-09T00:55:01.207", - "lastModified": "2021-09-08T17:19:28.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:22.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -307,6 +306,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0722.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2040.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2040.json index 384e1266511..b9c0621df15 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2040.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2040.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2040", "sourceIdentifier": "psirt@adobe.com", "published": "2012-06-09T00:55:01.253", - "lastModified": "2021-09-08T17:19:28.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:22.207", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -250,6 +249,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2041.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2041.json index a16bbe311a1..28838dfd7a5 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2041.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2041.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2041", "sourceIdentifier": "psirt@adobe.com", "published": "2012-06-13T04:46:46.360", - "lastModified": "2012-06-13T04:46:46.360", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:22.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-15.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2042.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2042.json index 7b0f8b64216..777a9063d14 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2042.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2042.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2042", "sourceIdentifier": "psirt@adobe.com", "published": "2012-05-24T15:55:01.323", - "lastModified": "2012-09-29T03:17:26.017", + "lastModified": "2024-11-21T01:38:22.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -148,6 +147,17 @@ { "url": "http://www.securitytracker.com/id?1027047", "source": "psirt@adobe.com" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027047", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2043.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2043.json index 4b3a6c016e4..4e67c3c1e25 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2043.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2043.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2043", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:40.727", - "lastModified": "2012-08-15T10:31:40.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:22.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -325,6 +324,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2044.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2044.json index 1bb63432451..7af5a92077d 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2044.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2044.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2044", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:40.757", - "lastModified": "2012-08-15T10:31:40.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:22.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -325,6 +324,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2045.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2045.json index 4f72c79b53a..7825fcb7dfc 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2045.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2045.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2045", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:40.803", - "lastModified": "2012-08-15T10:31:40.803", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:22.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -325,6 +324,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2046.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2046.json index f2ea649f38d..b40629ee001 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2046.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2046.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2046", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:40.867", - "lastModified": "2012-08-15T10:31:40.867", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:22.883", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -325,6 +324,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2047.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2047.json index c941c623f0f..cd97253d2bd 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2047.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2047.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2047", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:40.913", - "lastModified": "2012-08-15T10:31:40.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:23.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -325,6 +324,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2048.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2048.json index c944ca286c6..aa6f68f3486 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2048.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2048.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2048", "sourceIdentifier": "psirt@adobe.com", "published": "2012-09-12T10:38:33.353", - "lastModified": "2017-08-29T01:31:27.993", + "lastModified": "2024-11-21T01:38:23.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -121,6 +120,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78410", "source": "psirt@adobe.com" + }, + { + "url": "http://osvdb.org/85317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50523", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027516", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78410", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2049.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2049.json index 2a0b5e3af10..efcd6926750 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2049.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2049.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2049", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:40.943", - "lastModified": "2017-09-19T01:34:56.260", + "lastModified": "2024-11-21T01:38:23.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15463", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15463", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2050.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2050.json index c3fc9b3aabb..257dfa802d3 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2050.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2050.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2050", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.007", - "lastModified": "2017-09-19T01:34:56.353", + "lastModified": "2024-11-21T01:38:23.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15469", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15469", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2051.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2051.json index 6cba9df1a49..448c89e0de0 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2051.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2051.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2051", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.053", - "lastModified": "2017-09-19T01:34:56.433", + "lastModified": "2024-11-21T01:38:23.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16394", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16394", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2053.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2053.json index d9352791f40..ffee81cc4a0 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2053.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2053.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2053", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-05T14:55:05.747", - "lastModified": "2017-12-20T02:29:01.193", + "lastModified": "2024-11-21T01:38:23.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -92,6 +91,17 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74813", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sec-consult.com/files/20120328-0_F5_FirePass_SSL_VPN_unauthenticated_remote_root_v1.0.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2054.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2054.json index 87086737c23..09708bcd1bb 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2054.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2054.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2054", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-05T14:55:05.840", - "lastModified": "2012-04-05T14:55:05.840", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:23.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -339,6 +338,18 @@ { "url": "http://www.redmine.org/versions/42", "source": "cve@mitre.org" + }, + { + "url": "http://www.redmine.org/boards/2/topics/29343", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.redmine.org/issues/10390", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.redmine.org/versions/42", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2055.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2055.json index 0b24cd8f59b..721343ae549 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2055.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2055.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2055", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-05T14:55:06.107", - "lastModified": "2024-01-21T02:39:05.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:24.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", - "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 3.6 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,35 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://homakov.blogspot.com/2012/03/how-to.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "http://lwn.net/Articles/488702/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74812", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/blog/1068-public-key-security-vulnerability-and-mitigation", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2063.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2063.json index d576d36b836..85644f29e80 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2063.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2063.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2063", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T00:55:00.747", - "lastModified": "2017-08-29T01:31:28.413", + "lastModified": "2024-11-21T01:38:24.970", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -146,6 +145,43 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74067", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1482166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1482342", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/slidebox.git/commit/3dae144", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48360", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74067", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2064.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2064.json index 44ab220cad4..aedb0e950eb 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2064.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2064.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2064", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T00:55:15.047", - "lastModified": "2012-09-05T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:25.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,37 @@ { "url": "http://www.securityfocus.com/bid/52497", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1482420", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/views_lang_switch.git/commit/c27c318", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48355", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80071", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52497", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2065.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2065.json index 7c573014a59..5069a69c146 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2065.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2065.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2065", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T00:55:15.090", - "lastModified": "2012-09-05T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:25.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -177,6 +176,55 @@ { "url": "http://www.securityfocus.com/bid/52499", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1482136", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1482144", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1482428", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/languageicons.git/commit/be620bb", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupalcode.org/project/languageicons.git/commit/e3f3f1f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48405", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52499", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2066.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2066.json index 01f02ea75a8..6349d63107a 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2066.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2066.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2066", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T00:55:15.137", - "lastModified": "2017-08-29T01:31:28.507", + "lastModified": "2024-11-21T01:38:25.357", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -418,6 +417,54 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74036", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1482442", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1482466", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1482480", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1482528", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48435", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74036", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2067.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2067.json index 72986d610bd..37496a697bd 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2067.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2067.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2067", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T00:55:15.217", - "lastModified": "2017-08-29T01:31:28.587", + "lastModified": "2024-11-21T01:38:25.490", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per http://drupal.org/node/1482528 the versions affected are \"FCKeditor 6.x-2.x versions prior to 6.x-2.3, CKEditor 6.x-1.x versions prior to 6.x-1.9, and CKEditor 7.x-1.x versions prior to 7.x-1.7.\"\r\n", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -419,6 +417,55 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74037", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1482442", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1482466", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1482480", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1482528", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48435", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74037", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per http://drupal.org/node/1482528 the versions affected are \"FCKeditor 6.x-2.x versions prior to 6.x-2.3, CKEditor 6.x-1.x versions prior to 6.x-1.9, and CKEditor 7.x-1.x versions prior to 7.x-1.7.\"\r\n" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2068.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2068.json index 1570a3f53d6..316fb31ed5b 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2068.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2068.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2068", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T00:55:15.263", - "lastModified": "2017-08-29T01:31:28.647", + "lastModified": "2024-11-21T01:38:25.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -146,6 +145,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74070", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1417688", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1482744", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/fancy_slide.git/commit/cd2a424", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48412", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80069", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52513", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74070", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2069.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2069.json index 8489d525535..5751aba0107 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2069.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2069.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2069", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-06T17:55:01.300", - "lastModified": "2012-10-30T04:03:47.423", + "lastModified": "2024-11-21T01:38:25.767", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -158,6 +157,61 @@ { "url": "http://www.securityfocus.com/bid/52660", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1483634", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1483636", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1492624", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/wishlist.git/commit/6660c33", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/wishlist.git/commit/73aaf98", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48486", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.madirish.net/content/drupal-wishlist-6x-24-xss-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52660", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2070.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2070.json index 926a12c4686..207661645bc 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2070.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2070.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2070", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.253", - "lastModified": "2017-08-29T01:31:28.727", + "lastModified": "2024-11-21T01:38:25.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -178,6 +177,66 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74466", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1505410", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1505414", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1506390", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/multiblock.git/commit/2c5177b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupalcode.org/project/multiblock.git/commit/aee07d3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80673", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48588", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.madirish.net/content/drupal-multiblock-6x-13-xss-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52800", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74466", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2071.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2071.json index 2a7ef299307..fbb5cd71fb0 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2071.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2071.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2071", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.330", - "lastModified": "2017-08-29T01:31:28.790", + "lastModified": "2024-11-21T01:38:26.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -181,6 +180,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74467", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1506330", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1506404", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/80674", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48583", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52801", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74467", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2072.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2072.json index 155c4d43aa1..8c5b76b0f6d 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2072.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2072.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2072", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.377", - "lastModified": "2017-08-29T01:31:28.883", + "lastModified": "2024-11-21T01:38:26.160", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -141,6 +140,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74469", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1083664", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1506412", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/80675", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48615", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52777", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74469", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2073.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2073.json index e4e839d7da5..f97437ec1b3 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2073.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2073.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2073", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.423", - "lastModified": "2017-08-29T01:31:28.930", + "lastModified": "2024-11-21T01:38:26.283", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -130,6 +129,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74439", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1506166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1506420", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/bundle_copy.git/commit/299bdca", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48626", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52811", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74439", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2074.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2074.json index f7af29d09a2..578a38deb49 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2074.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2074.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2074", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.503", - "lastModified": "2017-08-29T01:31:29.007", + "lastModified": "2024-11-21T01:38:26.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -151,6 +150,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74485", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1505210", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1506428", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/80677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48631", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52814", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74485", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2075.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2075.json index fa95f198fc3..f13a6c90ae6 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2075.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2075.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2075", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.550", - "lastModified": "2017-08-29T01:31:29.070", + "lastModified": "2024-11-21T01:38:26.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -204,6 +203,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74515", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1506438", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupal.org/node/953788", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/contact_save.git/commit/0654894", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://osvdb.org/80669", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48619", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74515", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2076.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2076.json index 8c9ae546b56..809c728530d 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2076.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2076.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2076", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.597", - "lastModified": "2017-08-29T01:31:29.133", + "lastModified": "2024-11-21T01:38:26.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -140,6 +139,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74516", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1504746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1506448", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/sharethis.git/commit/11f247a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48598", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52778", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74516", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2077.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2077.json index 923726a9eab..12e5610c62f 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2077.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2077.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2077", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.660", - "lastModified": "2017-08-29T01:31:29.210", + "lastModified": "2024-11-21T01:38:26.760", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -136,6 +135,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74518", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1504746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1506448", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupalcode.org/project/sharethis.git/commit/11f247a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48598", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80681", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52778", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74518", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2080.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2080.json index 887676d3048..e21adb4d61d 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2080.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2080.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2080", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.707", - "lastModified": "2017-08-29T01:31:29.273", + "lastModified": "2024-11-21T01:38:27.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -190,6 +189,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74525", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1506594", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1506728", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/node_limitnumber.git/commit/90f0d3a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://osvdb.org/80684", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48597", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52816", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74525", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2081.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2081.json index 0aad5bdc555..4502c417dd2 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2081.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2081.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2081", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.767", - "lastModified": "2017-08-29T01:31:29.367", + "lastModified": "2024-11-21T01:38:27.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -148,6 +147,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74526", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1507328", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1507446", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/80678", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48620", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74526", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2082.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2082.json index 9eb30e1ff18..f5edb8ab5e1 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2082.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2082.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2082", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.830", - "lastModified": "2017-08-29T01:31:29.447", + "lastModified": "2024-11-21T01:38:27.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -151,6 +150,51 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74481", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1507412", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1507466", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/ctools.git/commit/755b3c4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://osvdb.org/80679", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48616", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74481", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2083.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2083.json index edaf1534d87..27c02ade321 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2083.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2083.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2083", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T22:55:01.577", - "lastModified": "2012-09-04T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:27.473", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -152,6 +151,34 @@ { "url": "http://www.securityfocus.com/bid/52798", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1506600", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1507510", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupalcode.org/project/fusion.git/commit/f7cee3d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80680", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48606", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52798", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2085.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2085.json index 6be3cb48b6d..d289c8a0612 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2085.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2085.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2085", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-28T17:55:04.453", - "lastModified": "2013-04-19T03:21:09.723", + "lastModified": "2024-11-21T01:38:27.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -233,6 +232,42 @@ { "url": "https://trac.gajim.org/ticket/7031", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/48708", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201208-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/08/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/08/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52943", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.gajim.org/changeset/bc296e96ac10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://trac.gajim.org/ticket/7031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2088.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2088.json index 4adaf287600..fc4c1d096e2 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2088.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2088.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2088", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T17:55:01.210", - "lastModified": "2023-02-13T04:33:18.163", + "lastModified": "2024-11-21T01:38:28.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -353,6 +352,57 @@ { "url": "https://hermes.opensuse.org/messages/15083566", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49686", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50726", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6162", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54270", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832864", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15083566", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2089.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2089.json index b117d1191a2..1d72de095a0 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2089.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2089.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2089", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-17T21:55:01.353", - "lastModified": "2021-11-10T15:57:01.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:28.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -167,6 +166,68 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079388.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079467.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079474.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://nginx.org/en/security_advisories.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/12/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52999", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026924", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74831", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2090.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2090.json index 1fb64ff8b89..a24834e4b86 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2090.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2090.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2090", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-17T03:41:40.560", - "lastModified": "2017-08-29T01:31:29.757", + "lastModified": "2024-11-21T01:38:28.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -141,6 +140,49 @@ { "url": "https://security.gentoo.org/glsa/201603-12", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081997.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48780", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=28957051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29012174", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/10/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=811617", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74791", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2091.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2091.json index 8ca99c8bef7..60ebde40b53 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2091.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2091.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2091", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-17T03:41:40.607", - "lastModified": "2016-12-03T02:59:53.403", + "lastModified": "2024-11-21T01:38:28.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -137,6 +136,45 @@ { "url": "https://security.gentoo.org/glsa/201603-12", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081997.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48780", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=28957051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29012174", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/10/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=811617", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201603-12", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2093.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2093.json index a90c1063248..ef7eb48b937 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2093.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2093.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2093", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-18T22:55:02.903", - "lastModified": "2017-08-29T01:31:29.837", + "lastModified": "2024-11-21T01:38:28.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -122,6 +121,57 @@ { "url": "https://trac.gajim.org/changeset/13759/src/common/latex.py", "source": "secalert@redhat.com" + }, + { + "url": "http://hg.gajim.org/gajim/rev/f046e4aaf7d4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079169.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079237.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079241.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48695", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201208-04.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/10/15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/10/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53017", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74869", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.gajim.org/changeset/13759/src/common/latex.py", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2094.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2094.json index 35cbe5106e9..1e1d1bcfd57 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2094.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2094.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2094", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-05T22:55:11.153", - "lastModified": "2017-08-29T01:31:29.960", + "lastModified": "2024-11-21T01:38:28.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -118,6 +117,48 @@ { "url": "https://lists.launchpad.net/openstack/msg10211.html", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079160.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49071", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1439-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81742", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/horizon/+bug/977944", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76136", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/horizon/commit/7f8c788aa70db98ac904f37fa4197fcabb802942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.launchpad.net/openstack/msg10211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2096.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2096.json index 101956eb593..095c790ffdf 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2096.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2096.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2096", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T21:55:01.253", - "lastModified": "2012-08-15T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:29.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -133,6 +132,51 @@ "tags": [ "Patch" ] + }, + { + "url": "http://drupal.org/node/1528600", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1528614", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/fivestar.git/commitdiff/75dba2c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48788", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/11/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/12/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52984", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2097.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2097.json index 39cd086dcb6..862b3bf2764 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2097.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2097.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2097", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T21:55:01.317", - "lastModified": "2017-08-29T01:31:30.040", + "lastModified": "2024-11-21T01:38:29.200", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -193,6 +192,60 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74838", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1525998", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1528864", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupal.org/node/1528906", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/autosave.git/commitdiff/39f7fb0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/autosave.git/commitdiff/f7bfd2d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/11/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/12/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74838", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-20xx/CVE-2012-2098.json b/CVE-2012/CVE-2012-20xx/CVE-2012-2098.json index 09f55b27860..d710d7cc048 100644 --- a/CVE-2012/CVE-2012-20xx/CVE-2012-2098.json +++ b/CVE-2012/CVE-2012-20xx/CVE-2012-2098.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2098", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:03.530", - "lastModified": "2023-11-07T02:10:23.940", + "lastModified": "2024-11-21T01:38:29.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -195,6 +194,129 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://ant.apache.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0130.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://commons.apache.org/compress/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081697.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081746.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105049.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105060.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://osvdb.org/82161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://packetstormsecurity.org/files/113014/Apache-Commons-Compress-Apache-Ant-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49255", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49286", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644047", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/09/13/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53676", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027096", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75857", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujan2021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2100.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2100.json index 2672bfc576f..268a729ceb8 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2100.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2100.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2100", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T16:40:32.067", - "lastModified": "2023-11-07T02:10:24.033", + "lastModified": "2024-11-21T01:38:29.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -109,6 +108,38 @@ { "url": "https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d50f2ab6f050311dbf7b8f5501b25f0bf64a439b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1445.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1580.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/12/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=809687", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/d50f2ab6f050311dbf7b8f5501b25f0bf64a439b", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2101.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2101.json index f201e0a61d5..2d27185faf4 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2101.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2101.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2101", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-07T19:55:08.290", - "lastModified": "2017-08-29T01:31:30.243", + "lastModified": "2024-11-21T01:38:29.733", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -135,6 +134,60 @@ { "url": "https://lists.launchpad.net/openstack/msg10268.html", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079434.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079551.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49034", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1438-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81641", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/nova/+bug/969545", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75243", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/nova/commit/1f644d210557b1254f7c7b39424b09a45329ade7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/nova/commit/8c8735a73afb16d5856f0aa6088e9ae406c52beb", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/nova/commit/a67db4586f70ed881d65e80035b2a25be195ce64", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.launchpad.net/openstack/msg10268.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2102.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2102.json index 0729aca8071..913d9b373ac 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2102.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2102.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2102", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-17T00:55:03.000", - "lastModified": "2019-12-17T20:23:43.220", + "lastModified": "2024-11-21T01:38:29.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -571,6 +570,41 @@ { "url": "http://www.securityfocus.com/bid/52931", "source": "secalert@redhat.com" + }, + { + "url": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/53372", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/13/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52931", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2103.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2103.json index f9f99d0b79d..e3b5b11d6a4 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2103.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2103.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2103", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T21:55:01.653", - "lastModified": "2017-08-29T01:31:30.303", + "lastModified": "2024-11-21T01:38:30.007", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 1.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.2 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -107,6 +106,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74884", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668778", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48859", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/16/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/16/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1622-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=812889", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74884", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2104.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2104.json index b15c405c5ba..02cc8fb0986 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2104.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2104.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2104", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T21:55:01.717", - "lastModified": "2018-10-23T21:29:00.323", + "lastModified": "2024-11-21T01:38:30.153", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,33 @@ { "url": "https://support.citrix.com/article/CTX236992", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668666", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/16/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/16/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53032", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74885", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.citrix.com/article/CTX236992", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2109.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2109.json index 152e36056eb..d4daa798b5e 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2109.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2109.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2109", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-04T20:55:02.013", - "lastModified": "2018-10-30T16:27:49.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:30.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -145,6 +144,43 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/04/16/10", "source": "secalert@redhat.com" + }, + { + "url": "http://buddypress.org/2012/03/buddypress-1-5-5/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/80763", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/bugtraq/2012/Apr/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18690", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/15/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/16/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2110.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2110.json index cf3ca9cfd50..c4df55c6731 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2110.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2110.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2110", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-19T17:55:01.253", - "lastModified": "2018-01-05T02:29:31.947", + "lastModified": "2024-11-21T01:38:30.947", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -598,10 +597,22 @@ "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2", + "source": "secalert@redhat.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", "source": "secalert@redhat.com" @@ -701,9 +712,191 @@ "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", "source": "secalert@redhat.com" }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "secalert@redhat.com" + }, { "url": "https://kb.juniper.net/KB27376", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-04/0209.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://cvs.openssl.org/chngview?cn=22431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://cvs.openssl.org/chngview?cn=22434", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://cvs.openssl.org/chngview?cn=22439", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079149.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079299.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080176.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133951357207000&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81223", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0518.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0522.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1306.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1307.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1308.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48847", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48899", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48999", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/57353", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5784", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:060", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openssl.org/news/secadv_20120419.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53158", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1424-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.juniper.net/KB27376", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2111.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2111.json index 50e78ced7ae..1a8bf417d23 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2111.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2111.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2111", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-30T14:55:03.000", - "lastModified": "2018-01-05T02:29:32.040", + "lastModified": "2024-11-21T01:38:31.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -300,6 +299,10 @@ "url": "http://marc.info/?l=bugtraq&m=134323086902585&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134323086902585&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://osvdb.org/81648", "source": "secalert@redhat.com" @@ -359,6 +362,98 @@ { "url": "http://www.ubuntu.com/usn/USN-1434-1", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134323086902585&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134323086902585&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81648", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0533.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48976", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48984", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48999", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49017", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2463", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.samba.org/samba/security/CVE-2012-2111", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1434-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2112.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2112.json index e73844a9641..58457f0397e 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2112.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2112.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2112", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-27T21:55:01.460", - "lastModified": "2017-08-29T01:31:30.743", + "lastModified": "2024-11-21T01:38:31.297", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -326,6 +325,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74920", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.typo3.org/pipermail/typo3-announce/2012/000241.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.typo3.org/pipermail/typo3-announce/2012/000242.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-002/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/17/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/18/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53047", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74920", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2113.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2113.json index d1803e75b7c..2bf6a74b0b4 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2113.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2113.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2113", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T17:55:01.273", - "lastModified": "2023-02-13T00:24:13.620", + "lastModified": "2024-11-21T01:38:31.450", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -401,6 +400,60 @@ { "url": "https://hermes.opensuse.org/messages/15083566", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1054.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49493", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49686", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50726", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.remotesensing.org/libtiff/v4.0.2.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810551", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15083566", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2114.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2114.json index 2023c7375f6..76f9a2f0390 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2114.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2114.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2114", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T22:55:01.623", - "lastModified": "2012-12-19T04:52:43.340", + "lastModified": "2024-11-21T01:38:31.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -92,6 +91,26 @@ { "url": "http://www.securityfocus.com/bid/53144", "source": "secalert@redhat.com" + }, + { + "url": "http://www.etalabs.net/musl/download.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/musl/2012/04/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/18/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/18/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53144", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2115.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2115.json index 6dd402c2061..d3353cbfeb0 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2115.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2115.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2115", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:07.137", - "lastModified": "2017-08-29T01:31:30.820", + "lastModified": "2024-11-21T01:38:31.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -133,6 +132,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71983", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Jan/27", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18274", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.mavitunasecurity.com/sql-injection-vulnerability-in-openemr/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/18/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/78132", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51247", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71983", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2116.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2116.json index 519867e9a0a..b12cb68ce18 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2116.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2116.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2116", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T22:55:01.667", - "lastModified": "2012-09-04T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:31.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -115,6 +114,32 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/04/19/1", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1538198", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupalcode.org/project/commerce_reorder.git/commit/bf060ab", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48912", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/18/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2117.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2117.json index f5f457bb6d2..f43ca7ec096 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2117.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2117.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2117", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T22:55:01.717", - "lastModified": "2017-08-29T01:31:30.883", + "lastModified": "2024-11-21T01:38:31.970", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -142,6 +141,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75025", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1515084", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1538704", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48832", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/18/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75025", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2118.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2118.json index 5a1750df304..44356f34c13 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2118.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2118.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2118", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-18T22:55:03.093", - "lastModified": "2017-08-29T01:31:30.930", + "lastModified": "2024-11-21T01:38:32.097", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74930", "source": "secalert@redhat.com" + }, + { + "url": "http://patchwork.freedesktop.org/patch/10001/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/18/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74930", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2120.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2120.json index bd374b386dc..c3481a379a8 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2120.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2120.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2120", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-18T22:55:03.247", - "lastModified": "2012-05-21T16:24:56.587", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:32.337", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -83,6 +82,18 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/04/19/15", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668779", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/15", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2121.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2121.json index 1fa1d12fa67..ba42f9dda48 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2121.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2121.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2121", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-17T11:00:38.210", - "lastModified": "2018-01-05T02:29:32.100", + "lastModified": "2024-11-21T01:38:32.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -116,6 +115,50 @@ { "url": "https://github.com/torvalds/linux/commit/09ca8e1173bcb12e2a449698c9ae3b86a8a10195", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0676.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50732", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1577-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2036-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2037-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=814149", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/09ca8e1173bcb12e2a449698c9ae3b86a8a10195", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2122.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2122.json index afcdcc1d897..85931237486 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2122.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2122.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2122", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-26T18:55:05.083", - "lastModified": "2014-02-21T04:50:38.233", + "lastModified": "2024-11-21T01:38:32.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -490,6 +489,65 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://bugs.mysql.com/bug.php?id=64884", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://kb.askmonty.org/en/mariadb-5162-release-notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/oss-sec/2012/q2/493", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49417", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/53372", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securitytracker.com/id?1027143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/19092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53911", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://community.rapid7.com/community/metasploit/blog/2012/06/11/cve-2012-2122-a-tragically-comedic-security-flaw-in-mysql", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2123.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2123.json index 6ff3ac4ef47..0208a7b1929 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2123.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2123.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2123", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-17T11:00:38.367", - "lastModified": "2023-10-12T14:12:18.073", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:32.693", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -168,6 +167,88 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d52fc5dde171f030170a6cb78034d166b13c9445", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0670.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2469", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/20/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027072", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806722", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75043", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/d52fc5dde171f030170a6cb78034d166b13c9445", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2127.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2127.json index 9924da063a4..1dfdf98070d 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2127.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2127.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2127", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-21T23:55:02.880", - "lastModified": "2023-02-13T04:33:22.140", + "lastModified": "2024-11-21T01:38:33.237", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -177,6 +176,66 @@ "Exploit", "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=905ad269c55fc62bee3da29f7b1d1efeba8aa1e1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-1607-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.2.bz2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/20/25", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/22/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55774", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1594-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=757783", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/905ad269c55fc62bee3da29f7b1d1efeba8aa1e1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2128.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2128.json index d1751154471..b9ac49d9eb6 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2128.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2128.json @@ -2,7 +2,7 @@ "id": "CVE-2012-2128", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-27T21:55:01.697", - "lastModified": "2024-08-06T20:15:21.120", + "lastModified": "2024-11-21T01:38:33.390", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -117,6 +117,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74907", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.dokuwiki.org/index.php?do=details&task_id=2488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ircrash.com/uploads/dokuwiki.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/bugtraq/2012/Apr/121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48848", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/22/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/23/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815122", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74907", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2129.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2129.json index b36dfb1a3eb..220ebfb6367 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2129.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2129.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2129", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-27T21:55:01.757", - "lastModified": "2017-08-29T01:31:31.117", + "lastModified": "2024-11-21T01:38:33.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -118,6 +117,53 @@ { "url": "https://github.com/splitbrain/dokuwiki/commit/ff71173477e54774b5571015d49d944f51cb8a26", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.dokuwiki.org/index.php?do=details&task_id=2487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ircrash.com/uploads/dokuwiki.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/bugtraq/2012/Apr/121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48848", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/22/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/23/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=412891", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815122", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74907", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/splitbrain/dokuwiki/commit/ff71173477e54774b5571015d49d944f51cb8a26", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2131.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2131.json index a7376063a7f..d463e746d29 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2131.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2131.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2131", "sourceIdentifier": "secalert@redhat.com", "published": "2012-04-24T20:55:02.970", - "lastModified": "2018-01-05T02:29:32.180", + "lastModified": "2024-11-21T01:38:33.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,14 @@ "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", + "source": "secalert@redhat.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", "source": "secalert@redhat.com" @@ -158,6 +165,101 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75099", "source": "secalert@redhat.com" + }, + { + "url": "http://cvs.openssl.org/chngview?cn=22479", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=133728068926468&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134039053214295&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48956", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/57353", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5784", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:064", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openssl.org/news/secadv_20120424.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/24/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1428-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75099", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2132.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2132.json index e61df59bd54..584936afe3d 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2132.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2132.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2132", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-20T18:55:03.043", - "lastModified": "2017-08-29T01:31:31.163", + "lastModified": "2024-11-21T01:38:33.933", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/24/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/24/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/30/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/02/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53232", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=666280", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75167", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2133.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2133.json index 63478531f16..af7d24f02a1 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2133.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2133.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2133", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T16:40:32.117", - "lastModified": "2023-02-13T00:24:19.330", + "lastModified": "2024-11-21T01:38:34.043", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", + "baseScore": 4.0, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -133,6 +132,42 @@ { "url": "https://github.com/torvalds/linux/commit/90481622d75715bfcb68501280a917dbfe516029", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=90481622d75715bfcb68501280a917dbfe516029", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2469", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/24/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53233", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817430", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75168", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/90481622d75715bfcb68501280a917dbfe516029", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2135.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2135.json index ee533150c2a..dfc574de7a1 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2135.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2135.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2135", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T22:55:01.253", - "lastModified": "2023-01-19T15:53:44.433", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:34.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -195,6 +194,64 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670389", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://bugs.python.org/issue14579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51087", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/25/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/25/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1615-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1616-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2136.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2136.json index ea699866846..9789c0fc59a 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2136.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2136.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2136", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-09T10:29:46.870", - "lastModified": "2023-10-12T14:12:02.680", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:34.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -159,6 +158,79 @@ "Exploit", "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1087.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50807", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1529-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1535-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2138.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2138.json index f1b5e62c00a..1fc1f810937 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2138.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2138.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2138", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-09T22:55:01.027", - "lastModified": "2023-11-07T02:10:24.610", + "lastModified": "2024-11-21T01:38:34.703", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -89,6 +88,18 @@ { "url": "https://issues.apache.org/jira/browse/SLING-2517", "source": "secalert@redhat.com" + }, + { + "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201207.mbox/%3CCAEWfVJ=PwoQmwJg0KmbrC17Gw51kgfKRsqgy=4RpMQsdGh0bVg%40mail.gmail.com%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://svn.apache.org/viewvc?view=revision&revision=1352865", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.apache.org/jira/browse/SLING-2517", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2139.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2139.json index 58d6185c019..c5d733e3881 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2139.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2139.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2139", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-18T18:55:01.463", - "lastModified": "2013-10-07T16:18:35.840", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:34.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -130,6 +129,49 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48970", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/25/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/26/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=759092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816352", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2140.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2140.json index 2e002b7ac06..aecf422c6ed 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2140.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2140.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2140", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-18T18:55:01.510", - "lastModified": "2012-10-30T04:03:55.957", + "lastModified": "2024-11-21T01:38:34.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -137,6 +136,61 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48970", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/25/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/26/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=759092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816352", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mikel/mail/blob/9beb079c70d236a5ad2e1ba95b2c977e55deb7af/CHANGELOG.rdoc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2141.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2141.json index d36b8a49b21..e236fee7d20 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2141.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2141.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2141", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T22:55:01.330", - "lastModified": "2017-08-29T01:31:31.320", + "lastModified": "2024-11-21T01:38:35.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -122,6 +121,57 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75169", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0124.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48938", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/59974", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/CTX139049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201409-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/26/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/26/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53255", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026984", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815813", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75169", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2143.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2143.json index fa382f505b0..40023d6caae 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2143.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2143.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2143", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-05T14:55:02.183", - "lastModified": "2024-03-14T19:59:00.810", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:35.357", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -626,6 +625,194 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=aab49e934de1fff046e659cbec46e3d053b41c34", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Patch" + ] + }, + { + "url": "http://git.postgresql.org/gitweb/?p=postgresql.git&a=commit&h=932ded2ed51e8333852e370c7a6dad75d9f236f9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082258.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082292.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082294.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49304", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50718", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://security.freebsd.org/advisories/FreeBSD-SA-12:02.crypt.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5501", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2491", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:092", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.postgresql.org/docs/8.3/static/release-8-3-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.postgresql.org/docs/8.4/static/release-8-4-12.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.postgresql.org/docs/9.0/static/release-9-0-8.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.postgresql.org/docs/9.1/static/release-9-1-4.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.postgresql.org/support/security/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026995", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816956", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2144.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2144.json index e829566572c..89681ab7965 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2144.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2144.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2144", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-05T22:55:11.233", - "lastModified": "2017-08-29T01:31:31.383", + "lastModified": "2024-11-21T01:38:35.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -126,6 +125,56 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081173.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49071", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1439-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/05/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81741", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53399", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/horizon/+bug/978896", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/horizon/commit/041b1c44c7d6cf5429505067c32f8f35166a8bab", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2146.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2146.json index 7e29e2e3ee6..d095693b1b5 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2146.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2146.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2146", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T21:55:01.840", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:35.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,33 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810013", "source": "secalert@redhat.com" + }, + { + "url": "http://elixir.ematia.de/trac/ticket/119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/27/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/28/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/29/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810013", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2147.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2147.json index 40c84cbcf7c..aac20e74c3e 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2147.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2147.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2147", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T21:55:01.887", - "lastModified": "2017-08-29T01:31:31.647", + "lastModified": "2024-11-21T01:38:35.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78924", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/17/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/18/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/27/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/29/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78924", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2149.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2149.json index 2b1eaf9656c..ce301a48ad8 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2149.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2149.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2149", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-21T15:55:12.520", - "lastModified": "2023-11-07T02:10:24.890", + "lastModified": "2024-11-21T01:38:36.167", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -171,6 +170,75 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0090.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/112862/libwpd-WPXContentListener-_closeTableRow-Memory-Overwrite.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1043.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/46992", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60799", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openoffice.org/security/cves/CVE-2012-2149.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53570", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027069", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.sec-consult.com/files/20120518-0_openoffice_memory_overwrite.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2151.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2151.json index bf16efd0040..e9bc94f9276 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2151.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2151.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2151", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T22:55:01.567", - "lastModified": "2017-08-29T01:31:31.727", + "lastModified": "2024-11-21T01:38:36.470", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -130,6 +129,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75104", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.rezo.net/archives/spip-en.mbox/U5QUZ6WJRAJC7H5BR7W5SQG6WCD3PXL7/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48939", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/30/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/01/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81473", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53216", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026970", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75104", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2152.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2152.json index 28fdd0cef2e..08075f10d94 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2152.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2152.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2152", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T21:55:01.493", - "lastModified": "2012-11-06T05:11:08.500", + "lastModified": "2024-11-21T01:38:36.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,26 @@ { "url": "https://bugzilla.novell.com/show_bug.cgi?id=760334", "source": "secalert@redhat.com" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2498", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/02/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53354", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=760334", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2154.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2154.json index 66ec2b7a1ea..eb267607b8b 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2154.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2154.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2154", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.893", - "lastModified": "2017-08-29T01:31:31.803", + "lastModified": "2024-11-21T01:38:36.843", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74520", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1506542", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/80685", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74520", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2155.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2155.json index a66b5a16c7b..a91544c04c0 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2155.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2155.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2155", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T23:55:01.957", - "lastModified": "2017-08-29T01:31:31.867", + "lastModified": "2024-11-21T01:38:36.960", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74522", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1506542", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/80686", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52812", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74522", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2156.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2156.json index 8391600999e..0a39f0e9769 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2156.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2156.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2156", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-11T10:39:27.153", - "lastModified": "2017-12-20T02:29:01.427", + "lastModified": "2024-11-21T01:38:37.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -150,6 +149,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74614", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80960", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18699", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.webapp-security.com/2012/04/plumecms", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.webapp-security.com/wp-content/uploads/2012/04/PlumeCMS-1.2.4-Multiple-Permanent-XSS.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74614", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2159.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2159.json index b3712a614d3..713673b0b8e 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2159.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2159.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2159", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-20T10:27:28.193", - "lastModified": "2017-08-29T01:31:31.913", + "lastModified": "2024-11-21T01:38:37.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -134,6 +133,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74832", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21596690", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21598423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74832", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2161.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2161.json index ea55e118024..4306c6d4916 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2161.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2161.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2161", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-20T10:27:28.223", - "lastModified": "2017-08-29T01:31:31.993", + "lastModified": "2024-11-21T01:38:37.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -134,6 +133,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74833", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21596690", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21598423", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74833", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2162.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2162.json index 8d0ad56ff01..c1bb7c51ada 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2162.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2162.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2162", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-05-01T19:55:02.567", - "lastModified": "2017-08-29T01:31:32.053", + "lastModified": "2024-11-21T01:38:37.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -757,6 +756,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74900", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21588312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21591172", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74900", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2163.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2163.json index 8e2ac2ef630..b88c373fba8 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2163.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2163.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2163", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-07-30T19:55:04.080", - "lastModified": "2017-08-29T01:31:32.117", + "lastModified": "2024-11-21T01:38:37.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -84,6 +83,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75037", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75037", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2164.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2164.json index 62c6b98c29b..e0f7b670669 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2164.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2164.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2164", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-17T20:55:04.213", - "lastModified": "2017-08-29T01:31:32.163", + "lastModified": "2024-11-21T01:38:37.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -184,6 +183,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75039", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM62735", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21606318", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75039", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2165.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2165.json index 10d485e7fb4..cb254e2f03f 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2165.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2165.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2165", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-17T20:55:04.260", - "lastModified": "2017-08-29T01:31:32.227", + "lastModified": "2024-11-21T01:38:37.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -184,6 +183,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75040", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM62740", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21606385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75040", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2168.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2168.json index cc9ec4d60e7..c820738c38f 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2168.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2168.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2168", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-17T20:55:04.307", - "lastModified": "2017-08-29T01:31:32.337", + "lastModified": "2024-11-21T01:38:38.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -184,6 +183,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75048", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM61822", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21606319", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75048", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2169.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2169.json index c953d3740b4..1a0b855f6f8 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2169.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2169.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2169", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-17T20:55:04.370", - "lastModified": "2017-08-29T01:31:32.397", + "lastModified": "2024-11-21T01:38:38.403", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -159,6 +158,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75049", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM62762", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21607783", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75049", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2170.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2170.json index 8e703b716aa..3220a91b053 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2170.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2170.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2170", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-20T10:27:28.270", - "lastModified": "2017-08-29T01:31:32.447", + "lastModified": "2024-11-21T01:38:38.527", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -161,6 +160,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75234", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg1PM56183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21595172", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75234", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2171.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2171.json index 9d0a6620a21..bbc1c42d82d 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2171.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2171.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2171", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-22T10:24:06.957", - "lastModified": "2017-08-29T01:31:32.507", + "lastModified": "2024-11-21T01:38:38.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -194,6 +193,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75236", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/connections/blogs/PSIRT/entry/secbulletin_stg-storage_cve-2012-2171_cve-2012-2172", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zeroscience.mk/codes/ibmssdssmp_sqlixss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75236", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2172.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2172.json index eda24f56e26..f27b2aa08bd 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2172.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2172.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2172", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-22T10:24:07.003", - "lastModified": "2017-08-29T01:31:32.570", + "lastModified": "2024-11-21T01:38:38.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -197,6 +196,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75239", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/connections/blogs/PSIRT/entry/secbulletin_stg-storage_cve-2012-2171_cve-2012-2172", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zeroscience.mk/codes/ibmssdssmp_sqlixss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75239", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2173.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2173.json index 262293b564a..7180bdc0504 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2173.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2173.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2173", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-20T10:27:28.317", - "lastModified": "2017-08-29T01:31:32.633", + "lastModified": "2024-11-21T01:38:38.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75242", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21598423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75242", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2174.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2174.json index af8df69f3ee..54d4e59671c 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2174.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2174.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2174", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-20T10:27:28.363", - "lastModified": "2017-08-29T01:31:32.697", + "lastModified": "2024-11-21T01:38:39.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -209,6 +208,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75320", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21598348", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75320", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2175.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2175.json index 4ab92d461c3..ee784515d8f 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2175.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2175.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2175", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-20T10:27:28.397", - "lastModified": "2017-08-29T01:31:32.743", + "lastModified": "2024-11-21T01:38:39.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -147,6 +146,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75321", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21596862", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75321", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2176.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2176.json index e942f4de9ff..632067ad55d 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2176.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2176.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2176", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-05-25T20:55:01.743", - "lastModified": "2017-08-29T01:31:32.803", + "lastModified": "2024-11-21T01:38:39.223", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75322", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21596191", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53678", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027097", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75322", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2179.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2179.json index a6c926a42d1..407394c5e28 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2179.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2179.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2179", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-22T10:24:07.427", - "lastModified": "2017-08-29T01:31:32.930", + "lastModified": "2024-11-21T01:38:39.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -136,6 +135,61 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75510", "source": "psirt@us.ibm.com" + }, + { + "url": "http://aix.software.ibm.com/aix/efixes/security/libodm_advisory.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV21379", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV21381", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV21382", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV21383", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV22019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/83133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75510", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2180.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2180.json index ccf27de7fe8..ec9a4e65faa 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2180.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2180.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2180", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-20T10:27:28.443", - "lastModified": "2018-10-02T10:29:00.610", + "lastModified": "2024-11-21T01:38:39.630", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'CWE-476: NULL Pointer Dereference'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -148,6 +146,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75418", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg1IC82234", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg1IC82367", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21597090", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53873", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75418", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'CWE-476: NULL Pointer Dereference'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2181.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2181.json index bf7571afd36..9885887a3ac 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2181.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2181.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2181", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-07-03T21:55:01.490", - "lastModified": "2017-08-29T01:31:33.053", + "lastModified": "2024-11-21T01:38:39.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -96,6 +95,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75584", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg1PM64172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21598363", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75584", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2183.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2183.json index a9b7406c6ee..76d868584ff 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2183.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2183.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2183", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-09-10T17:55:01.367", - "lastModified": "2017-08-29T01:31:33.100", + "lastModified": "2024-11-21T01:38:39.870", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/384.html\r\n\r\n'CWE-384: Session Fixation'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -155,6 +153,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75776", "source": "psirt@us.ibm.com" + }, + { + "url": "http://osvdb.org/85185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50551", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV09212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21610081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75776", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/384.html\r\n\r\n'CWE-384: Session Fixation'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2184.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2184.json index d2fe3e1ef2c..53eec084aae 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2184.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2184.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2184", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-09-10T17:55:01.413", - "lastModified": "2017-08-29T01:31:33.147", + "lastModified": "2024-11-21T01:38:39.990", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/384.html 'CWE-384: Session Fixation'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -146,6 +144,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75780", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/50551", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV19887", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21610081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75780", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/384.html 'CWE-384: Session Fixation'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2185.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2185.json index 674f3bcc8c9..c1505ce58e5 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2185.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2185.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2185", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-09-10T17:55:01.460", - "lastModified": "2017-08-29T01:31:33.210", + "lastModified": "2024-11-21T01:38:40.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -154,6 +153,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75784", "source": "psirt@us.ibm.com" + }, + { + "url": "http://osvdb.org/85183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50551", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV17942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21610081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75784", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2186.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2186.json index 8f12ee32725..b9cccf0cf1f 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2186.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2186.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2186", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-31T14:55:00.950", - "lastModified": "2024-08-15T12:44:24.983", + "lastModified": "2024-11-21T01:38:40.223", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -720,6 +719,30 @@ { "url": "http://www.securitytracker.com/id?1027460", "source": "psirt@us.ibm.com" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2012-012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50687", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027460", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2188.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2188.json index afabd7bdb90..e156a651400 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2188.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2188.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2188", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-06T16:55:03.260", - "lastModified": "2017-08-29T01:31:33.290", + "lastModified": "2024-11-21T01:38:40.497", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -118,6 +117,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75906", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_power_hmc_viosrvcmd_command_allows_elevated_privilege_on_vios_cve_2012_218825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1MB03548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1MB03550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1MB03554", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1MB03580", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75906", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2190.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2190.json index 27c44c81924..1a3062ece0c 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2190.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2190.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2190", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-21T10:46:10.437", - "lastModified": "2017-08-29T01:31:33.350", + "lastModified": "2024-11-21T01:38:40.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -346,6 +345,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75994", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM66218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606096", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75994", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2191.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2191.json index a7394a6cece..3157dd04868 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2191.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2191.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2191", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-08T10:26:18.767", - "lastModified": "2017-08-29T01:31:33.430", + "lastModified": "2024-11-21T01:38:40.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -120,6 +119,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75996", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/51279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31981", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75996", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2192.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2192.json index 174365c1a27..8084b81cb2f 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2192.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2192.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2192", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-20T10:27:28.520", - "lastModified": "2021-08-31T15:43:58.920", + "lastModified": "2024-11-21T01:38:40.877", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -135,6 +134,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76032", "source": "psirt@us.ibm.com" + }, + { + "url": "http://aix.software.ibm.com/aix/efixes/security/socket_advisory.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV16603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV19178", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV21128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV21131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV21235", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53567", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2194.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2194.json index 903b3aa1f80..0b17a589558 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2194.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2194.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2194", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-07-25T10:42:34.680", - "lastModified": "2017-12-22T02:29:09.793", + "lastModified": "2024-11-21T01:38:41.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -356,6 +355,41 @@ { "url": "http://www.securityfocus.com/bid/54487", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/49919", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84019", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84711", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84714", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84716", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21600837", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54487", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2196.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2196.json index b4663cae85f..f4f84e39693 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2196.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2196.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2196", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-07-25T10:42:34.757", - "lastModified": "2017-12-22T02:29:09.887", + "lastModified": "2024-11-21T01:38:41.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -359,6 +358,44 @@ { "url": "http://www.securityfocus.com/bid/54487", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/49919", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84712", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84748", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84750", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84751", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21600837", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54487", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-21xx/CVE-2012-2197.json b/CVE-2012/CVE-2012-21xx/CVE-2012-2197.json index 1f58adb82d9..171de3991e2 100644 --- a/CVE-2012/CVE-2012-21xx/CVE-2012-2197.json +++ b/CVE-2012/CVE-2012-21xx/CVE-2012-2197.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2197", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-07-25T10:42:34.837", - "lastModified": "2017-12-22T02:29:09.963", + "lastModified": "2024-11-21T01:38:41.367", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -356,6 +355,41 @@ { "url": "http://www.securityfocus.com/bid/54487", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/49919", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84555", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84752", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84753", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84754", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC84755", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21600837", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54487", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2200.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2200.json index b7bccc3fd56..a2298423f3c 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2200.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2200.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2200", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-06-27T10:18:37.900", - "lastModified": "2021-08-31T15:43:58.933", + "lastModified": "2024-11-21T01:38:41.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -112,6 +111,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76466", "source": "psirt@us.ibm.com" + }, + { + "url": "http://aix.software.ibm.com/aix/efixes/security/sendmail1_advisory.asc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV22963", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV22964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV22965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IV22966", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027207", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76466", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2202.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2202.json index a3cc649d7f5..1ee64f8446c 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2202.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2202.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2202", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-07-27T10:27:49.043", - "lastModified": "2017-12-22T02:29:10.043", + "lastModified": "2024-11-21T01:38:41.823", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -152,6 +151,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76801", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/49897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21605630", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/659791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2203.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2203.json index ad564cbb356..3d906708ebd 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2203.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2203.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2203", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-08T10:26:18.813", - "lastModified": "2017-08-29T01:31:33.790", + "lastModified": "2024-11-21T01:38:41.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -119,6 +118,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77280", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/51279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV31975", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606145", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77280", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2205.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2205.json index 1551309e543..6f2749de3bd 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2205.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2205.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2205", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-17T20:55:04.450", - "lastModified": "2017-08-29T01:31:33.850", + "lastModified": "2024-11-21T01:38:42.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -184,6 +183,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77094", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM61670", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21605838", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77094", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2206.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2206.json index 6819679a628..7e5ad1c1eea 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2206.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2206.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2206", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-17T10:31:52.043", - "lastModified": "2017-08-29T01:31:33.897", + "lastModified": "2024-11-21T01:38:42.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -123,6 +122,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77095", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC82761", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/20478/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21607481", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77095", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2208.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2208.json index 285e9fdd887..940984f1f3e 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2208.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2208.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2208", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T22:55:01.783", - "lastModified": "2017-08-29T01:31:33.960", + "lastModified": "2024-11-21T01:38:42.373", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +119,54 @@ { "url": "https://www.htbridge.com/advisory/HTB23085", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0196.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://piwigo.org/bugs/view.php?id=2607", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://piwigo.org/forum/viewtopic.php?id=19173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://piwigo.org/releases/2.3.4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48903", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18782", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23085", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2209.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2209.json index 274cc236e87..c0621f34aaa 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2209.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2209.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2209", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T22:55:01.847", - "lastModified": "2017-08-29T01:31:34.023", + "lastModified": "2024-11-21T01:38:42.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,57 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0196.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://piwigo.org/bugs/view.php?id=2607", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://piwigo.org/forum/viewtopic.php?id=19173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://piwigo.org/releases/2.3.4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48903", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18782", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53245", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75186", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23085", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2210.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2210.json index cf058786a59..d678ab3436e 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2210.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2210.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2210", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-11T10:39:27.200", - "lastModified": "2017-12-20T02:29:01.507", + "lastModified": "2024-11-21T01:38:42.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74644", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0043.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18705/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026891", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74644", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2212.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2212.json index 0678e5a9614..7f033ca9a0a 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2212.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2212.json @@ -2,7 +2,7 @@ "id": "CVE-2012-2212", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-28T10:06:13.210", - "lastModified": "2024-08-06T20:15:22.147", + "lastModified": "2024-11-21T01:38:42.933", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +90,18 @@ { "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0189.html", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0164.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0189.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2213.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2213.json index 27ea745d1d3..84fc72d7263 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2213.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2213.json @@ -2,7 +2,7 @@ "id": "CVE-2012-2213", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-28T10:06:13.273", - "lastModified": "2024-08-06T20:15:22.240", + "lastModified": "2024-11-21T01:38:43.070", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -102,6 +102,30 @@ { "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0165.html", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0131.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0146.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0163.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0165.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2214.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2214.json index aebf83de081..04f73c91e4e 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2214.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2214.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2214", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T19:55:02.943", - "lastModified": "2017-12-29T02:29:18.800", + "lastModified": "2024-11-21T01:38:43.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -330,6 +329,29 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17886", "source": "cve@mitre.org" + }, + { + "url": "http://hg.pidgin.im/pidgin/main/rev/5f9d676cefdb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://pidgin.im/news/security/?id=62", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17886", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2215.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2215.json index e97e84b241e..7e35eb9874d 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2215.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2215.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2215", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-09T21:55:02.353", - "lastModified": "2017-08-29T01:31:34.087", + "lastModified": "2024-11-21T01:38:43.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -102,6 +101,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74189", "source": "cve@mitre.org" + }, + { + "url": "http://download.novell.com/Download?buildid=rs4B5jhWKf8~", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5127930.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.novell.com/support/viewContent.do?externalId=7010044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=975", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74189", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2217.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2217.json index 49c275980ed..c6363a6ecfd 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2217.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2217.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2217", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-01T14:55:01.673", - "lastModified": "2017-12-14T02:29:02.433", + "lastModified": "2024-11-21T01:38:43.533", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -392,6 +391,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75080", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0176.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53187", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vsecurity.com/resources/advisory/20120420-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2223.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2223.json index 6508affc329..1668ccae881 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2223.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2223.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2223", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-11T10:39:27.327", - "lastModified": "2017-12-20T02:29:01.567", + "lastModified": "2024-11-21T01:38:43.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +119,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74818", "source": "cve@mitre.org" + }, + { + "url": "http://www.novell.com/support/viewContent.do?externalId=7008244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.novell.com/support/viewContent.do?externalId=7010044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.novell.com/support/viewContent.do?externalId=7010137", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74818", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2224.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2224.json index 639d029a34c..02939c19260 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2224.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2224.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2224", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-11T10:39:30.763", - "lastModified": "2017-12-20T02:29:01.630", + "lastModified": "2024-11-21T01:38:43.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74811", "source": "cve@mitre.org" + }, + { + "url": "http://blog.vulnhunt.com/index.php/2012/03/06/cal-2012-0006xunlei-dll-injection-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://safe.xunlei.com/announce/xl20120306.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53191", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74811", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2225.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2225.json index 7939d46395d..30cc7820d41 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2225.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2225.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2225", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-11T10:39:30.793", - "lastModified": "2017-12-20T02:29:01.677", + "lastModified": "2024-11-21T01:38:43.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74810", "source": "cve@mitre.org" + }, + { + "url": "http://blog.vulnhunt.com/index.php/2012/01/01/cal-2011-0080/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74810", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2227.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2227.json index f03acaf8791..ef7e403dede 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2227.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2227.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2227", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-26T18:55:01.683", - "lastModified": "2017-08-29T01:31:34.147", + "lastModified": "2024-11-21T01:38:44.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -114,6 +113,48 @@ { "url": "https://www.htbridge.com/advisory/HTB23086", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81638", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49026", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://telechargements.pluxml.org/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18828", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.pluxml.org/article59/sortie-de-pluxml-5-1-6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53348", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75330", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23086", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2230.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2230.json index 2f8ccd9e119..9d768896262 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2230.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2230.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2230", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-12T10:45:14.627", - "lastModified": "2017-12-20T02:29:01.740", + "lastModified": "2024-11-21T01:38:44.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -143,6 +142,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74823", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48776", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://ccp.cloudera.com/display/DOC/Cloudera+Security+Bulletin", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74823", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2234.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2234.json index f221cecde66..e6a7c87af09 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2234.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2234.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2234", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-22T03:44:43.417", - "lastModified": "2017-12-13T02:29:07.920", + "lastModified": "2024-11-21T01:38:44.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -117,6 +116,26 @@ { "url": "https://github.com/nilsteampassnet/TeamPass/blob/master/readme.txt", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/111905/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53038", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74910", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/nilsteampassnet/TeamPass/blob/master/readme.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2235.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2235.json index 1c174e047d6..c00ed851b16 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2235.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2235.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2235", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T19:55:01.140", - "lastModified": "2012-05-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:44.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -269,6 +268,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2012-012.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2236.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2236.json index 7e8d908e7af..d542b35bd0f 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2236.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2236.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2236", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-20T10:55:00.823", - "lastModified": "2012-04-20T10:55:00.823", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:44.780", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0110.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2267.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2267.json index 86458fdb1d1..8d92b63b488 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2267.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2267.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2267", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-17T04:26:08.073", - "lastModified": "2017-12-29T02:29:18.863", + "lastModified": "2024-11-21T01:38:46.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -129,6 +128,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74674", "source": "cve@mitre.org" + }, + { + "url": "http://helixproducts.real.com/docs/security/SecurityUpdate04022012HS.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/secunia_research/2012-9/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74674", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2268.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2268.json index 266033ba25d..e3e4da3d9dd 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2268.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2268.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2268", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-17T04:26:08.167", - "lastModified": "2017-12-29T02:29:18.923", + "lastModified": "2024-11-21T01:38:47.087", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -128,6 +127,28 @@ { "url": "http://www.securitytracker.com/id?1026898", "source": "cve@mitre.org" + }, + { + "url": "http://helixproducts.real.com/docs/security/SecurityUpdate04022012HS.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/secunia_research/2012-9/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026898", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2269.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2269.json index 98593799207..52b206377f7 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2269.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2269.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2269", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-20T10:55:01.357", - "lastModified": "2018-01-04T02:29:02.707", + "lastModified": "2024-11-21T01:38:47.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -140,6 +139,64 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75028", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0127.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81206", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81207", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81208", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81209", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81210", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://owncloud.org/security/advisories/CVE-2012-2269/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48850", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.tele-consulting.com/advisories/TC-SA-2012-01.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75028", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2270.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2270.json index 9c19e970b77..7d218c11107 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2270.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2270.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2270", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-20T10:55:01.403", - "lastModified": "2018-01-04T02:29:02.787", + "lastModified": "2024-11-21T01:38:47.393", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -128,6 +127,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75029", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0127.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://owncloud.org/security/advisories/CVE-2012-2270/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/111956/ownCloud-3.0.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48850", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.tele-consulting.com/advisories/TC-SA-2012-01.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75029", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2271.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2271.json index 802846d6fb3..09372119247 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2271.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2271.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2271", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T20:55:18.460", - "lastModified": "2017-12-05T02:29:03.670", + "lastModified": "2024-11-21T01:38:47.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "http://www.securityfocus.com/bid/53611", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/82086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18892/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53611", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2273.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2273.json index ae2af2138ba..78ae4cef20f 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2273.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2273.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2273", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-20T04:02:52.433", - "lastModified": "2018-10-30T16:27:20.233", + "lastModified": "2024-11-21T01:38:47.660", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -297,6 +296,29 @@ { "url": "http://www.securitytracker.com/id?1026982", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0139.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.comodo.com/home/download/release-notes.php?p=anti-malware", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026982", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2274.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2274.json index 04a1a9dea60..9ebac8fdbdd 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2274.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2274.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2274", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T23:55:00.943", - "lastModified": "2012-09-29T03:17:47.207", + "lastModified": "2024-11-21T01:38:47.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -145,6 +144,29 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://pivot-weblog.svn.sourceforge.net/viewvc/pivot-weblog?view=revision&revision=4145", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pivot-weblog.svn.sourceforge.net/viewvc/pivot-weblog?view=revision&revision=4147", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pivotx.net/page/security", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53434", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23087", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2276.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2276.json index 877953bb4a3..a5fe1a7b773 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2276.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2276.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2276", "sourceIdentifier": "security_alert@emc.com", "published": "2012-05-14T22:55:01.510", - "lastModified": "2017-08-29T01:31:34.540", + "lastModified": "2024-11-21T01:38:48.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75553", "source": "security_alert@emc.com" + }, + { + "url": "http://aluigi.org/adv/irm_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48690", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18734", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522682", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53475", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75553", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2277.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2277.json index ead9e85259e..55b25090616 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2277.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2277.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2277", "sourceIdentifier": "security_alert@emc.com", "published": "2012-05-14T22:55:01.570", - "lastModified": "2017-08-29T01:31:34.600", + "lastModified": "2024-11-21T01:38:48.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75554", "source": "security_alert@emc.com" + }, + { + "url": "http://aluigi.org/adv/irm_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48690", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18734", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522682", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53475", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75554", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2278.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2278.json index 43408722b43..e441555e849 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2278.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2278.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2278", "sourceIdentifier": "security_alert@emc.com", "published": "2012-07-13T21:55:02.373", - "lastModified": "2020-03-27T14:07:36.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:48.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -141,6 +140,10 @@ { "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0064.html", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2279.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2279.json index 87f29b238a3..8a8711b6fc3 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2279.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2279.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2279", "sourceIdentifier": "security_alert@emc.com", "published": "2012-07-13T21:55:02.467", - "lastModified": "2020-03-27T14:07:36.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:48.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -141,6 +140,10 @@ { "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0064.html", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2280.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2280.json index c6199818aba..f968824550c 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2280.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2280.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2280", "sourceIdentifier": "security_alert@emc.com", "published": "2012-07-13T21:55:02.547", - "lastModified": "2020-03-27T14:07:36.733", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:48.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -141,6 +140,10 @@ { "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0064.html", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2281.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2281.json index 4d78834a76d..70eb7891085 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2281.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2281.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2281", "sourceIdentifier": "security_alert@emc.com", "published": "2012-07-05T14:55:02.247", - "lastModified": "2013-03-22T03:10:16.110", + "lastModified": "2024-11-21T01:38:48.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 6.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.2, @@ -104,6 +103,14 @@ { "url": "http://www.securitytracker.com/id?1027220", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027220", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2282.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2282.json index b4cf863f095..86a8eef85ce 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2282.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2282.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2282", "sourceIdentifier": "security_alert@emc.com", "published": "2012-07-16T20:55:00.830", - "lastModified": "2013-03-22T03:10:16.180", + "lastModified": "2024-11-21T01:38:48.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -159,6 +158,14 @@ { "url": "http://www.securitytracker.com/id?1027242", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0063.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027242", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2283.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2283.json index 5bffa73cd9b..e121ee23a48 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2283.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2283.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2283", "sourceIdentifier": "security_alert@emc.com", "published": "2012-08-16T10:38:03.953", - "lastModified": "2020-04-21T18:02:05.200", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:48.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -194,6 +193,13 @@ "tags": [ "Broken Link" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0056.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2285.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2285.json index c79c4146f2d..d54453c51ac 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2285.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2285.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2285", "sourceIdentifier": "security_alert@emc.com", "published": "2012-08-29T22:55:01.300", - "lastModified": "2017-08-29T01:31:34.663", + "lastModified": "2024-11-21T01:38:49.003", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78110", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0184.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/85050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50393", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027448", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78110", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2288.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2288.json index ac162367b45..36e5865ae31 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2288.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2288.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2288", "sourceIdentifier": "security_alert@emc.com", "published": "2012-09-04T11:04:48.967", - "lastModified": "2013-03-06T04:59:22.143", + "lastModified": "2024-11-21T01:38:49.297", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -93,6 +92,18 @@ { "url": "http://www.securitytracker.com/id?1027459", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0219.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55330", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027459", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2289.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2289.json index df11acc9af6..93fcde6b95f 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2289.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2289.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2289", "sourceIdentifier": "security_alert@emc.com", "published": "2012-08-26T03:17:43.950", - "lastModified": "2013-02-14T04:52:28.523", + "lastModified": "2024-11-21T01:38:49.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,14 @@ { "url": "http://www.securitytracker.com/id?1027442", "source": "security_alert@emc.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0168.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027442", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2296.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2296.json index 32ca6b19a3a..afa149b3ca6 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2296.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2296.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2296", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T21:55:01.570", - "lastModified": "2017-08-29T01:31:34.790", + "lastModified": "2024-11-21T01:38:50.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -226,6 +225,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74616", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1515114", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1515120", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1515282", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/10/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74616", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2297.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2297.json index e89fd3f103c..dcf3861ba90 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2297.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2297.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2297", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T21:55:02.247", - "lastModified": "2017-08-29T01:31:34.850", + "lastModified": "2024-11-21T01:38:50.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -118,6 +117,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75180", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1547478", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1547520", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48937", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.madirish.net/content/drupal-creative-commons-6x-10-xss-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53248", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75180", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2298.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2298.json index f68331c869d..850aa77d116 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2298.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2298.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2298", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T22:55:02.033", - "lastModified": "2017-08-29T01:31:34.913", + "lastModified": "2024-11-21T01:38:50.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -192,6 +191,60 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75181", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1547352", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1547660", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/realname.git/commitdiff/41786d0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/realname.git/commitdiff/b920794", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48936", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75181", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-22xx/CVE-2012-2299.json b/CVE-2012/CVE-2012-22xx/CVE-2012-2299.json index 5a74898f523..b3dde439a2e 100644 --- a/CVE-2012/CVE-2012-22xx/CVE-2012-2299.json +++ b/CVE-2012/CVE-2012-22xx/CVE-2012-2299.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2299", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T22:55:02.080", - "lastModified": "2012-08-15T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:50.347", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -305,6 +304,63 @@ { "url": "http://www.securityfocus.com/bid/53251", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1547506", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1547508", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1547674", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/ubercart.git/commitdiff/035d2cb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/ubercart.git/commitdiff/8c61e84", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48935", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53251", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2300.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2300.json index 00aa7cfe329..13b74075c2b 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2300.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2300.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2300", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T22:55:02.127", - "lastModified": "2012-08-15T18:47:31.727", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:50.453", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -305,6 +304,63 @@ { "url": "http://www.securityfocus.com/bid/53251", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1547506", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1547508", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1547674", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/ubercart.git/commitdiff/3e7c0b8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/ubercart.git/commitdiff/dfd8658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48935", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53251", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2302.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2302.json index 12249d1e32b..9d1f9158ba4 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2302.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2302.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2302", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T21:55:01.837", - "lastModified": "2012-08-08T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:50.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -149,6 +148,37 @@ { "url": "http://www.osvdb.org/81555", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1546224", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1547686", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/sitedoc.git/commitdiff/521721c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81555", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2303.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2303.json index 417af0d35cd..5be70d8d38c 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2303.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2303.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2303", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-18T18:55:03.103", - "lastModified": "2012-08-09T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:50.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -193,6 +192,51 @@ { "url": "http://www.securityfocus.com/bid/53252", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1547730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1547736", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/spaces.git/commitdiff/cee919c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48930", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81556", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53252", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2304.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2304.json index f1889e9f71a..53ee43debe4 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2304.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2304.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2304", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-14T22:55:02.190", - "lastModified": "2017-08-29T01:31:35.007", + "lastModified": "2024-11-21T01:38:50.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -149,6 +148,47 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75183", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1547716", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1547738", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48900", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81557", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75183", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2305.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2305.json index 8d405fd3cf5..c6b7ba44c0d 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2305.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2305.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2305", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T21:55:01.947", - "lastModified": "2012-08-09T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:51.030", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,21 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1557852", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2306.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2306.json index d3626e786f6..614991026be 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2306.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2306.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2306", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T21:55:02.007", - "lastModified": "2012-09-11T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:51.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,21 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1557868", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2307.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2307.json index 81a25bf4fcd..240aa3470cc 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2307.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2307.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2307", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T21:55:02.057", - "lastModified": "2012-07-30T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:51.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -139,6 +138,21 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1557868", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2308.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2308.json index 01509170b9f..651b89304d9 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2308.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2308.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2308", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T21:55:02.150", - "lastModified": "2017-08-29T01:31:35.100", + "lastModified": "2024-11-21T01:38:51.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -107,6 +106,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75345", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1557872", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53345", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75345", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2309.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2309.json index 3e0b61e13b9..da391082f9e 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2309.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2309.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2309", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T21:55:02.210", - "lastModified": "2012-07-30T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:51.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -99,6 +98,21 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1557874", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2310.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2310.json index d3fc7223a9b..fd67bbded43 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2310.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2310.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2310", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T21:55:03.290", - "lastModified": "2012-08-08T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:51.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -208,6 +207,36 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1508098", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1508100", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1558248", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49018", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/03/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2311.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2311.json index a7f27923d02..dd953564dfb 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2311.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2311.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2311", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-11T10:15:48.107", - "lastModified": "2023-11-07T02:10:29.747", + "lastModified": "2024-11-21T01:38:51.737", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -687,6 +686,10 @@ "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://secunia.com/advisories/49014", "source": "secalert@redhat.com" @@ -736,6 +739,92 @@ { "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", "source": "secalert@redhat.com" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "secalert@redhat.com" + }, + { + "url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134012830914727&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49085", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5501", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2465", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/520827", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.php.net/ChangeLog-5.php#5.4.3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.php.net/archive/2012.php#id2012-05-08-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027022", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=61910", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff-fix-check.patch&revision=1336093719&display=1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2313.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2313.json index d9edb8f137e..1f7cb045603 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2313.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2313.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2313", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-13T10:24:55.920", - "lastModified": "2023-02-13T00:24:25.350", + "lastModified": "2024-11-21T01:38:52.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", + "baseScore": 1.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.2 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -280,6 +279,89 @@ "Exploit", "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1174.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1481.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1541.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1589.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/04/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53965", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818820", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2314.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2314.json index c4b5e154fa0..2dffe6991a5 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2314.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2314.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2314", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T22:55:01.117", - "lastModified": "2024-01-16T01:15:33.763", + "lastModified": "2024-11-21T01:38:52.223", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -102,6 +101,37 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819031", "source": "secalert@redhat.com" + }, + { + "url": "http://git.fedorahosted.org/git/?p=anaconda.git%3Ba=commit%3Bh=03ef13b625cc06873a924e0610340f8489fd92df", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080188.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/04/10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/04/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/01/15/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53486", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819031", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2315.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2315.json index d98f9a9ec06..d1a89f2258a 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2315.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2315.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2315", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:07.197", - "lastModified": "2017-08-29T01:31:35.163", + "lastModified": "2024-11-21T01:38:52.367", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -124,6 +123,53 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72112", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/78105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47424", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/23/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/23/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/27/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/04/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/04/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72112", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2316.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2316.json index be45c93e180..0e1d0a7e04a 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2316.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2316.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2316", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-09T21:55:07.417", - "lastModified": "2012-09-10T18:25:55.337", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:52.520", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -122,6 +121,52 @@ { "url": "http://www.osvdb.org/78106", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://openkm.svn.sourceforge.net/viewvc/openkm?view=revision&revision=7406", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47420", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wiki.openkm.com/index.php/Changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/23/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/23/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/27/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/04/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/04/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/78106", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2317.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2317.json index bcb5d74c5e2..e77ba735a26 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2317.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2317.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2317", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T19:55:01.437", - "lastModified": "2012-08-08T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:52.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -150,6 +149,22 @@ { "url": "http://www.ubuntu.com/usn/USN-1481-1", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581170", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/04/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/05/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1481-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2318.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2318.json index e4a8346da36..561f6f84805 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2318.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2318.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2318", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T19:55:03.020", - "lastModified": "2017-12-29T02:29:18.987", + "lastModified": "2024-11-21T01:38:52.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -347,6 +346,46 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17448", "source": "secalert@redhat.com" + }, + { + "url": "http://hg.pidgin.im/pidgin/main/rev/4d6bcb4f4ea4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://pidgin.im/news/security/?id=63", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53400", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15136503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17448", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2319.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2319.json index a2ed69dfa4b..7710c470d89 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2319.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2319.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2319", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-17T11:00:38.867", - "lastModified": "2023-02-13T00:24:34.330", + "lastModified": "2024-11-21T01:38:52.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -108,6 +107,42 @@ { "url": "https://github.com/torvalds/linux/commit/6f24f892871acc47b40dd594c63606a17c714f77", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f24f892871acc47b40dd594c63606a17c714f77", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1323.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1347.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50811", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/6f24f892871acc47b40dd594c63606a17c714f77", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2320.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2320.json index 436f63f978b..6ad3e49156f 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2320.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2320.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2320", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-18T22:55:06.013", - "lastModified": "2023-11-07T02:10:30.057", + "lastModified": "2024-11-21T01:38:53.097", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -538,6 +537,57 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49186", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81704", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53406", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2321.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2321.json index 6065c3586ea..ae3f877f908 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2321.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2321.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2321", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-18T22:55:06.060", - "lastModified": "2023-11-07T02:10:30.213", + "lastModified": "2024-11-21T01:38:53.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -969,6 +968,57 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49186", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53408", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2322.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2322.json index 9c28366ff27..d297eb39dfb 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2322.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2322.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2322", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-18T22:55:06.107", - "lastModified": "2023-11-07T02:10:30.300", + "lastModified": "2024-11-21T01:38:53.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -534,6 +533,53 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49186", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53410", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2324.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2324.json index 696e8a0dcc6..d60c17577c2 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2324.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2324.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2324", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T18:55:01.037", - "lastModified": "2012-08-29T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:53.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -397,6 +396,26 @@ { "url": "http://www.securityfocus.com/bid/53417", "source": "secalert@redhat.com" + }, + { + "url": "http://blog.mybb.com/2012/04/01/mybb-1-6-7-update-1-8-development/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53417", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2325.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2325.json index 0c0244c99e3..8a56b574766 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2325.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2325.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2325", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T18:55:03.520", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:53.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -397,6 +396,26 @@ { "url": "http://www.securityfocus.com/bid/53417", "source": "secalert@redhat.com" + }, + { + "url": "http://blog.mybb.com/2012/04/01/mybb-1-6-7-update-1-8-development/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53417", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2326.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2326.json index 054ad604bb2..c03375069bb 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2326.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2326.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2326", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T18:55:03.567", - "lastModified": "2012-08-14T13:48:01.660", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:53.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -397,6 +396,26 @@ { "url": "http://www.securityfocus.com/bid/53417", "source": "secalert@redhat.com" + }, + { + "url": "http://blog.mybb.com/2012/04/01/mybb-1-6-7-update-1-8-development/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53417", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2327.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2327.json index 7bc0adbdb7a..9ddf1230281 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2327.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2327.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2327", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T18:55:03.630", - "lastModified": "2012-08-14T13:49:59.673", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:53.883", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -397,6 +396,26 @@ { "url": "http://www.securityfocus.com/bid/53417", "source": "secalert@redhat.com" + }, + { + "url": "http://blog.mybb.com/2012/04/01/mybb-1-6-7-update-1-8-development/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/07/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53417", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2329.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2329.json index 1fb229e5a94..28f2a69f54a 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2329.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2329.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2329", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-11T10:15:48.263", - "lastModified": "2017-08-29T01:31:35.460", + "lastModified": "2024-11-21T01:38:54.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -116,6 +115,49 @@ { "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", "source": "secalert@redhat.com" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/49014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.php.net/ChangeLog-5.php#5.4.3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.php.net/archive/2012.php#id2012-05-08-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=61807", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820000", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75545", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2330.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2330.json index e3d448eb515..a36144c56e7 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2330.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2330.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2330", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T23:55:01.130", - "lastModified": "2023-02-13T04:33:24.827", + "lastModified": "2024-11-21T01:38:54.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -151,6 +150,45 @@ { "url": "https://support.f5.com/csp/article/K99038439?utm_source=f5support&%3Butm_medium=RSS", "source": "secalert@redhat.com" + }, + { + "url": "http://blog.nodejs.org/2012/05/04/version-0-6-17-stable/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49066", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/08/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/08/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/joyent/node/commit/7b3fb22", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/joyent/node/commit/c9a231d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://support.f5.com/csp/article/K99038439?utm_source=f5support&%3Butm_medium=RSS", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2331.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2331.json index d45e7c7034f..317ab9ce68e 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2331.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2331.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2331", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T23:55:02.757", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:54.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -294,6 +293,58 @@ "Exploit", "Patch" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49009", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-001.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/08/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/09/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.rul3z.de/index.php?/214-KORAMISADV2012-001-Serendipity-1.6-Backend-Cross-Site-Scripting-and-SQL-Injection-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53418", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/s9y/Serendipity/commit/264bf55719baacc069ff9d3cc35f0c349cde11e3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2332.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2332.json index e5b85bf4d99..68bbc667725 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2332.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2332.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2332", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T23:55:02.803", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:54.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -279,6 +278,43 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://blog.s9y.org/archives/240-Serendipity-1.6.1-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-001.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/08/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/09/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.rul3z.de/index.php?/214-KORAMISADV2012-001-Serendipity-1.6-Backend-Cross-Site-Scripting-and-SQL-Injection-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53418", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2333.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2333.json index 0715f753b3b..9d3456500c5 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2333.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2333.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2333", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-14T22:55:03.070", - "lastModified": "2018-01-05T02:29:32.413", + "lastModified": "2024-11-21T01:38:54.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -615,6 +614,14 @@ "url": "http://marc.info/?l=bugtraq&m=134919053717161&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=134919053717161&w=2", + "source": "secalert@redhat.com" + }, + { + "url": "http://marc.info/?l=bugtraq&m=136432043316835&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://marc.info/?l=bugtraq&m=136432043316835&w=2", "source": "secalert@redhat.com" @@ -697,6 +704,129 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75525", "source": "secalert@redhat.com" + }, + { + "url": "http://cvs.openssl.org/chngview?cn=22538", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://cvs.openssl.org/chngview?cn=22547", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081460.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134919053717161&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134919053717161&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=136432043316835&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=136432043316835&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0699.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1306.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1307.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1308.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49116", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49208", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49324", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50768", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5784", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.cert.fi/en/reports/2012/vulnerability641549.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2475", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/737740", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:073", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openssl.org/news/secadv_20120510.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53476", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820686", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75525", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2334.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2334.json index 16d580d8462..64084a1d4e2 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2334.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2334.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2334", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-19T20:55:06.600", - "lastModified": "2023-02-13T04:33:25.880", + "lastModified": "2024-11-21T01:38:54.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -256,6 +255,120 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75695", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0091.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://cgit.freedesktop.org/libreoffice/core/commit/?id=28a6558f9d3ca2dda3191f8b5b3f2378ee2533da", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://cgit.freedesktop.org/libreoffice/core/commit/?id=512401decb286ba0fc3031939b8f7de8649c502e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082168.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0705.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/46992", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/47244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49373", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49392", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/60799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://securitytracker.com/id?1027070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.libreoffice.org/advisories/cve-2012-2334/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:090", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:091", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openoffice.org/security/cves/CVE-2012-2334.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/28/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53570", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=821803", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75695", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2335.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2335.json index 50ab9a8fa49..774ec5ac37d 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2335.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2335.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2335", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-11T10:15:48.480", - "lastModified": "2023-02-13T04:33:26.177", + "lastModified": "2024-11-21T01:38:54.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -122,6 +121,60 @@ { "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", "source": "secalert@redhat.com" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "secalert@redhat.com" + }, + { + "url": "http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=blob%3Bf=sapi/cgi/cgi_main.c%3Bh=a7ac26f0#l1569", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/520827", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.php.net/archive/2012.php#id2012-05-06-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=61910", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75652", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2336.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2336.json index 1c986ff0298..a282f6e7f90 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2336.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2336.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2336", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-11T10:15:48.527", - "lastModified": "2023-11-07T02:10:30.727", + "lastModified": "2024-11-21T01:38:54.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -703,6 +702,55 @@ { "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", "source": "secalert@redhat.com" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49014", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.php.net/ChangeLog-5.php#5.4.3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.php.net/archive/2012.php#id2012-05-08-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=61910", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.php.net/patch-display.php?bug_id=61910&patch=CVE-2012-1823.patch&revision=1336251592&display=1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2337.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2337.json index 4295e03874e..8ba704d0914 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2337.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2337.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2337", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-18T18:55:01.813", - "lastModified": "2018-01-05T02:29:32.697", + "lastModified": "2024-11-21T01:38:55.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -208,6 +207,53 @@ { "url": "https://www.suse.com/security/cve/CVE-2012-2337/", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081432.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49219", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49244", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49291", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2478", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.sudo.ws/sudo/alerts/netmask.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.suse.com/security/cve/CVE-2012-2337/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2338.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2338.json index 1a61b6a748a..09c58fd6bbb 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2338.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2338.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2338", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-21T20:55:18.697", - "lastModified": "2012-05-22T17:25:51.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:55.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -117,6 +116,32 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://redmine.ulysses.fr/issues/250", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://redmine.ulysses.fr/projects/galette/repository/revisions/8c13ec159ba", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/10/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53463", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2339.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2339.json index 780a51db46b..d5f96197c29 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2339.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2339.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2339", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-21T20:55:18.930", - "lastModified": "2017-08-29T01:31:35.743", + "lastModified": "2024-11-21T01:38:55.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -189,6 +188,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75503", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1568156", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1569482", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/glossary.git/commitdiff/c6cc3ac", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49074", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/10/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/11/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/15/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53440", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2340.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2340.json index 591d135bb50..bbc5954ebba 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2340.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2340.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2340", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-21T20:55:18.977", - "lastModified": "2012-06-28T03:43:29.117", + "lastModified": "2024-11-21T01:38:55.427", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -133,6 +132,51 @@ { "url": "http://www.securityfocus.com/bid/53441", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1569352", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1569508", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/contact_forms.git/commitdiff/d11ce2b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49070", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/10/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/11/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/15/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53441", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2341.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2341.json index b878735586d..faf8b04e228 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2341.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2341.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2341", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-18T22:55:06.170", - "lastModified": "2017-12-29T02:29:19.050", + "lastModified": "2024-11-21T01:38:55.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -132,6 +131,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75504", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1243604", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1569512", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/10/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/11/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/15/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53452", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75504", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2351.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2351.json index 1fe39de0353..b43655b98cd 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2351.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2351.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2351", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-12T20:55:15.670", - "lastModified": "2016-12-07T17:43:10.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:55.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -465,8 +464,8 @@ "url": "http://gitorious.org/mahara/mahara/commit/f07be6020e70fa8f53cd77fdcd63e7fd7ff8aaea", "source": "secalert@redhat.com", "tags": [ - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -498,6 +497,44 @@ "tags": [ "Issue Tracking" ] + }, + { + "url": "http://gitorious.org/mahara/mahara/commit/f07be6020e70fa8f53cd77fdcd63e7fd7ff8aaea", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2467", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/11/9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/12/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.launchpad.net/mahara/+bug/932909", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2352.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2352.json index 1300a4340f6..1a56e0e857e 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2352.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2352.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2352", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-31T17:55:04.887", - "lastModified": "2012-08-14T03:37:20.707", + "lastModified": "2024-11-21T01:38:56.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -908,6 +907,52 @@ { "url": "https://www.sympa.org/distribution/latest-stable/NEWS", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/49045", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49237", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/11/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/12/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/12/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://sourcesup.renater.fr/scm/viewvc.php/branches/sympa-6.0-branch/wwsympa/wwsympa.fcgi.in?root=sympa&r1=6706&r2=7358&pathrev=7358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.sympa.org/distribution/latest-stable/NEWS", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2353.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2353.json index 63a012e10eb..6748fffd779 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2353.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2353.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2353", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:55.767", - "lastModified": "2020-12-01T14:43:58.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:56.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -129,6 +128,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-31923", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2354.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2354.json index fe8174edcb8..59302b056b5 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2354.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2354.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2354", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:55.813", - "lastModified": "2023-02-13T04:33:28.293", + "lastModified": "2024-11-21T01:38:56.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -129,6 +128,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=48e03792ca8faa2d781f9ef74606f3b3f0d3baec", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2355.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2355.json index 0f9c6fe51f8..70980636bf0 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2355.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2355.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2355", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:55.860", - "lastModified": "2020-12-01T14:43:58.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:56.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -129,6 +128,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-32240", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2356.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2356.json index 36f028b26cf..38b768f408d 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2356.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2356.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2356", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:55.907", - "lastModified": "2020-12-01T14:43:58.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:56.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -129,6 +128,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-32239", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2357.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2357.json index ba6d2d44b00..f286b8ef23a 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2357.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2357.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2357", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:55.940", - "lastModified": "2023-02-13T04:33:29.087", + "lastModified": "2024-11-21T01:38:56.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -129,6 +128,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=895e76ea51c462c18ad66e0761ad76cd26a63ecf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2358.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2358.json index 50ba193072e..10ff770fde9 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2358.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2358.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2358", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:55.987", - "lastModified": "2020-12-01T14:43:58.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:56.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -184,6 +183,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-31811", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2359.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2359.json index e202c3296f9..4558df61ba9 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2359.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2359.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2359", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:56.033", - "lastModified": "2023-02-13T00:24:34.883", + "lastModified": "2024-11-21T01:38:56.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -184,6 +183,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=0f75e1e6272db0303abc8e27362e5c3a1344b82f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2360.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2360.json index db3f34557f5..dabff503997 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2360.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2360.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2360", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:56.080", - "lastModified": "2020-12-01T14:43:58.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:56.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -184,6 +183,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-32018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2361.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2361.json index 6a359accde8..1d763d43db3 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2361.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2361.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2361", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:56.173", - "lastModified": "2020-12-01T14:43:58.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:57.020", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -184,6 +183,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-31694", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2362.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2362.json index 82462c5cd08..df1f7fa889c 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2362.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2362.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2362", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:56.237", - "lastModified": "2023-02-13T00:24:46.683", + "lastModified": "2024-11-21T01:38:57.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -167,6 +166,22 @@ { "url": "https://moodle.org/mod/forum/discuss.php?d=203052", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=038131c8b5614f18c14d964dc53b6960ae6c30d8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82069", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=203052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2363.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2363.json index 0e268fb7dae..e061550f404 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2363.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2363.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2363", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:56.313", - "lastModified": "2020-12-01T14:43:53.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:57.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -159,6 +158,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=refs%2Fheads%2FMOODLE_19_STABLE&st=commit&s=MDL-31746", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2364.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2364.json index 81e27ec1081..959311c7573 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2364.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2364.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2364", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:56.377", - "lastModified": "2023-02-13T04:33:29.637", + "lastModified": "2024-11-21T01:38:57.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -184,6 +183,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=ce4126c7a9e07dd0514f7ac297b5e60cad0b8d20", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2365.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2365.json index d578ba33863..5a20b10ad4c 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2365.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2365.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2365", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:56.423", - "lastModified": "2020-12-01T14:43:58.053", + "lastModified": "2024-11-21T01:38:57.450", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -192,6 +191,22 @@ { "url": "https://moodle.org/mod/forum/discuss.php?d=203055", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-31691", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82072", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=203055", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2366.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2366.json index 6b38d4255fb..ecd7386ff79 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2366.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2366.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2366", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:56.470", - "lastModified": "2020-12-01T14:43:58.053", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:57.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -129,6 +128,14 @@ { "url": "http://openwall.com/lists/oss-security/2012/05/23/2", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-31763", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2367.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2367.json index 8d223c4f742..ebf765fff69 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2367.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2367.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2367", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-21T03:38:56.500", - "lastModified": "2020-12-01T14:43:58.053", + "lastModified": "2024-11-21T01:38:57.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -291,6 +290,26 @@ { "url": "https://moodle.org/mod/forum/discuss.php?d=203057", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-18335", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/23/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82074", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=203057", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2368.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2368.json index 5078d5b2613..5ed97a8c2d3 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2368.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2368.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2368", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T20:55:02.037", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:57.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ "Exploit", "Patch" ] + }, + { + "url": "http://secunia.com/advisories/48993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://projects.bytemark.co.uk/projects/symbiosis/repository/diff?rev=1327&rev_to=1322", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2369.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2369.json index 291ea0f73e7..e42239bbb6e 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2369.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2369.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2369", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-23T20:55:01.520", - "lastModified": "2018-01-06T02:29:38.550", + "lastModified": "2024-11-21T01:38:57.943", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +102,25 @@ { "url": "http://www.debian.org/security/2012/dsa-2476", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/16/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201207-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2476", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2370.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2370.json index 3696f53b071..0cd87c8a1b7 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2370.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2370.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2370", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T20:55:03.723", - "lastModified": "2023-02-13T04:33:30.547", + "lastModified": "2024-11-21T01:38:58.047", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -171,6 +170,70 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75578", "source": "secalert@redhat.com" + }, + { + "url": "http://git.gnome.org/browse/gdk-pixbuf/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.gnome.org/browse/gdk-pixbuf/commit/?id=4f0f465f991cd454d03189497f923eb40c170c22", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://git.gnome.org/browse/gdk-pixbuf/commit/?id=b1bb3053856aede37d473c92f0e5a10e29f10516", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49125", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49715", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201206-20.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/15/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/15/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53548", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/ubuntu/+source/gdk-pixbuf/+bug/681150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75578", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2371.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2371.json index 5831d1fe232..5e0072df629 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2371.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2371.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2371", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T20:55:04.740", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:58.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,39 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.org/files/112658/WordPress-WP-FaceThumb-Gallery-0.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49143", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/support/topic/plugin-wp-facethumb-reflected-xss-vulnerability-cwe-79", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/15/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/16/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53497", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2373.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2373.json index 8deea3ddc58..9aead7c3433 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2373.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2373.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2373", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-09T10:29:46.917", - "lastModified": "2023-02-13T00:24:52.950", + "lastModified": "2024-11-21T01:38:58.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", + "baseScore": 4.0, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -162,6 +161,41 @@ "tags": [ "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=26c191788f18129af0eb32a358cdaea0c7479626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0743.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ubuntu.com/usn/usn-1529-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/18/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822821", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/26c191788f18129af0eb32a358cdaea0c7479626", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2374.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2374.json index 1d2418a3bc0..225a2e8e6d5 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2374.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2374.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2374", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-23T20:55:01.727", - "lastModified": "2012-09-05T03:23:03.897", + "lastModified": "2024-11-21T01:38:58.503", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -140,6 +139,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/18/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/18/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.tornadoweb.org/documentation/releases/v2.2.1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2375.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2375.json index e0f9c5bb84f..bf5f629e424 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2375.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2375.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2375", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-13T10:24:55.967", - "lastModified": "2023-11-07T02:10:32.753", + "lastModified": "2024-11-21T01:38:58.613", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:C", + "baseScore": 4.6, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.2, @@ -144,6 +143,38 @@ "Exploit", "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=20e0fa98b751facf9a1101edaefbc19c82616a68", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1580.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/18/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822869", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2376.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2376.json index 9d5533696f4..09afcc8b220 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2376.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2376.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2376", "sourceIdentifier": "secalert@redhat.com", "published": "2012-05-21T15:55:02.117", - "lastModified": "2017-08-29T01:31:35.960", + "lastModified": "2024-11-21T01:38:58.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -686,6 +685,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75778", "source": "secalert@redhat.com" + }, + { + "url": "http://isc.sans.edu/diary.html?storyid=13255", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/20/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18861/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027089", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823464", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75778", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2380.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2380.json index b2da9e57060..f9589d47952 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2380.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2380.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2380", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-26T10:23:41.973", - "lastModified": "2013-10-04T15:11:09.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:59.240", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -226,6 +225,10 @@ { "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-06/0376.html", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-06/0376.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2381.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2381.json index 2852ad0e79d..17476f4a59c 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2381.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2381.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2381", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-26T10:23:42.020", - "lastModified": "2013-10-03T19:45:44.263", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:59.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -226,6 +225,10 @@ { "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-06/0377.html", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-06/0377.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2383.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2383.json index a664b0c8772..186d4d907bb 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2383.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2383.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2383", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-13T10:24:56.013", - "lastModified": "2023-02-13T00:25:05.843", + "lastModified": "2024-11-21T01:38:59.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -163,6 +162,42 @@ "Exploit", "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed8cd3b2cd61004cab85380c52b1817aca1ca49b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1156.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/22/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53971", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824176", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/ed8cd3b2cd61004cab85380c52b1817aca1ca49b", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2384.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2384.json index 8e14c0e7d60..d7ec861bc07 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2384.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2384.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2384", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-13T10:24:56.060", - "lastModified": "2023-02-13T04:33:32.817", + "lastModified": "2024-11-21T01:38:59.577", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -158,6 +157,37 @@ "tags": [ "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=44afb3a04391a74309d16180d1e4f8386fdfa745", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=139447903326211&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/22/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53971", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824178", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2385.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2385.json index d553ef3bb72..d1d2034bb53 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2385.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2385.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2385", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:03.673", - "lastModified": "2017-08-29T01:31:36.117", + "lastModified": "2024-11-21T01:38:59.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -164,6 +163,53 @@ { "url": "https://github.com/keithw/mosh/issues/271", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082766.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082814.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082850.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53646", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823943", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75779", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/keithw/mosh/blob/master/ChangeLog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/keithw/mosh/commit/9791768705528e911bfca6c4d8aa88139035060e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/keithw/mosh/issues/271", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2386.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2386.json index 7283ebb2e59..67675be6c5f 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2386.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2386.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2386", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-07T10:21:13.213", - "lastModified": "2023-02-13T04:33:33.950", + "lastModified": "2024-11-21T01:38:59.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -144,6 +143,71 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://0x1byte.blogspot.com/2011/04/php-phar-extension-heap-overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=158d8a6b088662ce9d31e0c777c6ebe90efdc854", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/05/22/10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5501", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=61065", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823594", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2387.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2387.json index 9dc59d02100..b3a4915a34a 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2387.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2387.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2387", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-20T18:55:03.090", - "lastModified": "2012-08-21T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:38:59.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/05/22/11", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/18/15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/21/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/22/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2388.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2388.json index 865a4241623..8bdefd93606 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2388.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2388.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2388", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T21:55:02.610", - "lastModified": "2017-08-29T01:31:36.210", + "lastModified": "2024-11-21T01:39:00.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -292,6 +291,62 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76013", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82587", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49315", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49336", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49370", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/55051", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2483", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53752", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.strongswan.org/blog/2012/05/31/strongswan-4.6.4-released-%28cve-2012-2388%29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76013", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2389.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2389.json index 51bed7afdd8..9a978f777a8 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2389.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2389.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2389", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-21T15:55:12.567", - "lastModified": "2013-04-19T03:21:41.637", + "lastModified": "2024-11-21T01:39:00.153", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -99,6 +98,34 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824660", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081983.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:168", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/23/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/23/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/23/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=740964", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824660", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2390.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2390.json index b89a147250f..5b7818c2820 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2390.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2390.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2390", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-13T10:24:56.093", - "lastModified": "2023-02-13T04:33:34.320", + "lastModified": "2024-11-21T01:39:00.267", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -144,6 +143,38 @@ "Exploit", "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c50ac050811d6485616a193eb0f37bfbd191cc89", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/23/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1515-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1535-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824345", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/c50ac050811d6485616a193eb0f37bfbd191cc89", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2392.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2392.json index 083cf08e98c..af48470e6b8 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2392.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2392.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2392", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-30T10:15:04.967", - "lastModified": "2017-09-19T01:34:56.637", + "lastModified": "2024-11-21T01:39:00.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -227,6 +226,57 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15604", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/49226", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:015", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:042", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-08.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6805", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7118", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7119", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7124", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15604", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2393.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2393.json index 6762960dd21..9f9ac613b29 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2393.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2393.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2393", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-30T10:15:05.060", - "lastModified": "2017-09-19T01:34:56.697", + "lastModified": "2024-11-21T01:39:00.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -226,6 +225,56 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15558", "source": "secalert@redhat.com" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-diameter.c?r1=42200&r2=42199&pathrev=42200", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=42200", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49226", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:015", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:042", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53652", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-09.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15558", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2394.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2394.json index cfd57f2ab5e..da4c70cf9b4 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2394.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2394.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2394", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-30T10:15:05.107", - "lastModified": "2012-11-06T05:11:46.187", + "lastModified": "2024-11-21T01:39:00.643", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -338,6 +337,48 @@ { "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7221", "source": "secalert@redhat.com" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=42393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49226", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:015", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:042", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53653", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-10.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7221", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2395.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2395.json index 9de2f322cfc..837fa0a2b1e 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2395.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2395.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2395", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-16T00:55:07.310", - "lastModified": "2023-02-13T04:33:34.770", + "lastModified": "2024-11-21T01:39:00.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -111,6 +110,46 @@ { "url": "https://github.com/cobbler/cobbler/issues/141", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/23/18", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/23/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82458", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53666", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/ubuntu/+source/cobbler/+bug/978999", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/cobbler/cobbler/commit/6d9167e5da44eca56bdf42b5776097a6779aaadf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/cobbler/cobbler/issues/141", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2396.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2396.json index 650a2240f58..cf06e03a77b 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2396.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2396.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2396", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-19T21:55:01.287", - "lastModified": "2017-12-13T02:29:07.983", + "lastModified": "2024-11-21T01:39:00.893", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "http://cwe.mitre.org/data/definitions/369.html 'CWE-369: Divide By Zero'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +85,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15615", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18757/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75038", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15615", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "http://cwe.mitre.org/data/definitions/369.html 'CWE-369: Divide By Zero'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2397.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2397.json index bcd5de7049b..084089ef6ab 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2397.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2397.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2397", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-20T10:55:01.433", - "lastModified": "2017-12-13T02:29:08.060", + "lastModified": "2024-11-21T01:39:01.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75030", "source": "cve@mitre.org" + }, + { + "url": "http://owncloud.org/security/advisories/CVE-2012-2397/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48850", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75030", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2398.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2398.json index 69ca7caea60..949d0f7df1c 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2398.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2398.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2398", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-20T10:55:01.480", - "lastModified": "2013-10-07T16:29:52.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:01.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,25 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", "source": "cve@mitre.org" + }, + { + "url": "http://owncloud.org/security/advisories/cve-2012-2398/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48850", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-23xx/CVE-2012-2399.json b/CVE-2012/CVE-2012-23xx/CVE-2012-2399.json index 09ac84bd807..af0c3f10e82 100644 --- a/CVE-2012/CVE-2012-23xx/CVE-2012-2399.json +++ b/CVE-2012/CVE-2012-23xx/CVE-2012-2399.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2399", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-21T23:55:01.237", - "lastModified": "2017-12-19T02:29:39.817", + "lastModified": "2024-11-21T01:39:01.377", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -531,6 +530,70 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75210", "source": "cve@mitre.org" + }, + { + "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/swfupload/swfupload.swf?rev=20503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN25280162/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-002110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://make.wordpress.org/core/2013/06/21/secure-swfupload/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/120746/SWFUpload-Content-Spoofing-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.com/files/122399/tinymce11-xss.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2013/Mar/110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2470", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2013/07/18/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/91134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53192", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75210", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2400.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2400.json index 90099218c3d..307f78fdc75 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2400.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2400.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2400", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-21T23:55:01.283", - "lastModified": "2017-12-19T02:29:39.910", + "lastModified": "2024-11-21T01:39:01.557", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -499,6 +498,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75209", "source": "cve@mitre.org" + }, + { + "url": "http://core.trac.wordpress.org/changeset/20499/branches/3.3/wp-includes/js/swfobject.js", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81460", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2470", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53192", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75209", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2401.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2401.json index f200319e4b1..98bec0079e0 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2401.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2401.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2401", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-21T23:55:01.330", - "lastModified": "2017-12-19T02:29:39.987", + "lastModified": "2024-11-21T01:39:01.727", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -560,6 +559,53 @@ { "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/", "source": "cve@mitre.org" + }, + { + "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49138", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2470", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.plupload.com/punbb/viewtopic.php?id=1685", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53192", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75208", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2402.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2402.json index 1626e129091..d128081302d 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2402.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2402.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2402", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-21T23:55:01.377", - "lastModified": "2017-12-19T02:29:40.083", + "lastModified": "2024-11-21T01:39:01.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -507,6 +506,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75207", "source": "cve@mitre.org" + }, + { + "url": "http://core.trac.wordpress.org/changeset/20526/branches/3.3/wp-admin/plugins.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81462", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2470", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53192", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75090", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75207", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2403.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2403.json index 78f96890a13..a8c3d78c2dd 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2403.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2403.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2403", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-21T23:55:01.423", - "lastModified": "2017-12-19T02:29:40.177", + "lastModified": "2024-11-21T01:39:02.037", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -511,6 +510,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75206", "source": "cve@mitre.org" + }, + { + "url": "http://core.trac.wordpress.org/changeset/20493/branches/3.3/wp-includes/capabilities.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://core.trac.wordpress.org/changeset/20493/branches/3.3/wp-includes/formatting.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81463", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2470", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53192", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75093", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75206", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2404.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2404.json index f87de98fe88..31e6488e38b 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2404.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2404.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2404", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-21T23:55:01.470", - "lastModified": "2017-12-19T02:29:40.287", + "lastModified": "2024-11-21T01:39:02.200", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -507,6 +506,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75202", "source": "cve@mitre.org" + }, + { + "url": "http://core.trac.wordpress.org/changeset/20486/branches/3.3/wp-comments-post.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81464", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2470", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53192", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75202", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2405.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2405.json index f1d6839e1b3..c1702305de2 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2405.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2405.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2405", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-22T18:55:04.607", - "lastModified": "2017-12-14T02:29:03.153", + "lastModified": "2024-11-21T01:39:02.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -121,6 +120,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75201", "source": "cve@mitre.org" + }, + { + "url": "http://gallery.menalto.com/gallery_3_0_3_and_gallery_2_3_2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=812045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75201", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2406.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2406.json index dda5181c30d..ca67abcdc4e 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2406.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2406.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2406", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-18T18:55:01.957", - "lastModified": "2017-08-29T01:31:36.273", + "lastModified": "2024-11-21T01:39:02.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -350,6 +349,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75647", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81943", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.real.com/realplayer/security/05152012_player/en/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75647", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2407.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2407.json index 155724e1eb8..d9d6b205709 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2407.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2407.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2407", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-12T10:38:33.523", - "lastModified": "2017-08-29T01:31:36.397", + "lastModified": "2024-11-21T01:39:02.653", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -318,6 +317,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78384", "source": "cve@mitre.org" + }, + { + "url": "http://service.real.com/realplayer/security/09072012_player/en/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78384", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2408.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2408.json index a52c8effbe3..aa2ff7b713c 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2408.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2408.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2408", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-12T10:38:33.617", - "lastModified": "2017-08-29T01:31:36.523", + "lastModified": "2024-11-21T01:39:02.793", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -318,6 +317,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78385", "source": "cve@mitre.org" + }, + { + "url": "http://service.real.com/realplayer/security/09072012_player/en/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78385", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2409.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2409.json index 35b49600fe6..4cd037463af 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2409.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2409.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2409", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-12T10:38:33.663", - "lastModified": "2017-08-29T01:31:36.587", + "lastModified": "2024-11-21T01:39:02.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -318,6 +317,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78386", "source": "cve@mitre.org" + }, + { + "url": "http://service.real.com/realplayer/security/09072012_player/en/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78386", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2411.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2411.json index 062e1558f13..ff2ca45d4ba 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2411.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2411.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2411", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-18T18:55:01.987", - "lastModified": "2017-08-29T01:31:36.710", + "lastModified": "2024-11-21T01:39:03.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -347,6 +346,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75648", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81944", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49193", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://service.real.com/realplayer/security/05152012_player/en/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75648", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2414.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2414.json index adfc2f56cb1..6f088a7da17 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2414.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2414.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2414", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-30T20:55:02.607", - "lastModified": "2017-12-14T02:29:03.230", + "lastModified": "2024-11-21T01:39:03.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -891,6 +890,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75100", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2012-004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48891", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48941", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2460", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53206", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75100", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2415.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2415.json index e177d2aea06..648453dc691 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2415.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2415.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2415", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-30T20:55:02.657", - "lastModified": "2017-12-14T02:29:03.340", + "lastModified": "2024-11-21T01:39:03.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -891,6 +890,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75102", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2012-005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48891", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48941", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2460", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53210", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026962", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75102", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2416.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2416.json index 0aa6f3359c1..07029fac652 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2416.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2416.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2416", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-30T20:55:02.703", - "lastModified": "2017-12-14T02:29:03.450", + "lastModified": "2024-11-21T01:39:03.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -887,6 +886,42 @@ { "url": "https://issues.asterisk.org/jira/browse/ASTERISK-19770", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2012-006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81456", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48891", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53205", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026963", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.asterisk.org/jira/browse/ASTERISK-19770", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2417.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2417.json index 70de211681c..50564faac4e 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2417.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2417.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2417", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-17T03:41:40.763", - "lastModified": "2017-08-29T01:31:36.867", + "lastModified": "2024-11-21T01:39:04.053", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -235,6 +234,69 @@ { "url": "https://hermes.opensuse.org/messages/15083589", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081713.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081759.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081789.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49263", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2502", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:117", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/25/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53687", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/pycrypto/+bug/985164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75871", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/dlitz/pycrypto/blob/373ea760f21701b162e8c4912a66928ee30d401a/ChangeLog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15083589", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2418.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2418.json index 2392b4aba63..b30f9fd4f27 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2418.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2418.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2418", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T20:55:01.197", - "lastModified": "2021-07-23T15:12:10.537", + "lastModified": "2024-11-21T01:39:04.213", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 6.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.2, @@ -120,6 +119,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75170", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80820", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/232979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522138", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75170", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2419.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2419.json index 33fb35ca7b3..7fd25d74863 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2419.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2419.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2419", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T20:55:01.230", - "lastModified": "2021-07-23T15:12:10.537", + "lastModified": "2024-11-21T01:39:04.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:P", + "baseScore": 1.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.2, @@ -116,6 +115,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75171", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/232979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522138", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75171", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2420.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2420.json index 14dc5f1df44..d4d5cb6d716 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2420.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2420.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2420", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T20:55:01.293", - "lastModified": "2021-07-23T15:12:10.537", + "lastModified": "2024-11-21T01:39:04.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 1.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.8 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.2, @@ -120,6 +119,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74548", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80820", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/232979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522138", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74548", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2421.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2421.json index 594b9f5918b..f9a9ebdf6d5 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2421.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2421.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2421", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T20:55:01.340", - "lastModified": "2021-07-23T15:12:10.537", + "lastModified": "2024-11-21T01:39:04.643", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 1.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.8 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.2, @@ -113,6 +112,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75172", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/232979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75172", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2422.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2422.json index da74ae66de5..3c61bda40ce 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2422.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2422.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2422", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T20:55:01.387", - "lastModified": "2017-12-19T02:29:40.597", + "lastModified": "2024-11-21T01:39:04.787", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -104,6 +103,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75173", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/232979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522139", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75173", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2423.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2423.json index 6f5dc05eebc..76ccacfa92f 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2423.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2423.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2423", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T20:55:01.433", - "lastModified": "2021-07-23T15:12:10.537", + "lastModified": "2024-11-21T01:39:04.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 1.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.8 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.2, @@ -116,6 +115,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75174", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/232979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522139", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75174", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2424.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2424.json index 246621178d8..cef7cdc0032 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2424.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2424.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2424", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T20:55:01.480", - "lastModified": "2021-07-23T15:12:10.537", + "lastModified": "2024-11-21T01:39:05.063", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\nCWE-476: NULL Pointer Dereference\r\n\r\n", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:P", + "baseScore": 1.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.2, @@ -124,6 +122,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75175", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/232979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522138", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522139", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75175", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\nCWE-476: NULL Pointer Dereference\r\n\r\n" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2425.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2425.json index 07d5cce95f3..006fe0906c2 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2425.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2425.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2425", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-25T20:55:01.527", - "lastModified": "2021-07-23T15:12:10.537", + "lastModified": "2024-11-21T01:39:05.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:P", + "baseScore": 1.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 1.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.2, @@ -127,6 +126,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75176", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/111403/Intuit-Help-System-Protocol-File-Retrieval.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/232979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522138", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522139", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75176", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2426.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2426.json index b873c82b962..9e4ab839513 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2426.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2426.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2426", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-05-25T19:55:01.557", - "lastModified": "2012-05-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:05.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Patch", "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-145-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2427.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2427.json index 6c182f122bb..7caea8071e8 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2427.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2427.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2427", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-05-25T19:55:01.680", - "lastModified": "2012-05-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:05.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Patch", "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-145-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2428.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2428.json index e8131da52f9..ccffe8b63ab 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2428.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2428.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2428", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-05-25T19:55:01.727", - "lastModified": "2012-05-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:05.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Patch", "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-145-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2429.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2429.json index dc27c915783..29f18afa89f 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2429.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2429.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2429", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-05-25T19:55:01.773", - "lastModified": "2012-05-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:05.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ "Patch", "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-145-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2435.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2435.json index b424d9cd015..184aeba6fa3 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2435.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2435.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2435", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T20:55:01.327", - "lastModified": "2012-05-29T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:05.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -202,6 +201,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://forums.pligg.com/downloads.php?do=file&id=15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pligg.svn.sourceforge.net/viewvc/pligg?view=revision&revision=2440", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2436.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2436.json index 23f9b27b7aa..5c69a10945d 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2436.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2436.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2436", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T20:55:01.797", - "lastModified": "2017-08-29T01:31:37.007", + "lastModified": "2024-11-21T01:39:05.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -245,6 +244,64 @@ { "url": "https://www.htbridge.com/advisory/HTB23089", "source": "cve@mitre.org" + }, + { + "url": "http://forums.pligg.com/downloads.php?do=file&id=15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pligg.svn.sourceforge.net/viewvc/pligg/trunk/modules/admin_language/admin_language_main.php?r1=2442&r2=2441&pathrev=2442", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pligg.svn.sourceforge.net/viewvc/pligg?view=revision&revision=2440", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pligg.svn.sourceforge.net/viewvc/pligg?view=revision&revision=2441", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pligg.svn.sourceforge.net/viewvc/pligg?view=revision&revision=2452", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/45431", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/secunia_research/2012-18/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53625", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53662", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75764", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75834", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23089", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2439.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2439.json index f8a1eec4001..f469bc36b58 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2439.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2439.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2439", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-28T00:55:01.267", - "lastModified": "2012-09-21T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:06.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/928795", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2440.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2440.json index c98572cae25..02ea13143a5 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2440.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2440.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2440", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-28T00:55:01.313", - "lastModified": "2017-08-29T01:31:37.163", + "lastModified": "2024-11-21T01:39:06.583", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74624", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/834723", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74624", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2441.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2441.json index ff4ee963cf1..c7e7016436f 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2441.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2441.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2441", "sourceIdentifier": "cve@mitre.org", "published": "2012-04-28T00:55:01.360", - "lastModified": "2022-02-01T16:53:34.140", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:06.727", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -128,6 +127,62 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://arstechnica.com/business/news/2012/04/backdoor-in-mission-critical-hardware-threatens-power-traffic-control-systems.ars", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Apr/277", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/889195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.ruggedcom.com/productbulletin/ros-security-page/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-116-01A.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.wired.com/threatlevel/2012/04/ruggedcom-backdoor/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75244", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2442.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2442.json index b7e1851d24b..4897d311495 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2442.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2442.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2442", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T21:55:03.633", - "lastModified": "2017-08-29T01:31:37.210", + "lastModified": "2024-11-21T01:39:06.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75235", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81498", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/112295/Nokia-CP-Suite-Video-Manager-7.1.180.64-Denial-Of-Service.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18795", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53290", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75235", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2446.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2446.json index 775ace22e9b..fccb95b3042 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2446.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2446.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2446", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-09T18:55:00.917", - "lastModified": "2012-07-10T14:05:50.947", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:07.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://infosec42.blogspot.com/2012/07/cve-2012-2446-cve-2012-2447-cve-2012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/763795", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2447.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2447.json index 9eff36a9de7..3da3e34d72a 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2447.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2447.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2447", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-09T18:55:00.980", - "lastModified": "2012-07-10T14:10:35.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:07.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://infosec42.blogspot.com/2012/07/cve-2012-2446-cve-2012-2447-cve-2012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/763795", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2448.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2448.json index f9631cfb71b..594c4141fa1 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2448.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2448.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2448", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-04T16:55:01.497", - "lastModified": "2017-12-14T02:29:03.590", + "lastModified": "2024-11-21T01:39:07.280", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -184,6 +183,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75375", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81693", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027018", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75375", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2449.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2449.json index b3102b17757..4e89dddceb0 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2449.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2449.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2449", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-04T16:55:01.543", - "lastModified": "2017-12-14T02:29:03.653", + "lastModified": "2024-11-21T01:39:07.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -279,6 +278,34 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16863", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81694", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53369", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027019", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75376", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16863", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2450.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2450.json index 36eeabe119a..d0c6ff4eba9 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2450.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2450.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2450", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-04T16:55:01.577", - "lastModified": "2017-12-14T02:29:03.747", + "lastModified": "2024-11-21T01:39:07.567", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -277,6 +276,37 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16852", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81695", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53369", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027019", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75377", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16852", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2451.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2451.json index dd28f67e6a7..ffa979d32ad 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2451.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2451.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2451", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-27T21:55:03.097", - "lastModified": "2017-08-29T01:31:37.273", + "lastModified": "2024-11-21T01:39:07.727", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -123,6 +122,57 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75328", "source": "cve@mitre.org" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080713.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080716.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081207.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48990", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/02/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81671", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53361", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1543-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bitbucket.org/shlomif/perl-config-inifiles/changeset/a08fa26f4f59", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818386", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75328", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2459.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2459.json index af7c4c6392c..4b15a5b4809 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2459.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2459.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2459", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:03.307", - "lastModified": "2020-03-18T17:37:42.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:08.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -147,6 +146,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://bitcointalk.org/?topic=81749", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=415973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://en.bitcoin.it/wiki/CVEs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2469.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2469.json index caca094bc38..35edcbd904b 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2469.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2469.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2469", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T17:55:00.917", - "lastModified": "2013-03-23T03:10:38.957", + "lastModified": "2024-11-21T01:39:08.293", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -128,6 +127,21 @@ { "url": "http://www.securitytracker.com/id?1027352", "source": "ykramarz@cisco.com" + }, + { + "url": "http://www.4salesbyself.com/troubleshooting-random-nexus-reboots.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/release/notes/52_nx-os_release_note.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027352", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2472.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2472.json index 1e8761b05be..6f007cfe5d0 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2472.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2472.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2472", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T17:55:00.963", - "lastModified": "2023-08-15T14:28:06.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:08.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -175,6 +174,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/security/asa/asa84/release/notes/asarn84.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2474.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2474.json index 626905ac174..8cdf2aaea0e 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2474.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2474.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2474", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T17:55:01.010", - "lastModified": "2023-08-15T14:28:06.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:08.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -173,6 +172,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/web/software/280775065/45357/ASA-825-Interim-Release-Notes.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2486.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2486.json index 3f55b797e0d..5c45f7cbdea 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2486.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2486.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2486", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-07-12T10:34:42.257", - "lastModified": "2018-10-30T16:26:48.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:08.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 8.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.5, @@ -712,6 +711,34 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2488.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2488.json index 364e04ebffe..fe7d48edc0d 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2488.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2488.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2488", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-05-31T10:17:38.763", - "lastModified": "2012-08-25T03:27:12.130", + "lastModified": "2024-11-21T01:39:08.737", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120530-iosxr\r\n\r\n'Affected Products\r\nThis vulnerability affects IOS XR Software version 4.2.0 running on the Cisco ASR 9000 Series RSP440. It also affects IOS XR Software versions 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 running on the CRS Performance Route Processor.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -156,6 +154,26 @@ { "url": "http://www.securitytracker.com/id?1027104", "source": "ykramarz@cisco.com" + }, + { + "url": "http://secunia.com/advisories/49329", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120530-iosxr", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027104", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120530-iosxr\r\n\r\n'Affected Products\r\nThis vulnerability affects IOS XR Software version 4.2.0 running on the Cisco ASR 9000 Series RSP440. It also affects IOS XR Software versions 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 running on the CRS Performance Route Processor.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2490.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2490.json index 61cd2c27d41..b0e1807693f 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2490.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2490.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2490", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T17:55:01.057", - "lastModified": "2012-08-07T19:47:38.593", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:08.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/voice_ip_comm/cipc/8_5/english/release_notes/CIPC8x_RN.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2493.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2493.json index 3d2f0d9f8b7..b3d82992c66 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2493.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2493.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2493", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-06-20T20:55:02.137", - "lastModified": "2012-06-21T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:08.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -267,6 +266,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2494.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2494.json index ed0bf6b36c6..2e19024d2da 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2494.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2494.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2494", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-06-20T20:55:02.543", - "lastModified": "2012-06-21T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:09.047", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -153,6 +152,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2495.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2495.json index 7130dd177a2..3b0e8abecfd 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2495.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2495.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2495", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-06-20T20:55:02.590", - "lastModified": "2012-06-21T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:09.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -164,6 +163,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2496.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2496.json index a3903339ab2..3545a55c9b0 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2496.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2496.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2496", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-06-20T20:55:02.637", - "lastModified": "2012-08-24T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:09.257", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2498.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2498.json index 4d2e0f4d7b6..309fdfecbaf 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2498.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2498.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2498", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T17:55:01.103", - "lastModified": "2012-08-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:09.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -98,6 +97,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-24xx/CVE-2012-2499.json b/CVE-2012/CVE-2012-24xx/CVE-2012-2499.json index 338a1fa1087..eb44c9e4c99 100644 --- a/CVE-2012/CVE-2012-24xx/CVE-2012-2499.json +++ b/CVE-2012/CVE-2012-24xx/CVE-2012-2499.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2499", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T17:55:01.133", - "lastModified": "2012-08-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:09.477", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2500.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2500.json index 9a73653b6eb..42d1e06ec48 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2500.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2500.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2500", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-08-06T17:55:01.180", - "lastModified": "2012-08-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:09.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -88,6 +87,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect30/release/notes/anyconnect30rn.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2511.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2511.json index 6aaea67cd66..2b875b1418a 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2511.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2511.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2511", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-15T04:21:43.330", - "lastModified": "2017-08-29T01:31:37.337", + "lastModified": "2024-11-21T01:39:09.683", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,29 @@ { "url": "https://service.sap.com/sap/support/notes/1687910", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1687910", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2512.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2512.json index 45beaa101d8..53634ab26cc 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2512.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2512.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2512", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-15T04:21:43.407", - "lastModified": "2017-08-29T01:31:37.383", + "lastModified": "2024-11-21T01:39:09.817", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,29 @@ { "url": "https://service.sap.com/sap/support/notes/1687910", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1687910", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2513.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2513.json index c9d48f4c98e..a0d25bfebcc 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2513.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2513.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2513", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-15T04:21:43.453", - "lastModified": "2017-08-29T01:31:37.447", + "lastModified": "2024-11-21T01:39:09.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,29 @@ { "url": "https://service.sap.com/sap/support/notes/1687910", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1687910", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2514.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2514.json index 47ab287589b..74e483317ab 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2514.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2514.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2514", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-15T04:21:43.500", - "lastModified": "2017-12-06T02:29:05.617", + "lastModified": "2024-11-21T01:39:10.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,29 @@ { "url": "https://service.sap.com/sap/support/notes/1687910", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75456", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1687910", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2515.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2515.json index 8ff78ea7f76..77ce03850d8 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2515.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2515.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2515", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-07-05T03:23:18.480", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:10.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -176,6 +175,56 @@ { "url": "http://www.vupen.com/english/advisories/2009/2795", "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "http://retrogod.altervista.org/9sg_emc_keyhelp.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/36905", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/36914", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.ge-ip.com/support/resources/sites/GE_FANUC_SUPPORT/content/live/KB/14000/KB14863/en_US/GEIP12-04%20Security%20Advisory%20-%20Proficy%20HTML%20Help.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/36546", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-131-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.vupen.com/english/advisories/2009/2793", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vupen.com/english/advisories/2009/2795", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2516.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2516.json index 80e9a7c824b..3b7fa15d752 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2516.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2516.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2516", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-07-05T03:23:18.527", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:10.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -130,6 +129,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://support.ge-ip.com/support/resources/sites/GE_FANUC_SUPPORT/content/live/KB/14000/KB14863/en_US/GEIP12-04%20Security%20Advisory%20-%20Proficy%20HTML%20Help.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-131-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2521.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2521.json index a091db9abc7..13cd5f3fdef 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2521.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2521.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2521", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.587", - "lastModified": "2018-10-12T22:03:03.983", + "lastModified": "2024-11-21T01:39:10.857", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -102,6 +101,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15742", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15742", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2522.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2522.json index 4800f1b3d52..3743bbfe586 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2522.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2522.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2522", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.617", - "lastModified": "2018-10-12T22:03:04.280", + "lastModified": "2024-11-21T01:39:10.957", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -102,6 +101,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15498", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15498", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2523.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2523.json index 78d72e5319c..ee6da5d75b0 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2523.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2523.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2523", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.663", - "lastModified": "2018-10-12T22:03:04.623", + "lastModified": "2024-11-21T01:39:11.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -106,6 +105,26 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15790", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15790", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2524.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2524.json index 27b9c68b09a..1481f3e0e03 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2524.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2524.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2524", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.693", - "lastModified": "2018-10-12T22:03:05.170", + "lastModified": "2024-11-21T01:39:11.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -97,6 +96,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15702", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-057", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15702", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2526.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2526.json index 43a5232bcc6..fba9aebefe3 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2526.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2526.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2526", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.727", - "lastModified": "2018-10-12T22:03:05.483", + "lastModified": "2024-11-21T01:39:11.313", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15650", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-053", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15650", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2527.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2527.json index 247ea0d83bc..021a2fd9ee0 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2527.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2527.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2527", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.773", - "lastModified": "2023-12-07T18:38:56.693", + "lastModified": "2024-11-21T01:39:11.427", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -147,6 +146,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15706", "source": "secure@microsoft.com" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-227A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15706", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2536.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2536.json index 0d7b1d95861..ae1c993ed84 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2536.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2536.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2536", "sourceIdentifier": "secure@microsoft.com", "published": "2012-09-11T18:55:01.050", - "lastModified": "2018-10-12T22:03:08.013", + "lastModified": "2024-11-21T01:39:12.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,25 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15781", "source": "secure@microsoft.com" + }, + { + "url": "http://www.securityfocus.com/bid/55430", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-255A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15781", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2559.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2559.json index b23a62d1375..ccc662babe9 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2559.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2559.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2559", "sourceIdentifier": "cret@cert.org", "published": "2012-07-05T03:23:18.573", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:13.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2560.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2560.json index 038a5cbc9e8..34c845debfc 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2560.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2560.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2560", "sourceIdentifier": "cret@cert.org", "published": "2012-07-05T03:23:18.603", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:13.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -112,6 +111,21 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-185-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.wellintech.com/index.php/news/33-patch-for-kingview653", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2561.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2561.json index 1bf3d9c51ed..c2c8af5bb0a 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2561.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2561.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2561", "sourceIdentifier": "cret@cert.org", "published": "2012-05-21T20:55:21.570", - "lastModified": "2013-05-25T03:11:12.093", + "lastModified": "2024-11-21T01:39:13.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -72,6 +71,10 @@ } ], "references": [ + { + "url": "http://marc.info/?l=bugtraq&m=134013352316810&w=2", + "source": "cret@cert.org" + }, { "url": "http://marc.info/?l=bugtraq&m=134013352316810&w=2", "source": "cret@cert.org" @@ -98,6 +101,37 @@ { "url": "http://www.securitytracker.com/id?1027075", "source": "cret@cert.org" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134013352316810&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=134013352316810&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81981", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/859230", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53556", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027075", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2562.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2562.json index 8b8117b9608..4bb1ff77547 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2562.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2562.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2562", "sourceIdentifier": "cret@cert.org", "published": "2012-05-22T15:55:02.367", - "lastModified": "2017-08-29T01:31:37.570", + "lastModified": "2024-11-21T01:39:13.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 7.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.9, @@ -111,6 +110,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75782", "source": "cret@cert.org" + }, + { + "url": "http://blog.mobiledefense.com/2012/05/mobile-defense-finds-two-security-vulnerabilities-in-xelex-mobiletrack/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49268", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/464683", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53634", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75782", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2563.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2563.json index 77d1e4322e5..eec07a7d817 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2563.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2563.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2563", "sourceIdentifier": "cret@cert.org", "published": "2012-06-09T00:55:01.330", - "lastModified": "2012-08-19T03:44:21.097", + "lastModified": "2024-11-21T01:39:14.053", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ { "url": "http://www.securityfocus.com/bid/53715", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/722963", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8R9LBY", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53715", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2564.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2564.json index 78d9b4fae6a..7c3693af994 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2564.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2564.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2564", "sourceIdentifier": "cret@cert.org", "published": "2012-06-09T00:55:01.377", - "lastModified": "2012-08-19T03:44:21.270", + "lastModified": "2024-11-21T01:39:14.160", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "http://www.securityfocus.com/bid/53715", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/722963", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8R9LBY", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53715", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2565.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2565.json index f0d043e17a6..a68d21f9f49 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2565.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2565.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2565", "sourceIdentifier": "cret@cert.org", "published": "2012-06-09T00:55:01.423", - "lastModified": "2012-08-19T03:44:21.427", + "lastModified": "2024-11-21T01:39:14.257", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,24 @@ { "url": "http://www.securityfocus.com/bid/53715", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/722963", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8R9LBY", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53715", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2566.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2566.json index 21131bdf2f7..d289600d968 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2566.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2566.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2566", "sourceIdentifier": "cret@cert.org", "published": "2012-06-09T00:55:01.457", - "lastModified": "2012-08-19T03:44:21.597", + "lastModified": "2024-11-21T01:39:14.357", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ { "url": "http://www.securityfocus.com/bid/53715", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/722963", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8R9LBY", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53715", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2567.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2567.json index e0055e6b956..acb6105e116 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2567.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2567.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2567", "sourceIdentifier": "cret@cert.org", "published": "2012-05-22T15:55:02.460", - "lastModified": "2017-08-29T01:31:37.633", + "lastModified": "2024-11-21T01:39:14.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -107,6 +106,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75783", "source": "cret@cert.org" + }, + { + "url": "http://blog.mobiledefense.com/2012/05/mobile-defense-finds-two-security-vulnerabilities-in-xelex-mobiletrack/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49268", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/464683", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53634", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75783", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2568.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2568.json index d334101c02d..5f2a631ec0e 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2568.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2568.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2568", "sourceIdentifier": "cret@cert.org", "published": "2012-05-25T20:55:01.820", - "lastModified": "2017-08-29T01:31:37.680", + "lastModified": "2024-11-21T01:39:14.557", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,13 +14,6 @@ "value": "d41d8cd98f00b204e9800998ecf8427e.php en el servidor web de gesti\u00f3n en el dispositivo Seagate BlackArmor permite a atacantes remotos cambiar la contrase\u00f1a de administrador a trav\u00e9s de vectores no especificados." } ], - "vendorComments": [ - { - "organization": "Seagate", - "comment": "The latest revision of the Seagate Software now includes a fix, which address the previously publicized security hole. We will be communicating this to our installed base of users both by direct email as well as Update notifications sent through the BlackArmor NAS User Interface. \n\nThe software updates can be found here: \nhttp://www.seagate.com/support/external-hard-drives/network-storage/blackarmor-nas-110/banas-110-firmware-master-dl/\nhttp://www.seagate.com/support/external-hard-drives/network-storage/blackarmor-nas-220/banas-220-firmware-master-dl/\nhttp://www.seagate.com/support/external-hard-drives/network-storage/blackarmor-nas-440/banas-440-firmware-master-dl/\n\n\n\nNote that there are 3 different versions of the firmware update, which correlate to the number of bays in the hardware (e.g 1-bay, 2-bay and 4-bay).", - "lastModified": "2012-10-26T00:00:00" - } - ], "metrics": { "cvssMetricV2": [ { @@ -30,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +89,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75854", "source": "cret@cert.org" + }, + { + "url": "http://secunia.com/advisories/49282", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/515283", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53670", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75854", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ], + "vendorComments": [ + { + "organization": "Seagate", + "comment": "The latest revision of the Seagate Software now includes a fix, which address the previously publicized security hole. We will be communicating this to our installed base of users both by direct email as well as Update notifications sent through the BlackArmor NAS User Interface. \n\nThe software updates can be found here: \nhttp://www.seagate.com/support/external-hard-drives/network-storage/blackarmor-nas-110/banas-110-firmware-master-dl/\nhttp://www.seagate.com/support/external-hard-drives/network-storage/blackarmor-nas-220/banas-220-firmware-master-dl/\nhttp://www.seagate.com/support/external-hard-drives/network-storage/blackarmor-nas-440/banas-440-firmware-master-dl/\n\n\n\nNote that there are 3 different versions of the firmware update, which correlate to the number of bays in the hardware (e.g 1-bay, 2-bay and 4-bay).", + "lastModified": "2012-10-26T00:00:00" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2570.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2570.json index 7679e522d5d..29c16ecbbd8 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2570.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2570.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2570", "sourceIdentifier": "cret@cert.org", "published": "2012-08-15T20:55:01.820", - "lastModified": "2017-08-29T01:31:37.790", + "lastModified": "2024-11-21T01:39:14.767", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77146", "source": "cret@cert.org" + }, + { + "url": "http://osvdb.org/84115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50006", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/20010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54628", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77146", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2571.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2571.json index 6a74b02976d..bd5c502cff5 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2571.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2571.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2571", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T21:55:01.027", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:14.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/20366/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2573.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2573.json index f3d9284607e..74894236aaf 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2573.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2573.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2573", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T21:55:01.120", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:15.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/20364/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2574.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2574.json index 547b2c5222a..9f23d9d4ea7 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2574.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2574.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2574", "sourceIdentifier": "cret@cert.org", "published": "2012-07-23T17:55:03.453", - "lastModified": "2017-12-22T02:29:10.167", + "lastModified": "2024-11-21T01:39:15.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -102,6 +101,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77112", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/108471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54424", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77112", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2577.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2577.json index 4afc7a0ccd2..cd9ae28f3e0 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2577.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2577.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2577", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T16:55:00.840", - "lastModified": "2017-08-29T01:31:37.897", + "lastModified": "2024-11-21T01:39:15.483", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -144,6 +143,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77147", "source": "cret@cert.org" + }, + { + "url": "http://secunia.com/advisories/50004", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/174119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54624", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.solarwinds.com/documentation/Orion/docs/ReleaseNotes/releaseNotes.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77147", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2582.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2582.json index a65b83e5c26..1d7223884ee 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2582.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2582.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2582", "sourceIdentifier": "cret@cert.org", "published": "2012-08-23T10:32:14.967", - "lastModified": "2013-03-22T03:10:32.503", + "lastModified": "2024-11-21T01:39:15.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -448,6 +447,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50513", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2536", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/582879", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "US Government Resource" + ] + }, + { + "url": "http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2012-01/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2584.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2584.json index 1dc0a93a0ad..a1a35a3b2a4 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2584.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2584.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2584", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T17:55:00.903", - "lastModified": "2017-08-29T01:31:38.133", + "lastModified": "2024-11-21T01:39:16.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77543", "source": "cret@cert.org" + }, + { + "url": "http://www.exploit-db.com/exploits/20357/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54885", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77543", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2585.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2585.json index 74295be83b6..3be80f53a13 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2585.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2585.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2585", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T21:55:01.217", - "lastModified": "2012-08-13T17:22:05.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:16.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/20356/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2587.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2587.json index 1c0ddcbd381..b85ce45274d 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2587.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2587.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2587", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T21:55:01.293", - "lastModified": "2012-08-29T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:16.383", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/20352/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2590.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2590.json index c318b320c03..65b409f9488 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2590.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2590.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2590", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T21:55:01.340", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:16.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/20350/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2595.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2595.json index 0855b2ad93e..17a80d14c2d 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2595.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2595.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2595", "sourceIdentifier": "cret@cert.org", "published": "2012-06-08T18:55:02.173", - "lastModified": "2012-06-12T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:17.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2596.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2596.json index 4da73be8930..3a3455f996d 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2596.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2596.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2596", "sourceIdentifier": "cret@cert.org", "published": "2012-06-08T18:55:02.220", - "lastModified": "2012-06-12T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:17.103", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -90,6 +89,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2597.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2597.json index 77679d06b34..38da5b7b21c 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2597.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2597.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2597", "sourceIdentifier": "cret@cert.org", "published": "2012-06-08T18:55:02.267", - "lastModified": "2012-06-12T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:17.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -90,6 +89,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-25xx/CVE-2012-2598.json b/CVE-2012/CVE-2012-25xx/CVE-2012-2598.json index cb9feee7295..7f1d9b0a724 100644 --- a/CVE-2012/CVE-2012-25xx/CVE-2012-2598.json +++ b/CVE-2012/CVE-2012-25xx/CVE-2012-2598.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2598", "sourceIdentifier": "cret@cert.org", "published": "2012-06-08T18:55:02.317", - "lastModified": "2012-06-12T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:17.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2601.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2601.json index ee4f4a3a93e..e5d1df3e4e4 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2601.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2601.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2601", "sourceIdentifier": "cret@cert.org", "published": "2012-08-15T22:55:02.400", - "lastModified": "2024-08-27T17:48:24.383", + "lastModified": "2024-11-21T01:39:17.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77152", "source": "cret@cert.org" + }, + { + "url": "http://www.exploit-db.com/exploits/20035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/777007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54626", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027325", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.whatsupgold.com/blog/2012/07/23/keeping-whatsup-gold-secure/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77152", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2602.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2602.json index 8c3794b57c3..58a40dd24f8 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2602.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2602.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2602", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T16:55:00.903", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:17.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,42 @@ { "url": "http://www.solarwinds.com/documentation/Orion/docs/ReleaseNotes/releaseNotes.htm", "source": "cret@cert.org" + }, + { + "url": "http://osvdb.org/84116", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50004", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/20011", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/174119", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54624", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.solarwinds.com/documentation/Orion/docs/ReleaseNotes/releaseNotes.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2603.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2603.json index 4b240ab47f9..8e700361c26 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2603.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2603.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2603", "sourceIdentifier": "cret@cert.org", "published": "2012-06-08T16:55:00.923", - "lastModified": "2012-06-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:17.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -90,6 +89,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/442595", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8RJPJX", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2604.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2604.json index 76c0dab443f..aa5cbffd4c7 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2604.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2604.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2604", "sourceIdentifier": "cret@cert.org", "published": "2012-06-13T15:55:01.290", - "lastModified": "2012-06-13T15:55:01.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:17.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -107,6 +106,24 @@ { "url": "https://na3.salesforce.com/sfc/#version?selectedDocumentId=06950000000IyBX", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/709939", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8TJKAF", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://na3.salesforce.com/sfc/#version?selectedDocumentId=06950000000IyBX", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2605.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2605.json index 9982326ab51..0b5083600c2 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2605.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2605.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2605", "sourceIdentifier": "cret@cert.org", "published": "2012-06-13T15:55:01.337", - "lastModified": "2012-06-13T15:55:01.337", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:17.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,24 @@ { "url": "https://na3.salesforce.com/sfc/#version?selectedDocumentId=06950000000IySO", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/709939", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8TJKAF", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://na3.salesforce.com/sfc/#version?selectedDocumentId=06950000000IySO", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2606.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2606.json index 3ace12510bd..82763c88156 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2606.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2606.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2606", "sourceIdentifier": "cret@cert.org", "published": "2012-06-13T15:55:01.387", - "lastModified": "2012-06-13T15:55:01.387", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:17.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,21 @@ { "url": "https://na3.salesforce.com/sfc/#version?id=06850000000JDx3", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/709939", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8TJKAF", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://na3.salesforce.com/sfc/#version?id=06850000000JDx3", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2607.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2607.json index c7c56543d13..6e0aeb3af82 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2607.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2607.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2607", "sourceIdentifier": "cret@cert.org", "published": "2012-07-16T20:49:19.567", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:18.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,17 @@ { "url": "http://www.kb.cert.org/vuls/id/MORO-8UYN8P", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/977312", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MORO-8UYN8P", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2611.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2611.json index dd5fb9ebce3..24797549da5 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2611.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2611.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2611", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-15T04:21:43.547", - "lastModified": "2012-08-19T03:44:24.613", + "lastModified": "2024-11-21T01:39:18.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -95,6 +94,25 @@ { "url": "https://service.sap.com/sap/support/notes/1687910", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1687910", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2612.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2612.json index 427f2ed38a3..f4513b2f3d5 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2612.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2612.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2612", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-15T04:21:43.597", - "lastModified": "2017-12-29T02:29:19.127", + "lastModified": "2024-11-21T01:39:18.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,29 @@ { "url": "https://service.sap.com/sap/support/notes/1687910", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027052", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75452", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1687910", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2614.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2614.json index aa5303504d9..b4d1a441f7e 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2614.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2614.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2614", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T21:55:05.873", - "lastModified": "2012-08-18T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:18.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-06/0136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48431", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.coresecurity.com/content/lattice-diamond-programmer-buffer-overflow", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/19340", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2626.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2626.json index 97a05dd4805..369eefdae36 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2626.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2626.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2626", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-31T10:45:41.357", - "lastModified": "2018-03-08T19:03:21.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:19.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,22 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2012-014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2627.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2627.json index 034358ba154..fcbfa3fd3b8 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2627.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2627.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2627", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-31T10:45:41.450", - "lastModified": "2018-03-12T17:21:17.130", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:19.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C", + "baseScore": 9.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,20 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2012-014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2630.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2630.json index ddeb0ce4c8e..9688a62886f 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2630.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2630.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2630", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-04T15:55:02.057", - "lastModified": "2012-06-06T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:19.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000054", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN23328321/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000054", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2631.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2631.json index c7822b0246b..c593fd64634 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2631.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2631.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2631", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-15T14:55:01.703", - "lastModified": "2012-06-15T14:55:01.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:19.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -140,6 +139,18 @@ { "url": "http://www.atmarkweb.jp/atcart/", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN78305073/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000055", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.atmarkweb.jp/atcart/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2632.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2632.json index 58c23b36485..a11dc83c55d 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2632.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2632.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2632", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-15T19:55:01.530", - "lastModified": "2012-06-18T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:19.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -771,6 +770,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN24646833/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.seil.jp/support/security/a01232.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2633.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2633.json index 0bc699d884b..3c7c7a2a216 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2633.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2633.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2633", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-15T19:55:01.593", - "lastModified": "2013-10-07T16:29:24.243", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:19.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -131,6 +130,30 @@ { "url": "http://www.wpwp.org/archives/wassup-1-8-3-1/", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN15646988/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82017", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fwassup&old=545369&new_path=%2Fwassup&new=545369", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/extend/plugins/wassup/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wpwp.org/archives/wassup-1-8-3-1/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2634.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2634.json index 085766961cd..b98e8f81c2a 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2634.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2634.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2634", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-15T19:55:01.640", - "lastModified": "2012-06-18T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:19.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -110,6 +109,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000056", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN18397171/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000056", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2635.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2635.json index fa131943263..9a2444a8b6a 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2635.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2635.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2635", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-15T19:55:01.687", - "lastModified": "2012-06-18T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:19.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000057", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN90751882/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000057", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2636.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2636.json index ee98386b503..db15db673ca 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2636.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2636.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2636", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-19T16:55:02.943", - "lastModified": "2012-06-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:20.093", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "http://www.kent-web.com/bbs/patio.html", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN33171616/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000061", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kent-web.com/bbs/patio.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2637.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2637.json index f530a0ae5d3..c66b7ab1243 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2637.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2637.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2637", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-19T16:55:02.990", - "lastModified": "2012-06-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:20.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "http://www.kent-web.com/bbs/patio.html", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN58102473/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000062", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kent-web.com/bbs/patio.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2638.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2638.json index 43ca33bc871..ed8e29ec0ab 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2638.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2638.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2638", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-06-19T16:55:03.257", - "lastModified": "2012-06-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:20.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN36993373/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000060", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wap2.jp/download/spict/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2640.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2640.json index 8e6ec4168ee..5ef269f51d1 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2640.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2640.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2640", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-07-05T17:55:02.590", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:20.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -108,6 +107,30 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN05102851/995355/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN05102851/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000064", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.nec.co.jp/security-info/secinfo/nv12-008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://yomecolle.jp/info/android_oshirase/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2641.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2641.json index 9c89f328a9d..ed967a16c2c 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2641.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2641.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2641", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-07-05T17:55:02.777", - "lastModified": "2012-07-06T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:20.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -154,6 +153,18 @@ { "url": "http://www.zenphoto.org/news/zenphoto-1.4.3", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN59842447/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000065", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zenphoto.org/news/zenphoto-1.4.3", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2642.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2642.json index b9b9990926f..5a99c97d43b 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2642.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2642.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2642", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-07-07T10:21:13.887", - "lastModified": "2012-07-09T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:20.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,18 @@ { "url": "http://www.hazama.nu/pukiwiki/index.php?MT4i%2F3.1", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN80835745/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.hazama.nu/pukiwiki/index.php?MT4i%2F3.1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2643.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2643.json index bb6ae98488c..62d78783b38 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2643.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2643.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2643", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-07-07T10:21:13.947", - "lastModified": "2012-07-09T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:20.710", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "http://www.kent-web.com/bbs/yybbs.html", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN03582364/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000068", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kent-web.com/bbs/yybbs.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2644.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2644.json index 968ca99772d..cd61efe0dc5 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2644.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2644.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2644", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-07-07T10:21:13.997", - "lastModified": "2012-07-09T14:28:47.697", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:20.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,18 @@ { "url": "http://www.hazama.nu/pukiwiki/index.php?MT4i%2F3.1", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN79111101/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000069", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.hazama.nu/pukiwiki/index.php?MT4i%2F3.1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2645.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2645.json index 366f75d33e3..c704043c859 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2645.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2645.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2645", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-07-16T20:49:22.017", - "lastModified": "2017-12-22T02:29:10.213", + "lastModified": "2024-11-21T01:39:20.907", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,29 @@ "tags": [ "Patch" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN46088915/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000070", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49905", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://play.google.com/store/apps/details?id=jp.co.yahoo.android.ybrowser", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2646.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2646.json index df85a116b3c..1eee8bba9c3 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2646.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2646.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2646", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-07-25T10:42:35.320", - "lastModified": "2018-11-29T16:54:03.567", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:21.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -108,6 +107,36 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN88643450/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000071", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2647.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2647.json index 24ee7a5b519..cc639319c83 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2647.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2647.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2647", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-07-31T10:45:42.093", - "lastModified": "2012-07-31T10:45:42.093", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:21.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000072", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN51769987/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000072", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2648.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2648.json index efb5e6b160b..d9af7f390b2 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2648.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2648.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2648", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-08-07T19:55:02.187", - "lastModified": "2022-08-09T13:49:00.607", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:21.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -555,6 +554,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000073", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN01598734/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000073", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2649.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2649.json index b19453b07bb..fe823066542 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2649.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2649.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2649", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-08-08T18:55:01.933", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:21.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -284,6 +283,22 @@ { "url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN99730704/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000075", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2652.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2652.json index c15fcbd9957..a17415e6c75 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2652.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2652.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2652", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T20:55:03.360", - "lastModified": "2023-02-13T00:25:07.177", + "lastModified": "2024-11-21T01:39:21.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -106,6 +105,41 @@ { "url": "http://www.ubuntu.com/usn/USN-1522-1", "source": "secalert@redhat.com" + }, + { + "url": "http://git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba=commit%3Bh=eba25057b9a5e19d10ace2bc7716667a31297169", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2545", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53725", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1522-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2653.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2653.json index c72b965ade1..5ae36520900 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2653.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2653.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2653", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-12T20:55:15.937", - "lastModified": "2016-11-28T19:08:02.510", + "lastModified": "2024-11-21T01:39:21.560", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -111,6 +110,46 @@ { "url": "https://security.gentoo.org/glsa/201607-16", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082553.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082565.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082569.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:113", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/24/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/24/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/24/14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/25/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201607-16", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2654.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2654.json index 4d4e73a6f56..4d167f7ce40 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2654.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2654.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2654", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-21T15:55:12.847", - "lastModified": "2017-08-29T01:31:38.460", + "lastModified": "2024-11-21T01:39:21.673", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -134,6 +133,59 @@ { "url": "https://review.openstack.org/#/c/8239/", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/46808", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49439", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1466-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/nova/+bug/985184", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76110", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/nova/commit/9f9e9da777161426a6f8cb4314b78e09beac2978", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/openstack/nova/commit/ff06c7c885dc94ed7c828e8cdbb8b5d850a7e654", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://lists.launchpad.net/openstack/msg12883.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://review.openstack.org/#/c/8239/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2655.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2655.json index 4688fd7dd22..b8578719f7c 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2655.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2655.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2655", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-18T23:55:01.980", - "lastModified": "2013-04-19T03:22:09.863", + "lastModified": "2024-11-21T01:39:21.880", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -358,6 +357,53 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082258.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082292.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082294.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50718", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2491", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.postgresql.org/about/news/1398/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2657.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2657.json index a83b51308e5..604bab1caef 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2657.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2657.json @@ -2,7 +2,7 @@ "id": "CVE-2012-2657", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T18:55:00.980", - "lastModified": "2024-08-06T20:15:27.507", + "lastModified": "2024-11-21T01:39:23.093", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -121,6 +121,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75940", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/29/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/29/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/30/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/31/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/06/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82460", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53712", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75940", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2658.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2658.json index ac96f061135..d67c9dbf866 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2658.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2658.json @@ -2,7 +2,7 @@ "id": "CVE-2012-2658", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T18:55:01.137", - "lastModified": "2024-08-06T20:15:27.603", + "lastModified": "2024-11-21T01:39:23.420", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -110,6 +110,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75940", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/29/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/29/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/30/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/31/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/06/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82460", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53712", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75940", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2660.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2660.json index 2a110e1d2ae..852201c0ff4 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2660.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2660.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2660", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-22T14:55:01.020", - "lastModified": "2019-08-08T15:42:45.623", + "lastModified": "2024-11-21T01:39:23.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -467,6 +466,37 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/group/rubyonrails-security/msg/d890f8d58b5fbf32?dmode=source&output=gplain", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2661.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2661.json index b900861c0f3..30a089949a4 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2661.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2661.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2661", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-22T14:55:01.067", - "lastModified": "2019-08-08T15:42:45.623", + "lastModified": "2024-11-21T01:39:23.693", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -459,6 +458,29 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source&output=gplain", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2662.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2662.json index b7b27c8b3f7..c9368c6cd43 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2662.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2662.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2662", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T20:55:05.757", - "lastModified": "2023-02-13T00:25:11.870", + "lastModified": "2024-11-21T01:39:23.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -139,6 +138,43 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77101", "source": "secalert@redhat.com" + }, + { + "url": "http://osvdb.org/84099", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2015-1347.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50013", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77101", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2664.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2664.json index f10f2f71f54..6574e88e5db 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2664.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2664.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2664", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:03.797", - "lastModified": "2017-08-29T01:31:38.697", + "lastModified": "2024-11-21T01:39:24.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76468", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0958.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1121.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54116", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76468", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2665.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2665.json index c2e5060dee4..c7b433d1dc5 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2665.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2665.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2665", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-06T18:55:01.133", - "lastModified": "2023-02-13T04:33:39.533", + "lastModified": "2024-11-21T01:39:24.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -272,6 +271,125 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50142", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/50146", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/50692", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/60799", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2520", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.libreoffice.org/about-us/security/advisories/cve-2012-2665/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.pre-cert.de/advisories/PRE-SA-2012-05.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027331", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027332", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1536-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1537-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826077", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2667.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2667.json index e3ca5d51be2..68b5a12c2b7 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2667.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2667.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2667", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-07T19:55:09.353", - "lastModified": "2017-08-29T01:31:38.743", + "lastModified": "2024-11-21T01:39:24.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -201,6 +200,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76027", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/49312", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://symfony.com/blog/security-release-symfony-1-4-18-released", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://trac.symfony-project.org/browser/tags/RELEASE_1_4_18/CHANGELOG", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/04/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/05/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53776", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76027", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2668.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2668.json index 92af3b2fa78..dfaf6edf34e 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2668.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2668.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2668", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-17T03:41:41.030", - "lastModified": "2023-02-13T04:33:39.750", + "lastModified": "2024-11-21T01:39:24.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -257,6 +256,66 @@ { "url": "https://support.apple.com/kb/HT210788", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676309", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1151.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2019/Dec/26", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-36.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openldap.org/devel/gitweb.cgi?p=openldap.git%3Ba=commitdiff%3Bh=2c2bb2e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openldap.org/its/index.cgi?findid=7285", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/05/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/06/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/06/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53823", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825875", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76099", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://seclists.org/bugtraq/2019/Dec/23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.apple.com/kb/HT210788", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2670.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2670.json index 8e4525f13df..5696a891153 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2670.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2670.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2670", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-17T03:41:41.390", - "lastModified": "2017-08-29T01:31:38.883", + "lastModified": "2024-11-21T01:39:24.780", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -119,6 +118,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76101", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-06/0007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.collabtive.o-dyn.de/blog/?p=426", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/06/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/06/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/archive/1/522973/30/0/threaded", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53813", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76101", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2671.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2671.json index a56286aa0c2..0c2d9e151ad 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2671.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2671.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2671", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-17T03:41:41.437", - "lastModified": "2013-08-28T06:47:11.577", + "lastModified": "2024-11-21T01:39:24.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -148,6 +147,38 @@ { "url": "https://github.com/rtomayko/rack-cache/pull/52", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081812.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/06/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/06/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=763650", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824520", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/rtomayko/rack-cache/blob/master/CHANGES", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/rtomayko/rack-cache/commit/2e3a64d07daac4c757cc57620f2288e865a09b90", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/rtomayko/rack-cache/pull/52", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2672.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2672.json index 124f94f7982..7c045c9778d 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2672.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2672.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2672", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-17T03:41:41.577", - "lastModified": "2017-08-29T01:31:38.960", + "lastModified": "2024-11-21T01:39:25.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -117,6 +116,52 @@ { "url": "https://issues.jboss.org/browse/JBPAPP-9197", "source": "secalert@redhat.com" + }, + { + "url": "http://java.net/jira/browse/JAVASERVERFACES-2436", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1591.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1592.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1594.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51607", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/07/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.jboss.org/browse/JBPAPP-9197", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2673.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2673.json index 42d902aacf7..680904dc24d 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2673.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2673.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2673", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T19:55:02.773", - "lastModified": "2016-09-29T01:59:06.160", + "lastModified": "2024-11-21T01:39:25.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -620,6 +619,84 @@ "tags": [ "Patch" ] + }, + { + "url": "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082926.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082988.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1500.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-0149.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2014-0150.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:158", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/05/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/07/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54227", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1546-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ivmai/bdwgc/blob/master/ChangeLog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ivmai/bdwgc/commit/6a93f8e5bcad22137f41b6c60a1c7384baaec2b3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/ivmai/bdwgc/commit/83231d0ab5ed60015797c3d1ad9056295ac3b2bb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/ivmai/bdwgc/commit/be9df82919960214ee4b9d3313523bff44fd99e1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/ivmai/bdwgc/commit/e10c1eb9908c2774c16b3148b30d2f3823d66a9a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2674.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2674.json index 1e712e6b7f3..5a324204fc0 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2674.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2674.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2674", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T19:55:02.820", - "lastModified": "2012-08-24T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:25.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ "Exploit", "Patch" ] + }, + { + "url": "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/05/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/07/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2675.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2675.json index 10a8effd56a..2a669aef2c9 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2675.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2675.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2675", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T19:55:02.867", - "lastModified": "2012-07-30T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:25.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,38 @@ "Exploit", "Patch" ] + }, + { + "url": "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/05/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/07/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ned14/nedmalloc/blob/master/Readme.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ned14/nedmalloc/commit/1a759756639ab7543b650a10c2d77a0ffc7a2000", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/ned14/nedmalloc/commit/2965eca30c408c13473c4146a9d47d547d288db1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2676.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2676.json index b7c5b357544..0cec243f886 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2676.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2676.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2676", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T19:55:02.917", - "lastModified": "2012-07-30T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:25.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ { "url": "https://github.com/emeryberger/Hoard/blob/master/NEWS", "source": "secalert@redhat.com" + }, + { + "url": "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/05/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/07/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/emeryberger/Hoard/blob/master/NEWS", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2677.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2677.json index e8d3d008f0f..f3b18e35739 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2677.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2677.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2677", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-25T19:55:03.023", - "lastModified": "2021-05-26T10:15:07.797", + "lastModified": "2024-11-21T01:39:25.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -117,6 +116,46 @@ { "url": "https://svn.boost.org/trac/boost/ticket/6701", "source": "secalert@redhat.com" + }, + { + "url": "http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083416.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082977.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:065", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/05/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/07/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/202105-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://svn.boost.org/trac/boost/changeset/78326", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://svn.boost.org/trac/boost/ticket/6701", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2678.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2678.json index 75191192396..b2e3ed5d983 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2678.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2678.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2678", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T16:40:33.583", - "lastModified": "2017-09-19T01:34:58.527", + "lastModified": "2024-11-21T01:39:25.777", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 1.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.2 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -326,9 +325,58 @@ "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083", "source": "secalert@redhat.com" }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083", + "source": "secalert@redhat.com" + }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19353", "source": "secalert@redhat.com" + }, + { + "url": "http://directory.fedoraproject.org/wiki/Release_Notes", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83336", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49734", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19353", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2687.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2687.json index fb81d47c539..bb92fae9138 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2687.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2687.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2687", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-22T19:55:01.633", - "lastModified": "2023-11-07T02:10:40.107", + "lastModified": "2024-11-21T01:39:26.897", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per http://httpd.apache.org/security/vulnerabilities_22.html versions 2.2.x before 2.2.23 are also vulnerable.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -224,6 +222,10 @@ "url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-1591.html", "source": "secalert@redhat.com" @@ -363,6 +365,182 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19539", "source": "secalert@redhat.com" + }, + { + "url": "http://httpd.apache.org/security/vulnerabilities_24.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201208.mbox/%3C0BFFEA9B-801B-4BAA-9534-56F640268E30%40apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=136612293908376&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1591.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1592.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1594.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0130.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50894", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51607", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5880", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=nas2a2b50a0ca011b37c86257a96003c9a4f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.apache.org/dist/httpd/CHANGES_2.4.3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1627-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18832", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19539", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per http://httpd.apache.org/security/vulnerabilities_22.html versions 2.2.x before 2.2.23 are also vulnerable." } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2688.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2688.json index ac1a41d924a..5b3dd2cbc8a 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2688.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2688.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2688", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-20T10:40:36.517", - "lastModified": "2017-12-22T02:29:10.323", + "lastModified": "2024-11-21T01:39:27.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -733,6 +732,62 @@ { "url": "https://hermes.opensuse.org/messages/15376003", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-1307.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/55078", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5501", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2527", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54638", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027287", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1569-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77155", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15376003", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2690.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2690.json index ad930241937..9caef913ece 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2690.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2690.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2690", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:04.000", - "lastModified": "2017-08-29T01:31:39.413", + "lastModified": "2024-11-21T01:39:27.230", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -452,6 +451,36 @@ { "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0774.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49431", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49545", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53932", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76220", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.redhat.com/archives/libguestfs/2012-May/msg00104.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2691.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2691.json index 355be9d39af..1939c7bf674 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2691.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2691.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2691", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-17T03:41:41.857", - "lastModified": "2021-01-12T18:05:59.507", + "lastModified": "2024-11-21T01:39:27.343", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -438,6 +437,77 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49414", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=148", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=14340", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/09/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/11/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53907", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/56467", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76180", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/175d973105fe9f03a37ced537b742611631067e0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/edc8142bb8ac0ac0df1a3824d78c15f4015d959e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2692.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2692.json index ab90e84a8e7..dcf2847a16c 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2692.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2692.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2692", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-17T03:41:41.907", - "lastModified": "2021-01-12T18:05:56.147", + "lastModified": "2024-11-21T01:39:27.473", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -354,6 +353,53 @@ "tags": [ "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201211-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/changelog_page.php?version_id=148", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mantisbt.org/bugs/view.php?id=14016", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/09/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/11/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53921", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mantisbt/mantisbt/commit/ceafe6f0c679411b81368052633a63dd3ca06d9c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2693.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2693.json index 5d6e64c130b..562ca67ab7f 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2693.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2693.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2693", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-17T03:41:42.203", - "lastModified": "2013-01-15T04:30:36.820", + "lastModified": "2024-11-21T01:39:27.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 3.7, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.7 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -425,6 +424,29 @@ "tags": [ "Patch" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0748.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0127.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/11/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/11/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2694.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2694.json index adda805039b..87d8592cd4c 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2694.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2694.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2694", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-22T14:55:01.097", - "lastModified": "2019-08-08T15:42:45.623", + "lastModified": "2024-11-21T01:39:27.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -488,6 +487,37 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source&output=gplain", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2695.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2695.json index ad82c1ba637..80db31ea0a0 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2695.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2695.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2695", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-22T14:55:01.147", - "lastModified": "2019-08-08T15:42:45.623", + "lastModified": "2024-11-21T01:39:27.853", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -484,6 +483,33 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source&output=gplain", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2698.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2698.json index ac80acb9f98..9ee86a3fb3c 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2698.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2698.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2698", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-29T19:55:05.483", - "lastModified": "2017-08-29T01:31:39.663", + "lastModified": "2024-11-21T01:39:28.197", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -924,6 +923,68 @@ { "url": "https://www.mediawiki.org/wiki/Release_notes/1.19", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000116.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000117.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000118.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49484", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://securitytracker.com/id?1027179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82983", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=36938", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76311", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gerrit.wikimedia.org/r/#/c/7979/1/includes/SkinTemplate.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://www.mediawiki.org/wiki/Release_notes/1.17", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mediawiki.org/wiki/Release_notes/1.18", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.mediawiki.org/wiki/Release_notes/1.19", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2702.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2702.json index 74356764adf..7809fc5bc7e 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2702.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2702.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2702", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:02.880", - "lastModified": "2017-08-29T01:31:39.743", + "lastModified": "2024-11-21T01:39:28.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -153,6 +152,46 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75720", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1580752", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupal.org/node/1585532", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/uc_product_keys.git/commitdiff/19fa261", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://osvdb.org/82005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49169", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75720", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2703.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2703.json index 4e7893002b5..a6aaa0229f9 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2703.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2703.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2703", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:02.973", - "lastModified": "2017-08-29T01:31:39.807", + "lastModified": "2024-11-21T01:39:28.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -194,6 +193,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75718", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1585544", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/ad.git/commitdiff/4337f34", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/1580376", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75718", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2704.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2704.json index 11ae8ecbdcc..79a04227fe2 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2704.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2704.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2704", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T20:55:00.933", - "lastModified": "2017-08-29T01:31:39.867", + "lastModified": "2024-11-21T01:39:28.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -198,6 +197,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75719", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1585544", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/ad.git/commitdiff/c2ffab2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://drupal.org/node/1580376", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75719", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2705.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2705.json index 1fd931864f8..6ffdd263cb4 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2705.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2705.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2705", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.147", - "lastModified": "2017-08-29T01:31:39.930", + "lastModified": "2024-11-21T01:39:28.707", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -143,6 +142,51 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75713", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1568216", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1585564", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/smart_breadcrumb.git/commitdiff/834f75a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49163", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53592", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75713", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2706.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2706.json index ef009accab1..0f7a5047a0c 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2706.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2706.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2706", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.223", - "lastModified": "2017-08-29T01:31:39.977", + "lastModified": "2024-11-21T01:39:28.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -102,6 +101,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75716", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1585648", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53589", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75716", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2707.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2707.json index 9ccf108428b..e9ac3172bc8 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2707.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2707.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2707", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.550", - "lastModified": "2017-08-29T01:31:40.070", + "lastModified": "2024-11-21T01:39:28.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -156,6 +155,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75715", "source": "secalert@redhat.com" + }, + { + "url": "http://community.aegirproject.org/1.9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1585658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1585678", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/hostmaster.git/commitdiff/8a61101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53588", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75715", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2708.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2708.json index e5f531994c2..223f395d5c8 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2708.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2708.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2708", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.613", - "lastModified": "2017-08-29T01:31:40.133", + "lastModified": "2024-11-21T01:39:29.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -156,6 +155,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75714", "source": "secalert@redhat.com" + }, + { + "url": "http://community.aegirproject.org/1.9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1585658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1585678", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/hostmaster.git/commitdiff/9476561", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53588", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75714", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2710.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2710.json index acdc9a5168e..f5eec272689 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2710.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2710.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2710", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.647", - "lastModified": "2017-08-29T01:31:40.197", + "lastModified": "2024-11-21T01:39:29.160", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -130,6 +129,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75711", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1585960", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupal.org/node/628480", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53573", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75711", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2711.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2711.json index c98d067992a..e90ba0b0454 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2711.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2711.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2711", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.693", - "lastModified": "2017-08-29T01:31:40.257", + "lastModified": "2024-11-21T01:39:29.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -162,6 +161,55 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75867", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1595396", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1597262", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/taxonomy_list.git/commitdiff/7dd21a0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53671", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75867", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2712.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2712.json index 19a5c17fad1..7549da070f2 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2712.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2712.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2712", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.740", - "lastModified": "2017-08-29T01:31:40.337", + "lastModified": "2024-11-21T01:39:29.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -189,6 +188,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75868", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1596524", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1597364", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/search_api.git/commitdiff/5a18c8c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49236", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82230", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53672", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75868", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2713.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2713.json index d743c442159..a77a5011f30 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2713.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2713.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2713", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.787", - "lastModified": "2020-01-27T16:24:25.083", + "lastModified": "2024-11-21T01:39:29.500", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -137,6 +136,55 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75869", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1597414", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/browserid.git/commitdiff/5e5cdcd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82466", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53673", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://drupal.org/node/1596464", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75869", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2715.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2715.json index 669506c12c3..922bc494bcc 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2715.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2715.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2715", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.833", - "lastModified": "2017-08-29T01:31:40.447", + "lastModified": "2024-11-21T01:39:29.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -147,6 +146,55 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75997", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1608730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1608780", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/amadou.git/commitdiff/071ea83", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49328", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82433", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53732", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75997", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2716.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2716.json index c212815bafe..e121d2693b7 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2716.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2716.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2716", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-21T15:55:13.083", - "lastModified": "2017-08-29T01:31:40.507", + "lastModified": "2024-11-21T01:39:29.823", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -130,6 +129,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75998", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1538768", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1608822", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/comment_moderation.git/commitdiff/f18c3de", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://osvdb.org/82434", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49326", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53738", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75998", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2717.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2717.json index 3a50ca17685..10b8230ad25 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2717.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2717.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2717", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T21:55:03.360", - "lastModified": "2017-08-29T01:31:40.570", + "lastModified": "2024-11-21T01:39:29.937", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -151,6 +150,59 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76002", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1169008", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1608828", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/mobile_tools.git/commitdiff/614b0fc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://osvdb.org/82410", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49318", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.madirish.net/content/drupal-mobile-tools-6x-23-xss", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53734", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76002", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2718.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2718.json index 8b647b6d7a9..cdd2772b777 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2718.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2718.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2718", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-21T15:55:13.130", - "lastModified": "2017-08-29T01:31:40.617", + "lastModified": "2024-11-21T01:39:30.057", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76004", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1608854", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/82527", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53736", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76004", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2719.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2719.json index 69123ca8e1b..1cf5c6dba28 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2719.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2719.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2719", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.880", - "lastModified": "2012-06-27T16:51:03.563", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:30.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -148,6 +147,36 @@ { "url": "http://www.osvdb.org/82575", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1598782", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1608864", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49316", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82575", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2720.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2720.json index afbe4833799..893628cec89 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2720.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2720.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2720", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.910", - "lastModified": "2017-08-29T01:31:40.680", + "lastModified": "2024-11-21T01:39:30.287", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -148,6 +147,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76141", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1618476", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1619808", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49400", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76141", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2721.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2721.json index 49f49ad9819..f808e329179 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2721.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2721.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2721", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:04.957", - "lastModified": "2017-08-29T01:31:40.727", + "lastModified": "2024-11-21T01:39:30.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -164,6 +163,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76150", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1619736", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1619810", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/og.git/commitdiff/1485708", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49397", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53838", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76150", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2722.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2722.json index 5fcd4414df9..0a5b5a6092d 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2722.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2722.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2722", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:05.037", - "lastModified": "2017-08-29T01:31:40.790", + "lastModified": "2024-11-21T01:39:30.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -179,6 +178,67 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76148", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1618428", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1618430", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1619824", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/node_embed.git/commitdiff/7a2296c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/node_embed.git/commitdiff/d06f022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48348", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82735", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53835", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76148", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2723.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2723.json index f8f9575b652..85e915ea7e2 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2723.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2723.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2723", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:05.130", - "lastModified": "2017-08-29T01:31:40.853", + "lastModified": "2024-11-21T01:39:30.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -159,6 +158,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76145", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1617952", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1619830", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/maestro.git/commitdiff/c499971", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82713", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53836", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76145", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2725.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2725.json index 924aac631d1..04bd7e542c9 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2725.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2725.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2725", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:05.177", - "lastModified": "2017-08-29T01:31:40.913", + "lastModified": "2024-11-21T01:39:30.887", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -125,6 +124,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76127", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1619086", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1619852", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/authoring_html.git/commitdiff/ceae1ab", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49387", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82739", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76127", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2726.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2726.json index f5f3dfc28c1..da462bd3e27 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2726.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2726.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2726", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:05.240", - "lastModified": "2017-08-29T01:31:40.977", + "lastModified": "2024-11-21T01:39:31.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -155,6 +154,63 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76126", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1618090", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1618092", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1619856", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/protest.git/commitdiff/c85eaed", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://drupalcode.org/project/protest.git/commitdiff/cf8c543", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49386", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82715", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76126", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2727.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2727.json index dde7f2bee01..32c1a3832ab 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2727.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2727.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2727", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:05.300", - "lastModified": "2017-08-29T01:31:41.023", + "lastModified": "2024-11-21T01:39:31.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -133,6 +132,51 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76292", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1632702", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1632704", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1632734", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49480", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82958", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76292", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2728.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2728.json index 0dc8642b46f..ab18b8dd2c5 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2728.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2728.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2728", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:05.347", - "lastModified": "2017-08-29T01:31:41.087", + "lastModified": "2024-11-21T01:39:31.280", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -143,6 +142,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76345", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1632432", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1632900", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/nodehierarchy.git/commitdiff/8b4b3f5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76345", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2729.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2729.json index 890baf565df..21e555a3086 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2729.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2729.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2729", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:05.397", - "lastModified": "2017-08-29T01:31:41.150", + "lastModified": "2024-11-21T01:39:31.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -130,6 +129,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76344", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1534874", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1632908", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53997", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76344", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2730.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2730.json index d67e8f0e7b5..ba10c4c5fdd 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2730.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2730.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2730", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:05.443", - "lastModified": "2017-08-29T01:31:41.243", + "lastModified": "2024-11-21T01:39:31.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -146,6 +145,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76291", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1258034", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1632918", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49509", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82984", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76291", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2731.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2731.json index ffbfdd5582c..ea4d518acc2 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2731.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2731.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2731", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T00:55:05.520", - "lastModified": "2017-08-29T01:31:41.290", + "lastModified": "2024-11-21T01:39:31.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -207,6 +206,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76332", "source": "secalert@redhat.com" + }, + { + "url": "http://drupal.org/node/1619586", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1633048", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/uc_ajax_cart.git/commitdiff/b59cdd5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53999", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76332", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2737.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2737.json index a7f339ff355..237b39fb5d0 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2737.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2737.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2737", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T17:55:02.913", - "lastModified": "2017-08-29T01:31:41.507", + "lastModified": "2024-11-21T01:39:32.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -261,6 +260,80 @@ { "url": "https://hermes.opensuse.org/messages/15100967", "source": "secalert@redhat.com" + }, + { + "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83398", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49695", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49759", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/28/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54223", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1485-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832532", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76648", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15100967", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2738.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2738.json index 9315280c338..78dc9014b58 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2738.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2738.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2738", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T16:55:25.743", - "lastModified": "2016-10-26T01:59:10.197", + "lastModified": "2024-11-21T01:39:32.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -845,6 +844,49 @@ { "url": "https://bugzilla.gnome.org/show_bug.cgi?id=676090", "source": "secalert@redhat.com" + }, + { + "url": "http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.changes", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.news", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083398.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083403.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/23/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/15/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=676090", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2740.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2740.json index 932380da93a..eac677c4dd8 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2740.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2740.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2740", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-06T17:55:01.393", - "lastModified": "2012-09-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:32.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -186,8 +185,50 @@ "url": "https://www.phplist.com/?lid=567", "source": "secalert@redhat.com", "tags": [ - "Vendor Advisory", - "Patch" + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://securitytracker.com/id?1027181", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18639", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/16/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/17/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5081.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://mantis.phplist.com/view.php?id=16557", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.phplist.com/?lid=567", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" ] } ] diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2741.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2741.json index eb0c2581d3b..eb2e804e6cf 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2741.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2741.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2741", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-06T17:55:01.440", - "lastModified": "2012-09-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:32.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -189,6 +188,48 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://securitytracker.com/id?1027181", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18639", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/16/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/17/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5081.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://mantis.phplist.com/view.php?id=16557", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.phplist.com/?lid=567", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2742.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2742.json index 64edeeba93e..beef1d51943 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2742.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2742.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2742", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T22:55:01.520", - "lastModified": "2017-08-29T01:31:41.570", + "lastModified": "2024-11-21T01:39:33.027", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -215,6 +214,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76407", "source": "secalert@redhat.com" + }, + { + "url": "http://knoxin.blogspot.co.uk/2012/06/revelation-password-manager-considered.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.codepoet.no/revelation/issue/61/file-format-magic-string-version-mismatch", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/18/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/18/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54060", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=421571", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76407", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2743.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2743.json index 62f628b13e6..0bd9f055b00 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2743.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2743.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2743", "sourceIdentifier": "secalert@redhat.com", "published": "2012-06-27T22:55:01.597", - "lastModified": "2017-08-29T01:31:41.633", + "lastModified": "2024-11-21T01:39:33.163", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -215,6 +214,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76408", "source": "secalert@redhat.com" + }, + { + "url": "http://knoxin.blogspot.co.uk/2012/06/revelation-password-manager-considered.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.codepoet.no/revelation/issue/61/file-format-magic-string-version-mismatch", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/18/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/18/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54060", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=421571", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76408", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2744.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2744.json index 6cf6471be59..a77f993e8b4 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2744.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2744.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2744", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-09T10:29:46.963", - "lastModified": "2023-02-13T04:33:47.950", + "lastModified": "2024-11-21T01:39:33.320", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'CWE-476: NULL Pointer Dereference'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -212,6 +210,46 @@ "tags": [ "Patch" ] + }, + { + "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9e2dcf72023d1447f09c47d77c99b0c49659e5ce", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1148.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49928", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54367", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027235", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833402", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/9e2dcf72023d1447f09c47d77c99b0c49659e5ce", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'CWE-476: NULL Pointer Dereference'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2745.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2745.json index 37dc898be34..dde86144ef0 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2745.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2745.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2745", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-09T10:29:47.027", - "lastModified": "2023-02-13T04:33:48.110", + "lastModified": "2024-11-21T01:39:33.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 4.7, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -167,6 +166,61 @@ "tags": [ "Patch" ] + }, + { + "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=79549c6dfda0603dba9a70a53467ce62d9335c33", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1064.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50853", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50961", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54365", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027236", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1567-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1597-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1606-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833428", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2746.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2746.json index 6049a6c636d..09156deee29 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2746.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2746.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2746", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T16:40:34.537", - "lastModified": "2017-09-19T01:34:58.840", + "lastModified": "2024-11-21T01:39:33.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -347,9 +346,79 @@ "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083", "source": "secalert@redhat.com" }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083", + "source": "secalert@redhat.com" + }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19241", "source": "secalert@redhat.com" + }, + { + "url": "http://directory.fedoraproject.org/wiki/Release_Notes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-0997.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1041.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49734", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/83329", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54153", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833482", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76595", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://fedorahosted.org/389/ticket/365", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03772083", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19241", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2747.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2747.json index c5292ff95a7..60a771e7422 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2747.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2747.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2747", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T19:55:03.757", - "lastModified": "2020-02-25T15:48:34.643", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:33.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -158,6 +157,58 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://developer.joomla.org/security/news/470-20120601-core-privilege-escalation", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/83070", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49605", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.joomla.org/announcements/release-news/5427-joomla-255-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/19/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54073", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76415", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2748.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2748.json index a165dac587e..e7830ee1d74 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2748.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2748.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2748", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T19:55:03.803", - "lastModified": "2017-08-29T01:31:41.867", + "lastModified": "2024-11-21T01:39:33.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -122,6 +121,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76414", "source": "secalert@redhat.com" + }, + { + "url": "http://developer.joomla.org/security/news/471-20120602-core-information-disclosure", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83069", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49605", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.joomla.org/announcements/release-news/5427-joomla-255-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/19/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54073", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76414", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2749.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2749.json index 8cc70e7570f..0292573f03e 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2749.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2749.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2749", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-17T00:55:03.517", - "lastModified": "2019-12-17T20:23:43.220", + "lastModified": "2024-11-21T01:39:34.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -587,6 +586,42 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737", "source": "secalert@redhat.com" + }, + { + "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51309", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/53372", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2750.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2750.json index d77b6597f27..c5ec94e701f 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2750.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2750.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2750", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-17T00:55:03.577", - "lastModified": "2022-06-23T16:28:47.770", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:34.183", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -151,6 +150,52 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.debian.org/security/2013/dsa-2780", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/63125", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id/1029184", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833742", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2751.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2751.json index efd2a73379b..5416ab26076 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2751.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2751.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2751", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T16:55:27.960", - "lastModified": "2023-11-07T02:10:42.107", + "lastModified": "2024-11-21T01:39:34.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -250,6 +249,124 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.6.x/CHANGES", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/CHANGES?r1=1920&r2=1919&pathrev=1920", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?r1=1918&r2=1917&pathrev=1918", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49576", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49782", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2506", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:118", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/22/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/22/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54156", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2752.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2752.json index b59aa5c02b2..4e8a95d5ecd 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2752.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2752.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2752", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-01T20:55:06.950", - "lastModified": "2017-08-29T01:31:41.947", + "lastModified": "2024-11-21T01:39:34.480", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/lists/426.html 'Untrusted Search Path'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -113,6 +111,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75891", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/82276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49300", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49322", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53697", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027099", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75891", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/lists/426.html 'Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2753.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2753.json index 8f334d3a2e1..9a051c47065 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2753.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2753.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2753", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-19T20:55:07.037", - "lastModified": "2012-06-26T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'", + "lastModified": "2024-11-21T01:39:34.640", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -129,6 +127,19 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-06/0069.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk76480", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2759.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2759.json index 0d45057afaa..ca5ed8d5143 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2759.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2759.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2759", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-22T16:55:01.570", - "lastModified": "2017-08-29T01:31:42.010", + "lastModified": "2024-11-21T01:39:34.780", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -173,6 +172,30 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75470", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81712", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset/541069", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wordpress.org/extend/plugins/login-with-ajax/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.secureworks.com/research/advisories/SWRX-2012-003/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53423", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75470", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2760.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2760.json index 07f80ccd67d..f047e2bf425 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2760.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2760.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2760", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T19:55:05.477", - "lastModified": "2017-08-29T01:31:42.070", + "lastModified": "2024-11-21T01:39:34.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -145,6 +144,49 @@ { "url": "https://github.com/bmuller/mod_auth_openid/pull/30", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-05/0235.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/112991/Mod_Auth_OpenID-Session-Stealing.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49247", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18917", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:114", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82139", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53661", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75813", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/bmuller/mod_auth_openid/blob/master/ChangeLog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/bmuller/mod_auth_openid/pull/30", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2762.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2762.json index 5feecce9598..b6a45905a22 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2762.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2762.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2762", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-07T19:55:09.837", - "lastModified": "2017-08-29T01:31:42.133", + "lastModified": "2024-11-21T01:39:35.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -280,6 +279,44 @@ { "url": "https://www.htbridge.com/advisory/HTB23092", "source": "cve@mitre.org" + }, + { + "url": "http://blog.s9y.org/archives/241-Serendipity-1.6.2-released.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49234", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/82036", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53620", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75760", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/s9y/Serendipity/commit/87153991d06bc18fe4af05f97810487c4a340a92#diff-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23092", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2763.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2763.json index 08af7159abd..46309ac4351 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2763.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2763.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2763", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T19:55:06.297", - "lastModified": "2022-02-07T17:25:39.963", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:35.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -140,6 +139,74 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://git.gnome.org/browse/gimp/commit/?h=gimp-2-6&id=744f7a4a2b5acb8b531a6f5dd8744ebb95348fc2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00043.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-23.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/31/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/01/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=679215", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2764.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2764.json index b033ef375c0..2b9a2e0ba9b 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2764.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2764.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2764", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-27T10:18:38.323", - "lastModified": "2017-09-19T01:34:58.900", + "lastModified": "2024-11-21T01:39:35.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -309,6 +308,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15375", "source": "cve@mitre.org" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=130276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15375", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2768.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2768.json index db968a7b704..1881a945fb1 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2768.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2768.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2768", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T21:55:01.633", - "lastModified": "2017-08-29T01:31:42.197", + "lastModified": "2024-11-21T01:39:35.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -153,6 +152,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77212", "source": "cve@mitre.org" + }, + { + "url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-July/000208.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50024", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50440", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77212", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2769.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2769.json index 70ccc7f40c4..3d8f0c2ecf8 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2769.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2769.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2769", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T21:55:01.680", - "lastModified": "2017-08-29T01:31:42.257", + "lastModified": "2024-11-21T01:39:35.703", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -343,6 +342,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77211", "source": "cve@mitre.org" + }, + { + "url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-July/000208.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50010", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54684", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77211", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2770.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2770.json index 2fb5c620ea2..9c1f167b5a7 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2770.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2770.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2770", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T21:55:01.727", - "lastModified": "2017-08-29T01:31:42.320", + "lastModified": "2024-11-21T01:39:35.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -112,6 +111,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77213", "source": "cve@mitre.org" + }, + { + "url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-July/000208.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54681", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77213", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2772.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2772.json index 6477bbfd082..df7a4889a91 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2772.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2772.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2772", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.023", - "lastModified": "2023-11-07T02:10:42.530", + "lastModified": "2024-11-21T01:39:36.097", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cb7190cd2c691fd93e4d3664f3fce6c19ee001dd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2774.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2774.json index 58733289480..a37b025c8a8 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2774.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2774.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2774", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.070", - "lastModified": "2023-11-07T02:10:43.070", + "lastModified": "2024-11-21T01:39:36.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -361,6 +360,30 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=59a4b73531428d2f420b4dad545172c8483ced0f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2775.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2775.json index baa5edf1586..c41120bf9dc 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2775.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2775.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2775", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.117", - "lastModified": "2023-11-07T02:10:43.340", + "lastModified": "2024-11-21T01:39:36.447", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9d3032b960ae03066c008d6e6774f68b17a1d69d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2776.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2776.json index cadb5cf7274..87a5a1c3a89 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2776.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2776.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2776", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.180", - "lastModified": "2023-11-07T02:10:43.623", + "lastModified": "2024-11-21T01:39:36.560", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -408,6 +407,42 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=ba775a54bc2136ec5da85385a923b05ee6fab159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2777.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2777.json index aa19576866d..49ee43663d0 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2777.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2777.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2777", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.243", - "lastModified": "2023-11-07T02:10:43.900", + "lastModified": "2024-11-21T01:39:36.677", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2779.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2779.json index 9d992a64d29..a9afc9c473a 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2779.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2779.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2779", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.303", - "lastModified": "2023-11-07T02:10:44.503", + "lastModified": "2024-11-21T01:39:36.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=229e4c133287955d5f3f837520a3602709b21950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2782.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2782.json index 288db8e5bca..8198835209e 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2782.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2782.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2782", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.350", - "lastModified": "2023-11-07T02:10:45.330", + "lastModified": "2024-11-21T01:39:37.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -361,6 +360,30 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=9a57a37b7041581c10629c8241260a5d7bfbc1e7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2783.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2783.json index b988cae2270..0410eb78750 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2783.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2783.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2783", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.397", - "lastModified": "2023-11-07T02:10:45.597", + "lastModified": "2024-11-21T01:39:37.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -472,6 +471,46 @@ { "url": "http://www.ubuntu.com/usn/USN-1706-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d85b3c4fff4c4b255232fcc01edbd57f19d60998", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.5.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1705-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1706-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2784.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2784.json index 1657fafa368..d9cfd46f56e 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2784.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2784.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2784", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.447", - "lastModified": "2023-11-07T02:10:45.877", + "lastModified": "2024-11-21T01:39:37.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=25715064c2ef4978672a91f8c856f3e8809a7c45", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2785.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2785.json index e7c0687eed3..0bdd37a17d5 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2785.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2785.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2785", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.493", - "lastModified": "2023-11-07T02:10:46.167", + "lastModified": "2024-11-21T01:39:37.673", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -365,6 +364,34 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=326f7a68bbd429c63fd2f19f4050658982b5b081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d462949974668ffb013467d12dc4934b9106fe19", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2786.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2786.json index 8828e14d252..fbe57d37133 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2786.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2786.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2786", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.537", - "lastModified": "2023-11-07T02:10:46.440", + "lastModified": "2024-11-21T01:39:37.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d1c95d2ce39560e251fdb14f4af91b04fd7b845c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2787.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2787.json index d50830a2c7d..6d482f64889 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2787.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2787.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2787", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.570", - "lastModified": "2023-11-07T02:10:46.723", + "lastModified": "2024-11-21T01:39:37.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -408,6 +407,42 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=01bf2ad7351fdaa2e21b6bdf963d22d6ffccb920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2788.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2788.json index c7c602adc17..f3f01c681eb 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2788.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2788.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2788", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.617", - "lastModified": "2023-11-07T02:10:47.007", + "lastModified": "2024-11-21T01:39:38.057", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=c41ac870470c614185e1752c11f892809022248a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2789.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2789.json index b0d93a79200..0cf3254c960 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2789.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2789.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2789", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.663", - "lastModified": "2023-11-07T02:10:47.290", + "lastModified": "2024-11-21T01:39:38.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=97a5addfcf0029d0f5538ed70cb38cae4108a618", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2790.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2790.json index f9514155fbc..a445cb53cd8 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2790.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2790.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2790", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.710", - "lastModified": "2023-11-07T02:10:47.560", + "lastModified": "2024-11-21T01:39:38.313", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2837d8dc276760db1821b81df3f794a90bfa56e6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2791.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2791.json index 4735c9c9bcf..c8aa084d5f0 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2791.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2791.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2791", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.743", - "lastModified": "2023-11-07T02:10:47.837", + "lastModified": "2024-11-21T01:39:38.433", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -468,6 +467,42 @@ { "url": "http://www.ubuntu.com/usn/USN-1705-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=0846719dd11ab3f7a7caee13e7af71f71d913389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.5.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1705-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2792.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2792.json index 7cb625c60b8..6151ec27a28 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2792.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2792.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2792", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.787", - "lastModified": "2023-11-07T02:10:48.133", + "lastModified": "2024-11-21T01:39:38.563", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -361,6 +360,30 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=d442c4462a2692e27a24e1a9d0eb6f18725c7bd8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2793.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2793.json index 16016cb39f9..f991b282bfd 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2793.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2793.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2793", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.837", - "lastModified": "2023-11-07T02:10:48.517", + "lastModified": "2024-11-21T01:39:38.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=83c7803f55b3231faeb93c1a634399a70fae9480", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2794.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2794.json index 9d6c2dee222..ea2bba37d0b 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2794.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2794.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2794", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.883", - "lastModified": "2023-11-07T02:10:48.793", + "lastModified": "2024-11-21T01:39:38.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5ad7335ebac2b38bb2a1c8df51a500b78461c05a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2795.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2795.json index a6b10103b52..76344db89f0 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2795.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2795.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2795", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.930", - "lastModified": "2023-11-07T02:10:49.117", + "lastModified": "2024-11-21T01:39:38.977", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -369,6 +368,38 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2a7063de547b1d8fb1cef523469390fb59fb2c50", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=a0abefb0af64a311b15141062c77dd577ba590a3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=b3a43515827f3d22a881c33b87384f01c86786fd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2796.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2796.json index f8cf34b04a1..032c1e7e9d2 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2796.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2796.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2796", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:03.977", - "lastModified": "2023-11-07T02:10:49.410", + "lastModified": "2024-11-21T01:39:39.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -408,6 +407,42 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=5e59a77cec804a9b44c60ea22c17beba6453ef23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2797.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2797.json index 50c1e0e5e6b..1101a359ad5 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2797.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2797.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2797", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:04.023", - "lastModified": "2023-11-07T02:10:49.680", + "lastModified": "2024-11-21T01:39:39.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -409,6 +408,38 @@ { "url": "http://www.ubuntu.com/usn/USN-1705-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=cca9528524c7a4b91451f4322bd50849af5d057e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.5.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1705-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2798.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2798.json index 71feb561d46..0c5cc5434ea 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2798.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2798.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2798", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:04.070", - "lastModified": "2023-11-07T02:10:49.990", + "lastModified": "2024-11-21T01:39:39.373", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -475,6 +474,54 @@ { "url": "http://www.ubuntu.com/usn/USN-1705-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=72b9537d8886f679494651df517dfed9b420cf1f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.5.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1705-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-27xx/CVE-2012-2799.json b/CVE-2012/CVE-2012-27xx/CVE-2012-2799.json index 5047e1559f0..b61bf491475 100644 --- a/CVE-2012/CVE-2012-27xx/CVE-2012-2799.json +++ b/CVE-2012/CVE-2012-27xx/CVE-2012-2799.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2799", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:04.117", - "lastModified": "2023-11-07T02:10:50.360", + "lastModified": "2024-11-21T01:39:39.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -361,6 +360,30 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=64bd7f8e4db1742e86c5ed02bd530688b74063e3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2800.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2800.json index f0014dcdaee..c452afda54f 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2800.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2800.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2800", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:04.163", - "lastModified": "2023-11-07T02:10:50.627", + "lastModified": "2024-11-21T01:39:39.637", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -467,6 +466,46 @@ { "url": "http://www.securityfocus.com/bid/55355", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f0bf9e9c2a65e9a2b9d9e4e94f99acb191dc7ae7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2801.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2801.json index 7ca2a40358e..4b11d3d4639 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2801.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2801.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2801", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:04.210", - "lastModified": "2023-11-07T02:10:50.913", + "lastModified": "2024-11-21T01:39:39.777", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -475,6 +474,54 @@ { "url": "http://www.ubuntu.com/usn/USN-1705-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=1df49142bab1b7bccd11392aa9e819e297d21a6e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.5.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1705-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2802.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2802.json index 171b1c761a0..5a9c04f6524 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2802.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2802.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2802", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:04.243", - "lastModified": "2023-11-07T02:10:51.203", + "lastModified": "2024-11-21T01:39:39.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -416,6 +415,50 @@ { "url": "http://www.ubuntu.com/usn/USN-1705-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=2c22701c371c2f3dea21fcdbb97c981939fb77af", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.4.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.5.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:079", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1705-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2803.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2803.json index 8aba279c08f..738d1d3cc5f 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2803.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2803.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2803", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:04.287", - "lastModified": "2023-11-07T02:10:51.477", + "lastModified": "2024-11-21T01:39:40.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -472,6 +471,46 @@ { "url": "http://www.ubuntu.com/usn/USN-1706-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=951cbea56fdc03ef96d07fbd7e5bed755d42ac8a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.7.7.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.5.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1705-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1706-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2804.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2804.json index d66eefbaf0e..7aa5fe4c4ff 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2804.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2804.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2804", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-09-10T22:55:04.337", - "lastModified": "2023-11-07T02:10:51.743", + "lastModified": "2024-11-21T01:39:40.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -409,6 +408,38 @@ { "url": "http://www.ubuntu.com/usn/USN-1705-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://ffmpeg.org/security.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=4a80ebe491609e04110a1dd540a0ca79d3be3d04", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libav.org/releases/libav-0.8.5.changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50468", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55355", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1705-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2806.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2806.json index c867e587680..017389924aa 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2806.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2806.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2806", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-13T20:55:08.163", - "lastModified": "2023-12-20T18:28:58.957", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:40.453", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -149,6 +148,84 @@ "tags": [ "VDB Entry" ] + }, + { + "url": "http://libjpeg-turbo.svn.sourceforge.net/viewvc/libjpeg-turbo?view=revision&revision=830", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] + }, + { + "url": "http://osvdb.org/84040", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49883", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://secunia.com/advisories/50753", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-13.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/17/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54480", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=759802", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76952", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2807.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2807.json index 002109b8023..316b2f7f9e1 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2807.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2807.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2807", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:38.353", - "lastModified": "2023-11-07T02:10:52.540", + "lastModified": "2024-11-21T01:39:40.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -617,6 +616,78 @@ { "url": "https://hermes.opensuse.org/messages/15375990", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=129930", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50658", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50800", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/55568", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5934", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2521", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54718", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1587-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15375990", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2812.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2812.json index 0e280362279..ca27723cc7c 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2812.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2812.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2812", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-07-13T10:34:59.357", - "lastModified": "2023-11-07T02:10:53.180", + "lastModified": "2024-11-21T01:39:40.847", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -129,6 +128,38 @@ { "url": "http://www.ubuntu.com/usn/USN-1513-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1255.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2813.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2813.json index 5c2d6600990..a970644f3ed 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2813.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2813.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2813", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-07-13T10:34:59.390", - "lastModified": "2023-11-07T02:10:53.430", + "lastModified": "2024-11-21T01:39:40.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -125,6 +124,34 @@ { "url": "http://www.ubuntu.com/usn/USN-1513-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1255.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2814.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2814.json index 795d6d544d7..f4861a6a5d9 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2814.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2814.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2814", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-07-13T10:34:59.437", - "lastModified": "2023-11-07T02:10:53.680", + "lastModified": "2024-11-21T01:39:41.097", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,42 @@ { "url": "http://www.ubuntu.com/usn/USN-1513-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1255.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2815.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2815.json index 30acf266266..1595af1e8d4 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2815.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2815.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2815", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:38.400", - "lastModified": "2023-11-07T02:10:53.927", + "lastModified": "2024-11-21T01:39:41.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -314,6 +313,38 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15662", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=118633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15662", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2816.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2816.json index 92cbbc72acd..a9470b9484a 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2816.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2816.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2816", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:38.447", - "lastModified": "2023-11-07T02:10:54.210", + "lastModified": "2024-11-21T01:39:41.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -314,6 +313,26 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15591", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=119150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=119250", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15591", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2817.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2817.json index 0150e82d6d6..80802ff09e4 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2817.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2817.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2817", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:38.493", - "lastModified": "2023-11-07T02:10:54.630", + "lastModified": "2024-11-21T01:39:41.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -314,6 +313,38 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15264", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=120222", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5502", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15264", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2818.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2818.json index 5874c1087e6..d955319a411 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2818.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2818.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2818", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:38.540", - "lastModified": "2023-11-07T02:10:55.037", + "lastModified": "2024-11-21T01:39:41.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -322,6 +321,46 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14771", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=120944", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5502", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14771", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2819.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2819.json index 3ade8881c43..b85e9d84df5 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2819.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2819.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2819", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:38.837", - "lastModified": "2023-11-07T02:10:55.397", + "lastModified": "2024-11-21T01:39:41.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -314,6 +313,38 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14938", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=120977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://trac.webkit.org/changeset/117191", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://trac.webkit.org/changeset/118410", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.webkit.org/show_bug.cgi?id=85942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromiumcodereview.appspot.com/10444013", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14938", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2820.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2820.json index 443469b1ce8..11b5a72fcb2 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2820.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2820.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2820", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:38.887", - "lastModified": "2023-11-07T02:10:55.763", + "lastModified": "2024-11-21T01:39:41.880", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -298,6 +297,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15468", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=121926", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15468", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2821.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2821.json index e5a34cf2343..85189140034 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2821.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2821.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2821", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:38.947", - "lastModified": "2023-11-07T02:10:56.170", + "lastModified": "2024-11-21T01:39:42.003", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -298,6 +297,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15565", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=122925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15565", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2822.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2822.json index 6bf3bd7b5fa..36d44911a7e 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2822.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2822.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2822", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.010", - "lastModified": "2023-11-07T02:10:56.577", + "lastModified": "2024-11-21T01:39:42.113", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -290,6 +289,14 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15166", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15166", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2823.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2823.json index 3426d462db8..aeff33c33d6 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2823.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2823.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2823", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.040", - "lastModified": "2023-11-07T02:10:56.980", + "lastModified": "2024-11-21T01:39:42.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -298,6 +297,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15204", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=124356", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15204", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2824.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2824.json index 59c5e50aa15..22883d58418 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2824.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2824.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2824", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.087", - "lastModified": "2023-11-07T02:10:57.330", + "lastModified": "2024-11-21T01:39:42.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -332,6 +331,30 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15666", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=125374", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15666", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2825.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2825.json index cec579be343..a271c73e7f0 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2825.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2825.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2825", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.120", - "lastModified": "2023-11-07T02:10:57.663", + "lastModified": "2024-11-21T01:39:42.487", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -322,6 +321,46 @@ { "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=127417", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5934", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2826.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2826.json index 112aebca32f..78915de5ac6 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2826.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2826.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2826", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.167", - "lastModified": "2023-11-07T02:10:58.010", + "lastModified": "2024-11-21T01:39:42.610", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -298,6 +297,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15511", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=128688", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15511", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2827.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2827.json index 3902414fe31..5354aef35da 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2827.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2827.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2827", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.197", - "lastModified": "2023-11-07T02:10:58.360", + "lastModified": "2024-11-21T01:39:42.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -302,6 +301,14 @@ { "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=129826", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2828.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2828.json index 7e8e92db71e..69c9f19d249 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2828.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2828.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2828", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.243", - "lastModified": "2023-11-07T02:10:58.763", + "lastModified": "2024-11-21T01:39:42.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -294,6 +293,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15287", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=129857", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15287", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2829.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2829.json index 0b0d90dd975..7997b69b504 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2829.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2829.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2829", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.277", - "lastModified": "2023-11-07T02:10:59.217", + "lastModified": "2024-11-21T01:39:43.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -314,6 +313,38 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15144", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=129947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5502", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15144", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2830.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2830.json index 7a37a57aaaa..7450a8c55f5 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2830.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2830.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2830", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.323", - "lastModified": "2023-11-07T02:10:59.630", + "lastModified": "2024-11-21T01:39:43.147", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -298,6 +297,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15483", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=129951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15483", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2831.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2831.json index 8b593ade1a5..7cbeba013e7 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2831.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2831.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2831", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.353", - "lastModified": "2023-11-07T02:11:00.227", + "lastModified": "2024-11-21T01:39:43.277", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -314,6 +313,38 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14708", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=130356", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5502", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14708", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2832.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2832.json index 531cfa88711..3fec90da221 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2832.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2832.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2832", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.387", - "lastModified": "2023-11-07T02:11:00.643", + "lastModified": "2024-11-21T01:39:43.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -294,6 +293,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15455", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=131553", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15455", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2833.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2833.json index 4b97b755bb7..33454844b43 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2833.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2833.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2833", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.433", - "lastModified": "2023-11-07T02:11:01.057", + "lastModified": "2024-11-21T01:39:43.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -294,6 +293,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15584", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=132156", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15584", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2834.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2834.json index 4b386dc2dbd..9dea474b95c 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2834.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2834.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2834", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-06-27T10:18:39.463", - "lastModified": "2023-11-07T02:11:01.383", + "lastModified": "2024-11-21T01:39:43.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -298,6 +297,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15444", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=132779", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/stable-channel-update_26.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15075728", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15444", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2836.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2836.json index 48d4d48f6de..fc5134965e1 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2836.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2836.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2836", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-07-13T10:34:59.467", - "lastModified": "2023-11-07T02:11:01.800", + "lastModified": "2024-11-21T01:39:43.747", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -129,6 +128,38 @@ { "url": "http://www.ubuntu.com/usn/USN-1513-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1255.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2837.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2837.json index c76c898d868..48eb47e6d46 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2837.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2837.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2837", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-07-13T10:34:59.513", - "lastModified": "2023-11-07T02:11:02.133", + "lastModified": "2024-11-21T01:39:43.870", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -129,6 +128,38 @@ { "url": "http://www.ubuntu.com/usn/USN-1513-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1255.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2840.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2840.json index 81d4222242d..758884aa891 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2840.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2840.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2840", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-07-13T10:34:59.547", - "lastModified": "2023-11-07T02:11:02.380", + "lastModified": "2024-11-21T01:39:43.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -125,6 +124,34 @@ { "url": "http://www.ubuntu.com/usn/USN-1513-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1255.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2841.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2841.json index ffb13eea4f3..e02b4ebd25c 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2841.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2841.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2841", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-07-13T10:34:59.593", - "lastModified": "2023-11-07T02:11:02.633", + "lastModified": "2024-11-21T01:39:44.093", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +102,38 @@ { "url": "http://www.ubuntu.com/usn/USN-1513-1", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1255.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1513-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2842.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2842.json index 36c1043ba1f..3cf4fcc8763 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2842.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2842.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2842", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-07-12T21:55:06.030", - "lastModified": "2023-11-07T02:11:02.890", + "lastModified": "2024-11-21T01:39:44.213", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -349,6 +348,38 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15664", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=129898", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5502", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15664", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2843.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2843.json index 2ed510e46de..6fb08ce3def 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2843.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2843.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2843", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-07-12T21:55:06.093", - "lastModified": "2023-11-07T02:11:03.177", + "lastModified": "2024-11-21T01:39:44.343", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -349,6 +348,38 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15569", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=130595", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5502", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15569", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2844.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2844.json index acd9c323a2f..9f24a45d559 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2844.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2844.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2844", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-07-12T21:55:06.157", - "lastModified": "2023-11-07T02:11:03.603", + "lastModified": "2024-11-21T01:39:44.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -329,6 +328,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15039", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=133450", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15039", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2845.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2845.json index fbb1b7b937d..69248603b49 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2845.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2845.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2845", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-07-13T10:34:59.670", - "lastModified": "2023-11-07T02:11:03.937", + "lastModified": "2024-11-21T01:39:44.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ { "url": "http://www.securityfocus.com/bid/54437", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://secunia.com/advisories/49988", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29534027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:107", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54437", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2846.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2846.json index 88327d5010b..47b7f133f47 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2846.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2846.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2846", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.367", - "lastModified": "2023-11-07T02:11:04.360", + "lastModified": "2024-11-21T01:39:44.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -207,6 +206,14 @@ { "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=125225", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2847.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2847.json index 3042781aecc..b813e812b72 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2847.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2847.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2847", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.430", - "lastModified": "2023-11-07T02:11:04.610", + "lastModified": "2024-11-21T01:39:44.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -374,6 +373,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15735", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=127522", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15735", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2848.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2848.json index 3ad478751ae..01d83b6fe52 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2848.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2848.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2848", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.493", - "lastModified": "2023-11-07T02:11:05.113", + "lastModified": "2024-11-21T01:39:44.977", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -374,6 +373,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15658", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=127525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15658", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2849.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2849.json index 09954d36922..8f299ad49c9 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2849.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2849.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2849", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.570", - "lastModified": "2023-11-07T02:11:05.527", + "lastModified": "2024-11-21T01:39:45.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -374,6 +373,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15653", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=128163", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15653", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2850.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2850.json index e219fbed44c..0a9726d4364 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2850.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2850.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2850", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.617", - "lastModified": "2023-11-07T02:11:05.917", + "lastModified": "2024-11-21T01:39:45.243", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -406,6 +405,50 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15630", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=130251", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=130592", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=130611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=131068", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=131237", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=131252", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=131621", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=131690", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=132860", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15630", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2851.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2851.json index af460a9c0b5..cf2c0e64c6b 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2851.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2851.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2851", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.680", - "lastModified": "2023-11-07T02:11:06.480", + "lastModified": "2024-11-21T01:39:45.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -382,6 +381,26 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15705", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=132585", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=132694", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=132861", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15705", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2852.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2852.json index c0bcc68f008..f4c74887a79 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2852.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2852.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2852", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.713", - "lastModified": "2023-11-07T02:11:06.883", + "lastModified": "2024-11-21T01:39:45.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -374,6 +373,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15744", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=134028", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15744", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2853.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2853.json index 1dfd4e9aac4..47233eb0663 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2853.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2853.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2853", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.760", - "lastModified": "2023-11-07T02:11:07.250", + "lastModified": "2024-11-21T01:39:46.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -374,6 +373,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15439", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=134101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15439", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2854.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2854.json index 2ddddd73b03..5ae8f0689ec 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2854.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2854.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2854", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.790", - "lastModified": "2023-11-07T02:11:07.640", + "lastModified": "2024-11-21T01:39:46.133", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -374,6 +373,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15698", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=134519", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15698", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2855.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2855.json index 86757e4227b..cab9b3d43bf 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2855.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2855.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2855", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.837", - "lastModified": "2023-11-07T02:11:08.017", + "lastModified": "2024-11-21T01:39:46.253", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -374,6 +373,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15038", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=134888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15038", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2856.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2856.json index a86a9ec2628..fee53519066 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2856.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2856.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2856", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.883", - "lastModified": "2023-11-07T02:11:08.477", + "lastModified": "2024-11-21T01:39:46.367", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -378,6 +377,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15053", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=134954", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=135264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15053", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2857.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2857.json index 575635e4187..0b14c2586d0 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2857.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2857.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2857", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.917", - "lastModified": "2023-11-07T02:11:08.927", + "lastModified": "2024-11-21T01:39:46.510", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -412,6 +411,30 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15336", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=136235", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5642", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15336", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2858.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2858.json index 7c51ab57339..38d9dd0da60 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2858.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2858.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2858", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.963", - "lastModified": "2023-11-07T02:11:09.640", + "lastModified": "2024-11-21T01:39:46.653", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -374,6 +373,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15679", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=136894", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15679", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2859.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2859.json index f767d983f0d..e3068d11cee 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2859.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2859.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2859", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:01.993", - "lastModified": "2023-11-07T02:11:10.357", + "lastModified": "2024-11-21T01:39:46.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -207,6 +206,14 @@ { "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=137541", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2860.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2860.json index e4d5df7c45f..240d3487fb6 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2860.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2860.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2860", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-06T15:55:02.023", - "lastModified": "2023-11-07T02:11:10.870", + "lastModified": "2024-11-21T01:39:46.897", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -374,6 +373,18 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15709", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=137671", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15709", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2862.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2862.json index 60e9d64a2e5..8ed6d6f32ec 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2862.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2862.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2862", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-09T10:29:47.197", - "lastModified": "2023-11-07T02:11:11.437", + "lastModified": "2024-11-21T01:39:47.023", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -277,6 +276,26 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14788", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=136643", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=137721", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=137957", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/08/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14788", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2863.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2863.json index e8eccbbb81d..061a3aca961 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2863.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2863.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2863", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-09T10:29:47.247", - "lastModified": "2023-11-07T02:11:11.877", + "lastModified": "2024-11-21T01:39:47.137", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -273,6 +272,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14823", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=136968", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=137361", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/08/stable-channel-update.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14823", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2864.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2864.json index 9058ad3a9b4..407f42bfe44 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2864.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2864.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2864", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-22T10:42:04.680", - "lastModified": "2023-11-07T02:11:12.340", + "lastModified": "2024-11-21T01:39:47.247", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -288,6 +287,30 @@ { "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0264", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=141901", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/08/stable-channel-update-for-chrome-os.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51215", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1623-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0264", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2865.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2865.json index 9031de7805e..2767f1cf115 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2865.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2865.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2865", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-31T19:55:00.763", - "lastModified": "2023-11-07T02:11:12.870", + "lastModified": "2024-11-21T01:39:47.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -367,6 +366,26 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14866", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=121347", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/85030", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14866", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2866.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2866.json index 9af91771ae2..ddf2eda4431 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2866.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2866.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2866", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-31T19:55:00.810", - "lastModified": "2023-11-07T02:11:13.490", + "lastModified": "2024-11-21T01:39:47.487", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -371,6 +370,30 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15609", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=134897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/85031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78175", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15609", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2867.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2867.json index a1ee4a958dd..002c9f3a449 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2867.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2867.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2867", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-31T19:55:00.887", - "lastModified": "2023-11-07T02:11:14.013", + "lastModified": "2024-11-21T01:39:47.617", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -371,6 +370,30 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15130", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=135485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/85032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78176", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15130", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2868.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2868.json index 0806fd94f1b..45b7b237a51 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2868.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2868.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2868", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-31T19:55:00.967", - "lastModified": "2023-11-07T02:11:14.437", + "lastModified": "2024-11-21T01:39:47.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -371,6 +370,30 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15842", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=136881", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/85033", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78177", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15842", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2869.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2869.json index 73094866a22..597a46d1adc 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2869.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2869.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2869", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-31T19:55:01.013", - "lastModified": "2023-11-07T02:11:14.850", + "lastModified": "2024-11-21T01:39:47.857", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -371,6 +370,30 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15710", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=137778", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/85034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78178", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15710", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2870.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2870.json index b3ae4f1f7ca..127e03e66d1 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2870.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2870.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2870", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-31T19:55:01.077", - "lastModified": "2023-11-07T02:11:15.267", + "lastModified": "2024-11-21T01:39:48.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -741,6 +740,78 @@ { "url": "https://chromiumcodereview.appspot.com/10830177", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=138672", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=140368", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50838", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/functions.c?r1=75684&r2=149998", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/functions.c?view=log", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/pattern.c?r1=118654&r2=150123", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/pattern.c?view=log", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5934", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2555", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromiumcodereview.appspot.com/10823168", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromiumcodereview.appspot.com/10830177", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2871.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2871.json index 9ef1eb7e332..6a4819941cb 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2871.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2871.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2871", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-31T19:55:01.123", - "lastModified": "2023-11-07T02:11:15.687", + "lastModified": "2024-11-21T01:39:48.170", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/704.html\n\n'CWE-704: Incorrect Type Conversion or Cast'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -645,6 +643,67 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78179", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=138673", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50838", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src/include/libxml/tree.h?r1=56276&r2=149930", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src/include/libxml/tree.h?view=log", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5934", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT6001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2555", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:164", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://chromiumcodereview.appspot.com/10824157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78179", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/704.html\n\n'CWE-704: Incorrect Type Conversion or Cast'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-28xx/CVE-2012-2872.json b/CVE-2012/CVE-2012-28xx/CVE-2012-2872.json index 5f89fa9bf78..41d05d3a75d 100644 --- a/CVE-2012/CVE-2012-28xx/CVE-2012-2872.json +++ b/CVE-2012/CVE-2012-28xx/CVE-2012-2872.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2872", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2012-08-31T19:55:01.183", - "lastModified": "2023-11-07T02:11:16.040", + "lastModified": "2024-11-21T01:39:48.320", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -371,6 +370,30 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15853", "source": "chrome-cve-admin@google.com" + }, + { + "url": "http://code.google.com/p/chromium/issues/detail?id=142956", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/85037", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78181", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15853", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2901.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2901.json index b3bea39265b..9aa6749190b 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2901.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2901.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2901", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:02.413", - "lastModified": "2017-08-29T01:31:44.523", + "lastModified": "2024-11-21T01:39:52.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -115,6 +114,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75670", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49206", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/secunia_research/2012-14/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.joomlacontenteditor.net/news/item/jce-21-released?category_id=32", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75670", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2902.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2902.json index bc660793d9c..be056278034 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2902.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2902.json @@ -2,10 +2,8 @@ "id": "CVE-2012-2902", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:02.460", - "lastModified": "2017-08-29T01:31:44.587", + "lastModified": "2024-11-21T01:39:52.177", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/434.html 'Unrestricted Upload of File with Dangerous Type'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -120,6 +118,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75671", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49206", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/secunia_research/2012-15/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.joomlacontenteditor.net/news/item/jce-21-released?category_id=32", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/51002", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75671", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/434.html 'Unrestricted Upload of File with Dangerous Type'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2903.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2903.json index ccae2666647..2c73e640c87 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2903.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2903.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2903", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:02.743", - "lastModified": "2017-08-29T01:31:44.650", + "lastModified": "2024-11-21T01:39:52.323", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -554,6 +553,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75703", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49212", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.net/tracker/?func=detail&aid=3527242&group_id=157964&atid=805929", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.darksecurity.de/index.php?/215-SSCHADV2012-013-PHP-Address-Book-7.0.0-Multiple-security-vulnerabilities.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53598", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75703", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2904.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2904.json index 500be2fe6b2..a7f964559b0 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2904.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2904.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2904", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:03.337", - "lastModified": "2017-08-29T01:31:44.727", + "lastModified": "2024-11-21T01:39:52.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -117,6 +116,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75672", "source": "cve@mitre.org" + }, + { + "url": "http://developer.longtailvideo.com/trac/ticket/1585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2012/May/132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49130", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.longtailvideo.com/support/forums/jw-player/bug-reports/26699/xss-exists-in-debug-functionality", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.wooyun.org/bugs/wooyun-2010-07166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75672", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2905.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2905.json index cc26a0b840f..aa8b47b75a7 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2905.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2905.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2905", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:06.697", - "lastModified": "2017-08-29T01:31:44.773", + "lastModified": "2024-11-21T01:39:52.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75690", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81991", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18889", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5091.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75690", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2906.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2906.json index 70c591e255c..3ae0559eb5f 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2906.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2906.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2906", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:06.743", - "lastModified": "2017-08-29T01:31:44.837", + "lastModified": "2024-11-21T01:39:52.797", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75689", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112804/Artiphp-CMS-5.5.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49195", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/81990", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53586", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5090.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75689", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2907.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2907.json index dc7a7bb7e29..6339df66eda 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2907.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2907.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2907", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:06.930", - "lastModified": "2017-08-29T01:31:44.900", + "lastModified": "2024-11-21T01:39:52.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -131,6 +130,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75712", "source": "cve@mitre.org" + }, + { + "url": "http://drupal.org/node/1585878", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://drupal.org/node/1585890", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/aberdeen.git/commitdiff/1994e8e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/27/10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53581", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75712", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2908.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2908.json index 2121c311a66..55945f2742f 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2908.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2908.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2908", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:07.210", - "lastModified": "2017-08-29T01:31:44.960", + "lastModified": "2024-11-21T01:39:53.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75575", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53496", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=525", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75575", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2909.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2909.json index d0aac21c335..56e9e49dabe 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2909.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2909.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2909", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:07.290", - "lastModified": "2017-08-29T01:31:45.023", + "lastModified": "2024-11-21T01:39:53.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75577", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53496", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=525", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75577", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2910.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2910.json index 3b55927ec3c..42a313d7e70 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2910.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2910.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2910", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:07.350", - "lastModified": "2017-08-29T01:31:45.087", + "lastModified": "2024-11-21T01:39:53.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75709", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112797/SiliSoftware-phpThumb-1.7.11-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53572", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5088.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75709", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2911.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2911.json index bf74f36370c..8fdd3a219ce 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2911.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2911.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2911", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:07.383", - "lastModified": "2017-08-29T01:31:45.150", + "lastModified": "2024-11-21T01:39:53.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75710", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112801/SiliSoftware-backupDB-1.2.7a-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53575", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5089.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75710", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2912.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2912.json index 6347d4e4235..e702bb699d2 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2912.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2912.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2912", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:07.430", - "lastModified": "2017-08-29T01:31:45.210", + "lastModified": "2024-11-21T01:39:53.673", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53525", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2913.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2913.json index 5684b5f49d4..c304c0401f0 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2913.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2913.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2913", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:07.460", - "lastModified": "2017-08-29T01:31:45.273", + "lastModified": "2024-11-21T01:39:53.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75628", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112699/WordPress-Leaflet-0.0.1-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53526", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75628", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2914.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2914.json index 9a777b3b905..4d829c4321f 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2914.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2914.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2914", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:07.507", - "lastModified": "2017-08-29T01:31:45.337", + "lastModified": "2024-11-21T01:39:53.963", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75708", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112785/Unijimpe-Captcha-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53585", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75708", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2915.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2915.json index 9a848f2e219..826693f0ffa 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2915.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2915.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2915", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:07.540", - "lastModified": "2017-08-29T01:31:45.383", + "lastModified": "2024-11-21T01:39:54.103", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75698", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/82001", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48741", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53566", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75698", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2916.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2916.json index 66f67ec16b0..06add1a7d32 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2916.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2916.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2916", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:07.600", - "lastModified": "2017-08-29T01:31:45.447", + "lastModified": "2024-11-21T01:39:54.320", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -216,6 +215,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75615", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112692/WordPress-SABRE-1.2.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fsabre&old=534490&new_path=%2Fsabre&new=534490", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/sabre/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75615", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2917.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2917.json index 3c1ba6a357f..543a40fee85 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2917.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2917.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2917", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T18:55:07.647", - "lastModified": "2017-08-29T01:31:45.493", + "lastModified": "2024-11-21T01:39:54.623", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75616", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112691/WordPress-Share-And-Follow-1.80.3-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53533", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75616", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2918.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2918.json index ea98a11b226..be3c1a42e72 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2918.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2918.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2918", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T22:55:00.960", - "lastModified": "2017-08-29T01:31:45.557", + "lastModified": "2024-11-21T01:39:54.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75476", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112585/Chevreto-Upload-Script-Cross-Site-Scripting-User-Enumeration.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53448", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75476", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2919.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2919.json index e09317bfd38..a7e295969f1 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2919.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2919.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2919", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T22:55:01.007", - "lastModified": "2017-08-29T01:31:45.603", + "lastModified": "2024-11-21T01:39:55.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75477", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112585/Chevreto-Upload-Script-Cross-Site-Scripting-User-Enumeration.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53448", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75477", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2920.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2920.json index 2470fc5a8cd..85158f6f9a3 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2920.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2920.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2920", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T22:55:01.197", - "lastModified": "2017-08-29T01:31:45.680", + "lastModified": "2024-11-21T01:39:55.283", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -201,6 +200,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75496", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81806", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fuser-photo&old=541880&new_path=%2Fuser-photo&new=541880", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49100", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/user-photo/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53449", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75496", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2921.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2921.json index 0ddaf69efab..aaeffdc1b45 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2921.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2921.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2921", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T22:55:01.303", - "lastModified": "2013-08-22T03:55:30.997", + "lastModified": "2024-11-21T01:39:55.493", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -169,6 +168,38 @@ { "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0157", "source": "cve@mitre.org" + }, + { + "url": "http://freecode.com/projects/feedparser/releases/344371", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81701", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49256", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:118", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/feedparser/source/browse/trunk/NEWS?spec=svn706&r=706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/feedparser/source/detail?r=703&path=/trunk/feedparser/feedparser.py", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0157", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2922.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2922.json index 2488602010a..ee597ae52a8 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2922.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2922.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2922", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T22:55:01.337", - "lastModified": "2017-08-29T01:31:45.743", + "lastModified": "2024-11-21T01:39:55.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -505,6 +504,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75531", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0052.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0053.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0055.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81817", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49131", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:074", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/02/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75531", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2923.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2923.json index b1ebba99e7b..2b1c63ad02a 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2923.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2923.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2923", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T22:55:01.477", - "lastModified": "2017-08-29T01:31:45.807", + "lastModified": "2024-11-21T01:39:56.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75513", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18858", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53472", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75513", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2924.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2924.json index 4f770644417..c99086ff4e9 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2924.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2924.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2924", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T22:55:01.523", - "lastModified": "2017-08-29T01:31:45.853", + "lastModified": "2024-11-21T01:39:56.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75514", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18858", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/81831", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53472", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75514", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2925.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2925.json index 98294596f67..883df2ba1bd 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2925.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2925.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2925", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-21T22:55:01.553", - "lastModified": "2017-08-29T01:31:45.900", + "lastModified": "2024-11-21T01:39:56.943", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75501", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18845", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75501", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2926.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2926.json index 5145f95294b..9d692ba6b4a 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2926.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2926.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2926", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-22T15:55:02.853", - "lastModified": "2021-12-13T16:01:20.207", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:57.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 9.1, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.2 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -279,6 +278,84 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/81993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49146", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53595", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2927.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2927.json index feb1ae7ec45..fe2b10b4206 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2927.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2927.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2927", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-22T15:55:02.900", - "lastModified": "2017-08-29T01:31:46.150", + "lastModified": "2024-11-21T01:39:57.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -391,6 +390,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697", "source": "cve@mitre.org" + }, + { + "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/81993", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53595", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2928.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2928.json index 4345a946ab8..2cd386acc66 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2928.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2928.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2928", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-22T15:55:02.947", - "lastModified": "2022-05-14T03:25:27.250", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:39:57.573", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -285,6 +284,53 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] + }, + { + "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/81993", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/49166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53595", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2935.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2935.json index 53bfba5de56..b27b224f65e 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2935.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2935.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2935", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T19:55:01.220", - "lastModified": "2017-08-29T01:31:46.273", + "lastModified": "2024-11-21T01:39:58.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -100,6 +99,14 @@ { "url": "https://github.com/osCommerce/oscommerce/commit/a5aeb0448cc333cc4b801c0e01981b218fd9c7df", "source": "cve@mitre.org" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75900", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/osCommerce/oscommerce/commit/a5aeb0448cc333cc4b801c0e01981b218fd9c7df", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2936.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2936.json index a0208d75fe2..6f376f5269c 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2936.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2936.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2936", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T20:55:01.860", - "lastModified": "2017-08-29T01:31:46.320", + "lastModified": "2024-11-21T01:39:58.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -225,6 +224,44 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75764", "source": "cve@mitre.org" + }, + { + "url": "http://forums.pligg.com/downloads.php?do=file&id=15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pligg.svn.sourceforge.net/viewvc/pligg?view=revision&revision=2461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/45431", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/secunia_research/2012-18/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53625", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75764", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2937.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2937.json index 71aa84cf280..e57585e67aa 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2937.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2937.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2937", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T20:55:01.907", - "lastModified": "2017-08-29T01:31:46.383", + "lastModified": "2024-11-21T01:39:58.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -229,6 +228,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75765", "source": "cve@mitre.org" + }, + { + "url": "http://forums.pligg.com/downloads.php?do=file&id=15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82049", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82050", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://pligg.svn.sourceforge.net/viewvc/pligg?view=revision&revision=2461", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/45431", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/secunia_research/2012-19/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53625", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75765", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2938.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2938.json index bfe177e1f30..f1f9f513133 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2938.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2938.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2938", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T20:55:03.453", - "lastModified": "2017-08-29T01:31:46.460", + "lastModified": "2024-11-21T01:39:59.057", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75541", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81887", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/81888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18871", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=530", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75541", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2939.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2939.json index 733823af59f..101e2891373 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2939.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2939.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2939", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T20:55:04.640", - "lastModified": "2017-08-29T01:31:46.523", + "lastModified": "2024-11-21T01:39:59.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75542", "source": "cve@mitre.org" + }, + { + "url": "http://iel-sayed.blogspot.com/2012/05/travelon-express-cms-v622-multiple-web.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18871", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/81889", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53500", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=530", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75542", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2940.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2940.json index a6f33b7f6d8..8d6b61914df 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2940.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2940.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2940", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T20:55:04.703", - "lastModified": "2017-08-29T01:31:46.570", + "lastModified": "2024-11-21T01:39:59.337", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75733", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18902", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53636", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75733", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2941.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2941.json index 5065b1078f2..7dcab7ec7d0 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2941.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2941.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2941", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T20:55:04.767", - "lastModified": "2017-08-29T01:31:46.650", + "lastModified": "2024-11-21T01:39:59.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75788", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112945/Yandex.Server-2010-9.0-Enterprise-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53622", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75788", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2942.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2942.json index d49313e09bb..31322722ca8 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2942.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2942.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2942", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T20:55:05.017", - "lastModified": "2023-11-07T02:11:28.213", + "lastModified": "2024-11-21T01:39:59.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -123,6 +122,57 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75777", "source": "cve@mitre.org" + }, + { + "url": "http://haproxy.1wt.eu/#news", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://haproxy.1wt.eu/download/1.4/src/CHANGELOG", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://haproxy.1wt.eu/git?p=haproxy-1.4.git%3Ba=commit%3Bh=30297cb17147a8d339eb160226bcc08c91d9530b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49261", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201301-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2013/dsa-2711", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/23/12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/23/15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/05/28/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1800-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75777", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2943.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2943.json index 4a7f992b592..4e8ecabefb0 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2943.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2943.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2943", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-27T20:55:05.063", - "lastModified": "2017-08-29T01:31:46.757", + "lastModified": "2024-11-21T01:39:59.773", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75768", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112859/Cryptographp-Local-File-Inclusion-HTTP-Response-Splitting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75768", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2944.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2944.json index d6f2fe48178..83b6d05bb83 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2944.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2944.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2944", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-01T20:55:08.857", - "lastModified": "2018-01-05T02:29:32.837", + "lastModified": "2024-11-21T01:39:59.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -162,6 +161,56 @@ { "url": "https://hermes.opensuse.org/messages/15514634", "source": "cve@mitre.org" + }, + { + "url": "http://alioth.debian.org/tracker/?func=detail&aid=313636", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://networkupstools.org/docs/user-manual.chunked/apis01.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49348", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50389", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://trac.networkupstools.org/projects/nut/changeset/3633", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2484", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:087", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82409", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53743", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75980", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15514634", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2947.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2947.json index 9228e2d6d29..160d7cdae20 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2947.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2947.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2947", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-02T15:55:00.983", - "lastModified": "2017-11-13T16:44:23.247", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:00.217", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -657,6 +656,42 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0144.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2012-007.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49303", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2493", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027102", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2948.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2948.json index e25e9614c47..f344b2d44c2 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2948.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2948.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2948", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-02T15:55:01.027", - "lastModified": "2024-08-15T12:44:24.983", + "lastModified": "2024-11-21T01:40:00.380", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -476,6 +475,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75937", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0145.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2012-008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49303", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2493", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53723", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75937", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2949.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2949.json index ae62fe4c263..e2a2fb282a5 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2949.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2949.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2949", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-29T19:55:01.650", - "lastModified": "2023-11-07T02:11:28.320", + "lastModified": "2024-11-21T01:40:00.533", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,18 @@ { "url": "http://www.reuters.com/article/2012/05/18/us-zte-phone-idUSBRE84H08J20120518", "source": "cve@mitre.org" + }, + { + "url": "http://blog.mylookout.com/blog/2012/05/21/zte-security-vulnerability", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.pcmag.com/article2/0%2C2817%2C2404639%2C00.asp", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.reuters.com/article/2012/05/18/us-zte-phone-idUSBRE84H08J20120518", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2952.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2952.json index bd3c0bdbf02..45d5b27b863 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2952.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2952.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2952", "sourceIdentifier": "cve@mitre.org", "published": "2012-05-29T20:55:08.713", - "lastModified": "2017-08-29T01:31:46.977", + "lastModified": "2024-11-21T01:40:00.837", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -117,6 +116,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75866", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/82231", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49266", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.jaow.net/Article-97", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53677", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75866", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2953.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2953.json index f3a9cc19734..8585f34bdb7 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2953.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2953.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2953", "sourceIdentifier": "cret@cert.org", "published": "2012-07-23T17:55:03.497", - "lastModified": "2017-12-22T02:29:10.403", + "lastModified": "2024-11-21T01:40:00.977", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,21 @@ { "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/108471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54426", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2955.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2955.json index 2ecdff195b4..582d94acc22 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2955.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2955.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2955", "sourceIdentifier": "cret@cert.org", "published": "2012-07-20T10:40:37.000", - "lastModified": "2017-12-22T02:29:10.463", + "lastModified": "2024-11-21T01:40:01.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -165,6 +164,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76798", "source": "cret@cert.org" + }, + { + "url": "http://osvdb.org/84014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49897", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21605626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/659791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54486", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76798", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2957.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2957.json index 96c6f84cc5f..ec19b2fa0d1 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2957.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2957.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2957", "sourceIdentifier": "cret@cert.org", "published": "2012-07-23T17:55:03.547", - "lastModified": "2017-12-22T02:29:10.543", + "lastModified": "2024-11-21T01:40:01.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -102,6 +101,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77113", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/108471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54429", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77113", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2959.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2959.json index 4806a4450eb..ee8782d368a 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2959.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2959.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2959", "sourceIdentifier": "cret@cert.org", "published": "2012-06-11T23:55:01.093", - "lastModified": "2012-06-12T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:01.457", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -79,6 +78,14 @@ "Exploit", "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/221180", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2960.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2960.json index 01cd8d59bef..6e7b9d922a5 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2960.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2960.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2960", "sourceIdentifier": "cret@cert.org", "published": "2012-08-08T10:26:18.893", - "lastModified": "2013-02-20T04:38:55.597", + "lastModified": "2024-11-21T01:40:01.570", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -126,6 +125,10 @@ } ], "references": [ + { + "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03606700", + "source": "cret@cert.org" + }, { "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03606700", "source": "cret@cert.org" @@ -136,6 +139,21 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03606700", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03606700", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/960468", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2961.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2961.json index 985022a369f..fd25118ee3a 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2961.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2961.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2961", "sourceIdentifier": "cret@cert.org", "published": "2012-07-23T17:55:03.593", - "lastModified": "2017-12-22T02:29:10.590", + "lastModified": "2024-11-21T01:40:01.683", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -105,6 +104,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77116", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/108471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77116", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2962.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2962.json index 27929bd80c7..3c20ffb72fd 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2962.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2962.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2962", "sourceIdentifier": "cret@cert.org", "published": "2012-07-30T22:55:03.020", - "lastModified": "2018-03-12T17:21:25.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:01.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -135,6 +134,69 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://secunia.com/advisories/50052", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/20033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/404051", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "http://www.osvdb.org/84232", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54625", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.sonicwall.com/shared/download/Dell_SonicWALL_Scrutinizer_Service_Bulletin_for_SQL_injection_vulnerability_CVE.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77148", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2963.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2963.json index 1b96603b848..9b105b0e33e 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2963.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2963.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2963", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T16:55:00.950", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:01.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -114,6 +113,21 @@ { "url": "http://www.secureworks.com/research/advisories/SWRX-2012-005/", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/520430", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8GANCC", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.secureworks.com/research/advisories/SWRX-2012-005/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2964.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2964.json index c23df1a083f..37018953cf5 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2964.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2964.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2964", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T16:55:01.013", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:02.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -117,6 +116,24 @@ { "url": "http://www.secureworks.com/research/advisories/SWRX-2012-006/", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/520430", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8GANCC", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.secureworks.com/research/advisories/SWRX-2012-006/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2965.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2965.json index 8cb08d85f4e..b47ecc6b3a9 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2965.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2965.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2965", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T16:55:01.090", - "lastModified": "2012-09-04T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:02.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -526,6 +525,25 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://caucho.com/resin-4.0/changes/changes.xtp", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/PT-2012-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/309979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2966.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2966.json index 39477bfda0e..2b1a8c07d7d 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2966.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2966.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2966", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T16:55:01.137", - "lastModified": "2012-09-04T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:02.283", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -526,6 +525,25 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://caucho.com/resin-4.0/changes/changes.xtp", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/PT-2012-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/309979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2967.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2967.json index 3d5ebbdb5c0..1e62c33a1a2 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2967.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2967.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2967", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T16:55:01.217", - "lastModified": "2012-09-04T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:02.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -526,6 +525,25 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://caucho.com/resin-4.0/changes/changes.xtp", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/PT-2012-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/309979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2968.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2968.json index 7b25d19589d..4c1981e68ce 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2968.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2968.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2968", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T16:55:01.263", - "lastModified": "2012-09-04T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:02.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -526,6 +525,25 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://caucho.com/resin-4.0/changes/changes.xtp", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/PT-2012-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/309979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2969.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2969.json index c13a6d05b27..3a31db45d4d 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2969.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2969.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2969", "sourceIdentifier": "cret@cert.org", "published": "2012-08-12T16:55:01.293", - "lastModified": "2012-09-04T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:02.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -526,6 +525,25 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://caucho.com/resin-4.0/changes/changes.xtp", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/PT-2012-05", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/309979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2970.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2970.json index 91509ad751b..72b973bb2ce 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2970.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2970.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2970", "sourceIdentifier": "cret@cert.org", "published": "2012-07-09T22:55:01.090", - "lastModified": "2012-07-10T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:02.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/154307", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2974.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2974.json index a17dd850359..45196e3224d 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2974.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2974.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2974", "sourceIdentifier": "cret@cert.org", "published": "2012-07-19T15:55:02.783", - "lastModified": "2017-12-22T02:29:10.653", + "lastModified": "2024-11-21T01:40:03.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.securitytracker.com/id?1027285", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/377915", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027285", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2975.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2975.json index 9f12cd9e15a..e79b12629be 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2975.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2975.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2975", "sourceIdentifier": "cret@cert.org", "published": "2012-09-11T18:55:01.097", - "lastModified": "2012-09-12T13:53:41.477", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:03.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "https://support.f5.com/kb/en-us/solutions/public/13000/800/sol13838.html", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/143395", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://support.f5.com/kb/en-us/solutions/public/13000/800/sol13838.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2976.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2976.json index 6517b41e3d1..f11d4c8ec59 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2976.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2976.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2976", "sourceIdentifier": "cret@cert.org", "published": "2012-07-23T17:55:03.657", - "lastModified": "2017-12-22T02:29:10.700", + "lastModified": "2024-11-21T01:40:03.417", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,18 @@ { "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/108471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54427", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2977.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2977.json index a8d97a529c2..ac86ddf3db6 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2977.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2977.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2977", "sourceIdentifier": "cret@cert.org", "published": "2012-07-23T17:55:03.733", - "lastModified": "2017-12-22T02:29:10.760", + "lastModified": "2024-11-21T01:40:03.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,18 @@ { "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/108471", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54430", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2978.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2978.json index dec251bf2e7..de63c1b8d0f 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2978.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2978.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2978", "sourceIdentifier": "cret@cert.org", "published": "2012-07-27T10:27:49.260", - "lastModified": "2017-12-22T02:29:10.823", + "lastModified": "2024-11-21T01:40:03.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -225,6 +224,40 @@ { "url": "http://www.securityfocus.com/bid/54606", "source": "cret@cert.org" + }, + { + "url": "http://osvdb.org/84097", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49795", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49997", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2515", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/624931", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.nlnetlabs.nl/downloads/CVE-2012-2978.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54606", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2980.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2980.json index 7714257bd4e..5f7862b12eb 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2980.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2980.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2980", "sourceIdentifier": "cret@cert.org", "published": "2012-08-21T10:46:10.513", - "lastModified": "2012-08-21T10:46:10.513", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:03.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.1 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -126,6 +125,21 @@ { "url": "http://www.kb.cert.org/vuls/id/MAPG-8R5LD6", "source": "cret@cert.org" + }, + { + "url": "http://www.htc.com/www/help/app-security-fix/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/251635", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8R5LD6", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2981.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2981.json index 5b24f18ee39..f2bbb5844d0 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2981.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2981.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2981", "sourceIdentifier": "cret@cert.org", "published": "2012-09-11T18:55:01.160", - "lastModified": "2013-05-30T03:16:15.250", + "lastModified": "2024-11-21T01:40:04.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -293,6 +292,37 @@ "tags": [ "Patch" ] + }, + { + "url": "http://americaninfosec.com/research/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-000.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/788478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027507", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/webmin/webmin/commit/ed7365064c189b8f136a9f952062249167d1bd9e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2982.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2982.json index a645c120da6..005c181e232 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2982.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2982.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2982", "sourceIdentifier": "cret@cert.org", "published": "2012-09-11T18:55:01.237", - "lastModified": "2013-05-30T03:16:15.323", + "lastModified": "2024-11-21T01:40:04.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -294,6 +293,38 @@ "Exploit", "Patch" ] + }, + { + "url": "http://americaninfosec.com/research/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/788478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027507", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/webmin/webmin/commit/1f1411fe7404ec3ac03e803cfa7e01515e71a213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2983.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2983.json index 6c65ff6d9c1..f818d8325bf 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2983.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2983.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2983", "sourceIdentifier": "cret@cert.org", "published": "2012-09-11T18:55:01.283", - "lastModified": "2013-05-30T03:16:15.400", + "lastModified": "2024-11-21T01:40:04.277", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -290,6 +289,34 @@ { "url": "https://github.com/webmin/webmin/commit/4cd7bad70e23e4e19be8ccf7b9f245445b2b3b80", "source": "cret@cert.org" + }, + { + "url": "http://americaninfosec.com/research/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-002.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/788478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027507", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/webmin/webmin/commit/4cd7bad70e23e4e19be8ccf7b9f245445b2b3b80", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2984.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2984.json index a4b17d8ce77..521dd453980 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2984.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2984.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2984", "sourceIdentifier": "cret@cert.org", "published": "2012-08-24T20:55:00.770", - "lastModified": "2013-03-22T03:11:00.103", + "lastModified": "2024-11-21T01:40:04.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ "Exploit", "US Government Resource" ] + }, + { + "url": "http://secunia.com/advisories/50368", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/318779", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2985.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2985.json index 97ca9bc9062..2c4c87d6535 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2985.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2985.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2985", "sourceIdentifier": "cret@cert.org", "published": "2012-08-21T10:46:10.577", - "lastModified": "2012-08-21T10:46:10.577", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:04.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -78,6 +77,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/247235", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2986.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2986.json index 0df746720ad..7935a99d03d 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2986.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2986.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2986", "sourceIdentifier": "cret@cert.org", "published": "2012-08-20T22:55:00.973", - "lastModified": "2012-08-21T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:04.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 7.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 5.1, @@ -90,6 +89,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/441363", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-29xx/CVE-2012-2990.json b/CVE-2012/CVE-2012-29xx/CVE-2012-2990.json index 242d9a724e8..84d15fd5201 100644 --- a/CVE-2012/CVE-2012-29xx/CVE-2012-2990.json +++ b/CVE-2012/CVE-2012-29xx/CVE-2012-2990.json @@ -2,9 +2,8 @@ "id": "CVE-2012-2990", "sourceIdentifier": "cret@cert.org", "published": "2012-08-24T20:55:02.850", - "lastModified": "2012-08-29T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:04.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "http://www.krcert.or.kr/kor/data/secNoticeView.jsp?p_bulletin_writing_sequence=931", "source": "cret@cert.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/663809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "US Government Resource" + ] + }, + { + "url": "http://www.krcert.or.kr/kor/data/secNoticeView.jsp?p_bulletin_writing_sequence=931", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3003.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3003.json index 53639930c99..05765847f43 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3003.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3003.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3003", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-06-08T18:55:02.347", - "lastModified": "2012-06-12T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:06.187", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3004.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3004.json index 58c717eddb5..a73f8922b9f 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3004.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3004.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3004", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-09-08T10:28:20.510", - "lastModified": "2012-09-10T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'", + "lastModified": "2024-11-21T01:40:06.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -127,6 +125,14 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-251-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3005.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3005.json index 8fcb23b7593..bf45001e3ad 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3005.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3005.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3005", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-07-26T10:41:47.747", - "lastModified": "2012-07-30T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'", + "lastModified": "2024-11-21T01:40:06.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -150,6 +148,14 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-177-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3006.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3006.json index bacb8a5fac1..1a0abae8a84 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3006.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3006.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3006", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-06-19T18:55:01.113", - "lastModified": "2019-08-29T15:42:37.633", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:06.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -192,6 +191,29 @@ "tags": [ "Not Applicable" ] + }, + { + "url": "http://www.innominate.com/data/downloads/software/innominate_security_advisory_20120614_001.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-167-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3007.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3007.json index fd32e1c39d5..5ff4d6db861 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3007.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3007.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3007", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-07-05T03:23:18.637", - "lastModified": "2012-08-14T03:38:14.847", + "lastModified": "2024-11-21T01:40:06.653", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -146,6 +145,21 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://secunia.com/advisories/49173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-171-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3008.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3008.json index e160a7f6403..a98c00deeb9 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3008.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3008.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3008", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-07-20T10:40:37.283", - "lastModified": "2017-12-22T02:29:10.887", + "lastModified": "2024-11-21T01:40:06.773", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -100,6 +99,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77131", "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "http://osvdb.org/84091", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-201-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77131", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3009.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3009.json index 0628aa68d99..169f79fdd7b 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3009.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3009.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3009", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-08-16T10:38:04.407", - "lastModified": "2012-08-16T10:38:04.407", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:06.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", + "baseScore": 8.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.5 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.8, @@ -96,6 +95,20 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-312568.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-227-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3012.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3012.json index e2c68cc0ac5..5370f90c794 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3012.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3012.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3012", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-09-05T20:55:01.333", - "lastModified": "2012-09-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:07.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -95,6 +94,17 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.arbiter.com/news/index.php?id=261", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-249-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3013.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3013.json index 7c2e803a8d8..a8a52b842e1 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3013.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3013.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3013", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-09-07T00:55:01.300", - "lastModified": "2013-10-08T17:41:09.520", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:07.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-249-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.wago.com/wagoweb/documentation/app_note/a1176/a117600e.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3014.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3014.json index 04b336139d2..846f602302d 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3014.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3014.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3014", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-09-04T11:04:49.327", - "lastModified": "2012-09-04T11:04:49.327", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorImpact": "Per http://www.us-cert.gov/control_systems/pdf/ICSA-12-243-01.pdf \r\n\r\n\"An attacker with access to an established user account could remotely log into the affected system and elevate privileges to the administrative level, thereby circumventing the physical connect safeguards in place for administrative functions.\"", + "lastModified": "2024-11-21T01:40:07.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 7.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 5.1, @@ -122,6 +120,21 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.garrettcom.com/techsupport/6k_dl/6k440_rn.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-243-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } - ] + ], + "evaluatorImpact": "Per http://www.us-cert.gov/control_systems/pdf/ICSA-12-243-01.pdf \r\n\r\n\"An attacker with access to an established user account could remotely log into the affected system and elevate privileges to the administrative level, thereby circumventing the physical connect safeguards in place for administrative functions.\"" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3015.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3015.json index e9e6697b2c9..449464f0edc 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3015.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3015.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3015", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-07-26T10:41:47.980", - "lastModified": "2012-07-30T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'", + "lastModified": "2024-11-21T01:40:07.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -93,6 +91,21 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-110665.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-205-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3016.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3016.json index 9c3709b5881..d372c5873ba 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3016.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3016.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3016", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-07-31T10:45:42.327", - "lastModified": "2020-04-13T13:15:12.900", + "lastModified": "2024-11-21T01:40:07.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -127,6 +126,25 @@ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-589272.pdf", "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-589272.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-589272.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3017.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3017.json index ace088054e6..cd92e248350 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3017.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3017.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3017", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-07-31T10:45:42.403", - "lastModified": "2020-04-13T13:15:13.307", + "lastModified": "2024-11-21T01:40:07.843", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -111,6 +110,24 @@ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-617264.pdf", "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-617264.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-617264.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3018.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3018.json index 6e1ff148200..7d009f8ab5b 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3018.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3018.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3018", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-07-31T10:45:42.467", - "lastModified": "2012-07-31T10:45:42.467", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:07.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -175,6 +174,13 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3020.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3020.json index bf2aeeae734..60d8138c6f2 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3020.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3020.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3020", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-08-06T16:55:04.917", - "lastModified": "2012-08-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:08.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,17 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://support.automation.siemens.com/WW/view/en/41929231/130000", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-214-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3024.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3024.json index 0b236cac9df..4729d140bad 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3024.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3024.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3024", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-08-16T10:38:04.593", - "lastModified": "2023-03-22T14:08:50.977", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:08.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.tridium.com/cs/tridium_news/security_patch_36", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3025.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3025.json index a0774995810..865477a0ad9 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3025.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3025.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3025", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2012-08-16T10:38:04.750", - "lastModified": "2023-03-22T14:09:30.673", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:08.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -90,6 +89,24 @@ "Third Party Advisory", "US Government Resource" ] + }, + { + "url": "http://www.tridium.com/cs/tridium_news/security_patch_36", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3053.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3053.json index b84dabfa61e..e5b19f7294d 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3053.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3053.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3053", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-06-29T14:55:01.017", - "lastModified": "2018-12-03T13:42:31.243", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:10.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3054.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3054.json index 5b4e7513840..2ca3fcfc344 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3054.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3054.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3054", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-06-29T14:55:01.063", - "lastModified": "2018-12-03T13:49:50.237", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:10.527", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3055.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3055.json index 241150286fb..12137f865f6 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3055.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3055.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3055", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-06-29T14:55:01.093", - "lastModified": "2018-12-03T13:50:06.720", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:10.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3056.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3056.json index b0f3b8fa495..c41dba7ef11 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3056.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3056.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3056", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-06-29T14:55:01.140", - "lastModified": "2018-12-03T13:50:28.673", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:10.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3057.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3057.json index 7406f5ef8b5..63760a3e94e 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3057.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3057.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3057", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-06-29T14:55:01.173", - "lastModified": "2018-12-03T13:50:39.907", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:10.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3058.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3058.json index 89978a1d60e..9dfc49195a7 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3058.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3058.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3058", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-06-20T20:55:02.697", - "lastModified": "2023-08-15T14:41:35.310", + "lastModified": "2024-11-21T01:40:10.983", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -179,6 +178,17 @@ { "url": "http://www.securitytracker.com/id?1027187", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-asaipv6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027187", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3063.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3063.json index 5b660864b3c..39502680aa4 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3063.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3063.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3063", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-06-20T20:55:02.747", - "lastModified": "2013-03-22T03:11:05.657", + "lastModified": "2024-11-21T01:40:11.340", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -173,6 +172,17 @@ { "url": "http://www.securitytracker.com/id?1027188", "source": "ykramarz@cisco.com" + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ace", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027188", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3073.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3073.json index 828ded257d8..a13836be346 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3073.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3073.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3073", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-07-12T10:34:42.303", - "lastModified": "2018-10-30T16:26:48.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:11.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -680,6 +679,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3074.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3074.json index 5d37a6ffa16..66bdff6fcd3 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3074.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3074.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3074", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-07-12T10:34:42.347", - "lastModified": "2018-10-30T16:26:48.763", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:11.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 8.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.5, @@ -291,6 +290,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3075.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3075.json index 8f9ad9d93e7..e26104e3522 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3075.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3075.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3075", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-07-12T10:34:42.380", - "lastModified": "2012-07-12T10:34:42.380", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:11.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -246,6 +245,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-30xx/CVE-2012-3076.json b/CVE-2012/CVE-2012-30xx/CVE-2012-3076.json index 082b89dea4d..88469fc1a3f 100644 --- a/CVE-2012/CVE-2012-30xx/CVE-2012-3076.json +++ b/CVE-2012/CVE-2012-30xx/CVE-2012-3076.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3076", "sourceIdentifier": "ykramarz@cisco.com", "published": "2012-07-12T10:34:42.427", - "lastModified": "2012-07-12T10:34:42.427", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:11.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -109,6 +108,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3105.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3105.json index ba3da3e9c75..b434ebeb4bb 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3105.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3105.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3105", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-05T23:55:01.967", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:40:12.503", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -922,6 +921,21 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16912", "source": "cve@mitre.org" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-34.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=744888", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16912", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3106.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3106.json index dbcd8a13abf..80a9e69ad01 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3106.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3106.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3106", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.757", - "lastModified": "2018-10-12T22:03:14.267", + "lastModified": "2024-11-21T01:40:12.690", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -131,6 +129,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15608", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77007", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15608", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3107.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3107.json index 500ea664f59..92e28248d37 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3107.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3107.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3107", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.787", - "lastModified": "2018-10-12T22:03:15.420", + "lastModified": "2024-11-21T01:40:12.827", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -135,6 +133,65 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15648", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83908", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77008", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15648", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3108.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3108.json index 727c8014ab7..4984729e2a1 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3108.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3108.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3108", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.817", - "lastModified": "2018-10-12T22:03:16.687", + "lastModified": "2024-11-21T01:40:12.973", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -135,6 +133,65 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15804", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83909", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77009", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15804", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3109.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3109.json index d99787d23bb..fcf3e864af7 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3109.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3109.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3109", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.850", - "lastModified": "2018-10-12T22:03:17.983", + "lastModified": "2024-11-21T01:40:13.120", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -130,6 +128,65 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14834", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83910", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54554", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77010", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14834", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3110.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3110.json index 1392c80c0ef..757127c9989 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3110.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3110.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3110", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.897", - "lastModified": "2018-10-12T22:03:19.297", + "lastModified": "2024-11-21T01:40:13.267", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -135,6 +133,65 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15747", "source": "secalert_us@oracle.com" + }, + { + "url": "http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83911", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/advisory/2737111", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21660640", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/118913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15747", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\r\n\r\n'Outside In Technology is a suite of software development kits (SDKs). It does not have any particular associated protocol. If the hosting software passes data received over the network to Outside In Technology code, the CVSS score would increase to 6.8.'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3111.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3111.json index 329465d8082..a702a327ef8 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3111.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3111.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3111", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.927", - "lastModified": "2017-08-29T01:31:48.243", + "lastModified": "2024-11-21T01:40:13.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -112,6 +111,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77032", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83971", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027265", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3112.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3112.json index 0dffefd0f83..18496269107 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3112.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3112.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3112", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:02.960", - "lastModified": "2017-08-29T01:31:48.307", + "lastModified": "2024-11-21T01:40:13.537", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77052", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83932", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54556", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3113.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3113.json index 78e5c3ba8af..033a62dda8e 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3113.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3113.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3113", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.007", - "lastModified": "2017-08-29T01:31:48.353", + "lastModified": "2024-11-21T01:40:13.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.5 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -102,6 +101,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77024", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83963", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54522", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027265", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77024", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3114.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3114.json index 55fdb855da2..f2417ffee36 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3114.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3114.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3114", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.037", - "lastModified": "2017-08-29T01:31:48.400", + "lastModified": "2024-11-21T01:40:13.780", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77019", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83958", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54570", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027268", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77019", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3115.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3115.json index 44df961c007..c22fa0e2382 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3115.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3115.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3115", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.067", - "lastModified": "2017-08-29T01:31:48.460", + "lastModified": "2024-11-21T01:40:13.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76997", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83913", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54520", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76997", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3116.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3116.json index 81cca2c2833..3ea3cf9ffa9 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3116.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3116.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3116", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.117", - "lastModified": "2017-12-22T02:29:11.043", + "lastModified": "2024-11-21T01:40:14.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 1.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 1.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -113,6 +112,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77023", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83960", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54567", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027268", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77023", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3117.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3117.json index 51cca1427f4..ae070269cea 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3117.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3117.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3117", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.147", - "lastModified": "2017-12-22T02:29:11.107", + "lastModified": "2024-11-21T01:40:14.187", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -113,6 +112,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77022", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83959", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54568", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027268", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77022", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3118.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3118.json index d3189609d98..f5363e334b5 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3118.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3118.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3118", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.177", - "lastModified": "2017-12-22T02:29:11.167", + "lastModified": "2024-11-21T01:40:14.307", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -102,6 +101,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77026", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83965", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49951", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54534", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027265", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77026", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3119.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3119.json index 2778e54f054..1d75d1a8457 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3119.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3119.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3119", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.223", - "lastModified": "2017-12-22T02:29:11.213", + "lastModified": "2024-11-21T01:40:14.423", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -102,6 +101,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77028", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83967", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49950", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54523", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027265", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77028", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3120.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3120.json index 2ddb8e49660..8810fa74409 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3120.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3120.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3120", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.257", - "lastModified": "2017-08-29T01:31:48.663", + "lastModified": "2024-11-21T01:40:14.560", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77041", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83927", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54493", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77041", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3121.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3121.json index 2f0fa0cc3a7..97c630984ca 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3121.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3121.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3121", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.287", - "lastModified": "2017-08-29T01:31:48.710", + "lastModified": "2024-11-21T01:40:14.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77047", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83935", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54553", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77047", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3122.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3122.json index 6d5dc61eba4..a8d7e58a4d7 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3122.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3122.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3122", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.333", - "lastModified": "2017-08-29T01:31:48.773", + "lastModified": "2024-11-21T01:40:14.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", + "baseScore": 2.6, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -103,6 +102,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77055", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83929", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77055", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3123.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3123.json index 84ccc656b8f..835c9ce9d03 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3123.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3123.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3123", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.367", - "lastModified": "2017-12-22T02:29:11.260", + "lastModified": "2024-11-21T01:40:14.943", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77046", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83939", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77046", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3124.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3124.json index d6bea204b83..09129d38084 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3124.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3124.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3124", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.413", - "lastModified": "2017-08-29T01:31:48.867", + "lastModified": "2024-11-21T01:40:15.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77048", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83942", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54528", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77048", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3125.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3125.json index 130e98b9a2e..e50fc189744 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3125.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3125.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3125", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.460", - "lastModified": "2017-08-29T01:31:48.930", + "lastModified": "2024-11-21T01:40:15.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -108,6 +107,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77042", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83925", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54502", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77042", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3126.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3126.json index 5d831e5ca83..4e6902b26a8 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3126.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3126.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3126", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.490", - "lastModified": "2017-08-29T01:31:48.977", + "lastModified": "2024-11-21T01:40:15.317", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 6.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77059", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83943", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54505", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77059", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3127.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3127.json index 5c4dc1947ea..ba24097d1e4 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3127.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3127.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3127", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.537", - "lastModified": "2017-08-29T01:31:49.040", + "lastModified": "2024-11-21T01:40:15.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", + "baseScore": 5.4, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.4 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77044", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54510", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77044", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3128.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3128.json index cd37f660697..2d35a0afe42 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3128.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3128.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3128", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.567", - "lastModified": "2017-08-29T01:31:49.103", + "lastModified": "2024-11-21T01:40:15.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 3.7, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.7 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -176,6 +175,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77057", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54564", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027275", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77057", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3129.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3129.json index 91ec8a2a0f4..b04181d3ad2 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3129.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3129.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3129", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.600", - "lastModified": "2017-08-29T01:31:49.163", + "lastModified": "2024-11-21T01:40:15.670", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77045", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83936", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54513", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77045", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3130.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3130.json index a9e8b9ba6eb..976cb2dc3a5 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3130.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3130.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3130", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.647", - "lastModified": "2017-08-29T01:31:49.227", + "lastModified": "2024-11-21T01:40:15.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +97,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77053", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83931", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77053", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3131.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3131.json index 9248c098250..0def1a870bc 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3131.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3131.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3131", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.693", - "lastModified": "2017-08-29T01:31:49.290", + "lastModified": "2024-11-21T01:40:15.930", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -108,6 +107,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77054", "source": "secalert_us@oracle.com" + }, + { + "url": "http://osvdb.org/83930", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54560", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027274", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77054", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3132.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3132.json index f83335c1296..c43f05b78cc 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3132.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3132.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3132", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-08-10T23:55:00.827", - "lastModified": "2013-10-11T03:44:24.600", + "lastModified": "2024-11-21T01:40:16.053", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -134,6 +133,44 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.darkreading.com/database-security/167901020/security/news/240004776/hacking-oracle-database-indexes.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.networkworld.com/news/2012/072712-black-hat-shark-bitten-security-researcher-261203.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-3132-1721017.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027367", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.teamshatter.com/topics/general/team-shatter-exclusive/ctxsys-context-privilege-escalation/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://blogs.oracle.com/security/entry/security_alert_cve_2012_3132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3134.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3134.json index 5a957f713ef..da47e93c41d 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3134.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3134.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3134", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.740", - "lastModified": "2013-10-11T03:44:24.740", + "lastModified": "2024-11-21T01:40:16.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -108,6 +107,33 @@ { "url": "http://www.securitytracker.com/id?1027260", "source": "secalert_us@oracle.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00018.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83949", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027260", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3135.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3135.json index e998d6e2cbd..687b55414aa 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3135.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3135.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3135", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-07-17T23:55:03.787", - "lastModified": "2017-12-01T02:29:00.317", + "lastModified": "2024-11-21T01:40:16.427", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76993", "source": "secalert_us@oracle.com" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027264", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76993", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-31xx/CVE-2012-3136.json b/CVE-2012/CVE-2012-31xx/CVE-2012-3136.json index c1f1b8c62dd..16452174a2c 100644 --- a/CVE-2012/CVE-2012-31xx/CVE-2012-3136.json +++ b/CVE-2012/CVE-2012-31xx/CVE-2012-3136.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3136", "sourceIdentifier": "secalert_us@oracle.com", "published": "2012-08-30T23:55:01.137", - "lastModified": "2013-04-19T03:22:57.080", + "lastModified": "2024-11-21T01:40:16.553", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -147,6 +146,10 @@ "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", "source": "secalert_us@oracle.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", + "source": "secalert_us@oracle.com" + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-1225.html", "source": "secalert_us@oracle.com" @@ -161,6 +164,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1225.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51044", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3231.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3231.json index d59e2216b84..7083b732cc4 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3231.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3231.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3231", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-27T22:55:01.677", - "lastModified": "2012-06-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:29.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/bid/54109", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23094", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3232.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3232.json index cef88dcbc9e..ad369bfb2f5 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3232.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3232.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3232", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-29T17:55:01.110", - "lastModified": "2012-07-02T12:22:25.990", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:29.287", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/bid/54109", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23094", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3236.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3236.json index da870583b7e..f3f90298bb9 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3236.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3236.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3236", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T21:55:06.937", - "lastModified": "2022-02-07T18:40:29.627", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:29.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -152,6 +151,86 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-06/0192.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Exploit" + ] + }, + { + "url": "http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/19482", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:082", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-dos.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1559-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=676804", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76658", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3238.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3238.json index 2afd9e33b64..e8fbdfd7a1a 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3238.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3238.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3238", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-09T22:55:01.197", - "lastModified": "2012-07-10T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:29.847", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -160,6 +159,24 @@ "tags": [ "Patch" ] + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-06/0206.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.inshell.net/advisory/27", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.astaro.com/en-uk/blog/up2date/8305", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3240.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3240.json index 448748be813..e10123b7db1 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3240.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3240.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3240", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-17T21:55:01.460", - "lastModified": "2012-07-18T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:29.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/49912", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49916", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.eucalyptus.com/eucalyptus-cloud/security/esa-03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3241.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3241.json index c69ed2b182e..c5eda853fa8 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3241.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3241.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3241", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-17T21:55:01.553", - "lastModified": "2012-07-18T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:30.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/49912", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49916", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.eucalyptus.com/eucalyptus-cloud/security/esa-04", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3247.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3247.json index c82bb251c93..dab29ffcb05 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3247.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3247.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3247", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-08-16T10:38:07.890", - "lastModified": "2013-03-22T03:11:17.123", + "lastModified": "2024-11-21T01:40:30.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 4.9, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 4.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -133,6 +132,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03450553", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027376", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03450553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03450553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3248.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3248.json index 586fccae07f..f7a1760d9c8 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3248.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3248.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3248", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-08-16T10:38:07.970", - "lastModified": "2013-03-22T03:11:17.193", + "lastModified": "2024-11-21T01:40:30.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -97,6 +96,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447824", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027398", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447824", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447824", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3249.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3249.json index d8d16337da8..cf8f53aad69 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3249.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3249.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3249", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-08-16T10:38:08.047", - "lastModified": "2019-10-09T23:05:16.840", + "lastModified": "2024-11-21T01:40:30.593", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -90,6 +89,18 @@ { "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447895", "source": "hp-security-alert@hp.com" + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447895", + "source": "hp-security-alert@hp.com" + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447895", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447895", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3250.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3250.json index 510c25a7e0a..1ec81bea045 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3250.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3250.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3250", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-08-16T10:38:08.127", - "lastModified": "2019-10-09T23:05:17.013", + "lastModified": "2024-11-21T01:40:30.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -93,6 +92,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447828", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447828", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03447828", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3251.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3251.json index ceba90bd27a..7e05c9b414a 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3251.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3251.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3251", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-08-16T10:38:08.187", - "lastModified": "2019-10-09T23:05:18.623", + "lastModified": "2024-11-21T01:40:30.800", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,27 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03450382", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03450382", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03450382", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3252.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3252.json index dd24b853896..c0c87ba4474 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3252.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3252.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3252", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-08-20T22:55:01.240", - "lastModified": "2013-02-02T05:05:12.380", + "lastModified": "2024-11-21T01:40:30.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,31 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03457976", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=135792467521227&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03457976", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03457976", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3253.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3253.json index b89ebfdc980..559f82a0f1b 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3253.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3253.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3253", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-08-30T17:55:01.497", - "lastModified": "2019-10-09T23:05:18.827", + "lastModified": "2024-11-21T01:40:31.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,13 @@ } ], "references": [ + { + "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03473459", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03473459", "source": "hp-security-alert@hp.com", @@ -108,6 +114,24 @@ { "url": "http://zerodayinitiative.com/advisories/ZDI-12-164/", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03473459", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03473459", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-12-164/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3254.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3254.json index 43b33999eff..01b4c888a8d 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3254.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3254.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3254", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-08-30T17:55:01.607", - "lastModified": "2019-10-09T23:05:19.670", + "lastModified": "2024-11-21T01:40:31.150", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,13 @@ } ], "references": [ + { + "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03473527", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03473527", "source": "hp-security-alert@hp.com", @@ -93,6 +99,24 @@ { "url": "http://zerodayinitiative.com/advisories/ZDI-12-163/", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03473527", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03473527", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-12-163/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3255.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3255.json index a5ada86d359..4ee9f0693a3 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3255.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3255.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3255", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-09-08T10:28:20.760", - "lastModified": "2013-03-22T03:11:17.687", + "lastModified": "2024-11-21T01:40:31.280", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -72,6 +71,13 @@ } ], "references": [ + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", "source": "hp-security-alert@hp.com", @@ -82,6 +88,24 @@ { "url": "http://osvdb.org/85250", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/85250", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3256.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3256.json index 6b49cbe6352..7e8096c2b85 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3256.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3256.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3256", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-09-08T10:28:20.807", - "lastModified": "2013-03-22T03:11:17.757", + "lastModified": "2024-11-21T01:40:31.410", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -72,6 +71,13 @@ } ], "references": [ + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", "source": "hp-security-alert@hp.com", @@ -82,6 +88,24 @@ { "url": "http://osvdb.org/85251", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/85251", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3257.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3257.json index 71ef2000c49..92e63b22362 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3257.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3257.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3257", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2012-09-08T10:28:20.853", - "lastModified": "2013-03-22T03:11:17.827", + "lastModified": "2024-11-21T01:40:31.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -72,6 +71,13 @@ } ], "references": [ + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", "source": "hp-security-alert@hp.com", @@ -82,6 +88,24 @@ { "url": "http://osvdb.org/85252", "source": "hp-security-alert@hp.com" + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/85252", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3287.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3287.json index 657c96a59fc..9421d75315b 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3287.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3287.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3287", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-13T19:55:01.943", - "lastModified": "2023-02-14T07:15:09.677", + "lastModified": "2024-11-21T01:40:35.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "https://phk.freebsd.dk/sagas/md5crypt_eol/", "source": "cve@mitre.org" + }, + { + "url": "http://phk.freebsd.dk/sagas/md5crypt_eol.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://phk.freebsd.dk/sagas/md5crypt_eol/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3288.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3288.json index 24ceaffc466..30761450b2e 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3288.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3288.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3288", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T20:55:01.420", - "lastModified": "2017-09-19T01:35:06.027", + "lastModified": "2024-11-21T01:40:35.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -367,6 +366,17 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17178", "source": "cve@mitre.org" + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17178", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3289.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3289.json index 53ad9dde34e..60e68ebafa2 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3289.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3289.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3289", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T20:55:01.467", - "lastModified": "2012-06-15T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:35.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -218,6 +217,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.vmware.com/security/advisories/VMSA-2012-0011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3290.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3290.json index 02c0f9bfa3f..51057996965 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3290.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3290.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3290", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-07T19:55:09.930", - "lastModified": "2012-06-12T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:35.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -216,6 +215,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/06/beta-channel-update-for-chromebooks.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3291.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3291.json index a25393f4507..e4c87f9b9b1 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3291.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3291.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3291", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-07T20:55:02.057", - "lastModified": "2018-01-05T02:29:32.897", + "lastModified": "2024-11-21T01:40:35.600", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -226,6 +225,30 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17242", "source": "cve@mitre.org" + }, + { + "url": "http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079747.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00186.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2495", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.infradead.org/openconnect/changelog.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17242", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3292.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3292.json index 292c94a24de..eb0e7bac58a 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3292.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3292.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3292", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-07T20:55:02.353", - "lastModified": "2012-09-07T04:30:25.273", + "lastModified": "2024-11-21T01:40:35.740", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 7.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.9, @@ -207,6 +206,26 @@ { "url": "http://www.debian.org/security/2012/dsa-2523", "source": "cve@mitre.org" + }, + { + "url": "http://jira.globus.org/browse/GT-195", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081787.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081791.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081797.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2523", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3293.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3293.json index 73a07930f6f..4e915055c6e 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3293.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3293.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3293", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-21T10:46:10.623", - "lastModified": "2017-08-29T01:31:51.960", + "lastModified": "2024-11-21T01:40:35.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -354,6 +353,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77179", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM60839", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21606096", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27022958", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55149", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77179", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3294.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3294.json index 8adccb8671b..f858c928a10 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3294.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3294.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3294", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-17T10:31:52.090", - "lastModified": "2017-08-29T01:31:52.040", + "lastModified": "2024-11-21T01:40:36.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -133,6 +132,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77180", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC85516", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/20477/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21607482", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027373", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77180", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3295.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3295.json index 0a310359d10..ffc246501f1 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3295.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3295.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3295", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-29T22:55:01.393", - "lastModified": "2017-08-29T01:31:52.087", + "lastModified": "2024-11-21T01:40:36.137", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77279", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM56593", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21595523", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77279", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-32xx/CVE-2012-3296.json b/CVE-2012/CVE-2012-32xx/CVE-2012-3296.json index 6978e38892a..3fbe76de414 100644 --- a/CVE-2012/CVE-2012-32xx/CVE-2012-3296.json +++ b/CVE-2012/CVE-2012-32xx/CVE-2012-3296.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3296", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-17T20:55:04.557", - "lastModified": "2017-08-29T01:31:52.150", + "lastModified": "2024-11-21T01:40:36.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -154,6 +153,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77288", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/50376", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_the_help_link_on_the_power_hmc_login_panel_is_susceptible_to_reflected_cross_site_scripting_cve_2012_329617", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1MB03488", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1MB03489", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=isg1MB03494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/fixcentral/firmware/readme?fixid=MH01253", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/fixcentral/firmware/readme?fixid=MH01257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/fixcentral/firmware/readme?fixid=MH01258", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027433", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77288", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3301.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3301.json index 0188dc61fb6..496af5bfc14 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3301.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3301.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3301", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-21T10:46:10.700", - "lastModified": "2017-08-29T01:31:52.400", + "lastModified": "2024-11-21T01:40:36.653", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -153,6 +152,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77400", "source": "psirt@us.ibm.com" + }, + { + "url": "http://websecurity.com.ua/5839/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21608160", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77400", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3302.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3302.json index 07a36b5aef1..cd927d45c6c 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3302.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3302.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3302", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-21T10:46:10.747", - "lastModified": "2017-08-29T01:31:52.477", + "lastModified": "2024-11-21T01:40:36.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -211,6 +210,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77401", "source": "psirt@us.ibm.com" + }, + { + "url": "http://websecurity.com.ua/5839/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21608160", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77401", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3308.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3308.json index 715161ecbbd..12291636c1c 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3308.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3308.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3308", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-17T10:31:52.137", - "lastModified": "2017-08-29T01:31:52.743", + "lastModified": "2024-11-21T01:40:37.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +119,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77567", "source": "psirt@us.ibm.com" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21599114", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21607903", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027402", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77567", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3309.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3309.json index eceddb2b5ee..325f0eecd74 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3309.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3309.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3309", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-29T22:55:01.503", - "lastModified": "2017-08-29T01:31:52.790", + "lastModified": "2024-11-21T01:40:37.310", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77745", "source": "psirt@us.ibm.com" + }, + { + "url": "http://en.securitylab.ru/lab/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/PT-2012-15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21609223", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027455", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77745", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3312.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3312.json index 1fb69243db9..9da1a6b5c09 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3312.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3312.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3312", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-29T22:55:01.550", - "lastModified": "2017-08-29T01:31:52.977", + "lastModified": "2024-11-21T01:40:37.643", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -101,6 +100,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77785", "source": "psirt@us.ibm.com" + }, + { + "url": "http://en.securitylab.ru/lab/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://en.securitylab.ru/lab/PT-2012-15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21609224", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77785", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3313.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3313.json index bd1147983e1..bc1d4e2a1a7 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3313.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3313.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3313", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-09-10T17:55:01.507", - "lastModified": "2017-08-29T01:31:53.023", + "lastModified": "2024-11-21T01:40:37.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -150,6 +149,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77787", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/50551", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV15530", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21610081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77787", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3325.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3325.json index 5b1b572164e..d7819400567 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3325.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3325.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3325", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-08-30T22:55:04.937", - "lastModified": "2017-08-29T01:31:53.633", + "lastModified": "2024-11-21T01:40:38.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -397,6 +396,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77959", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/54971", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/55115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM71296", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ibm.com/support/docview.wss?uid=swg21609067", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55309", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027462", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77959", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3326.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3326.json index fa5cb8dca96..6286bfe3f3e 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3326.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3326.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3326", "sourceIdentifier": "psirt@us.ibm.com", "published": "2012-09-10T17:55:01.537", - "lastModified": "2017-08-29T01:31:53.697", + "lastModified": "2024-11-21T01:40:38.933", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -140,6 +139,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77960", "source": "psirt@us.ibm.com" + }, + { + "url": "http://secunia.com/advisories/50551", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV20344", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21610081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77960", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3343.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3343.json index acef90ecf95..d25dd04b7eb 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3343.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3343.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3343", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-09T00:55:01.503", - "lastModified": "2012-06-11T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:40.647", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,17 @@ { "url": "http://www.kb.cert.org/vuls/id/MAPG-8R9LBY", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/722963", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8R9LBY", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3345.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3345.json index d063580e9d8..94845c58ccb 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3345.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3345.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3345", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-15T14:55:02.060", - "lastModified": "2017-07-01T01:29:01.763", + "lastModified": "2024-11-21T01:40:40.787", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:C/A:C", + "baseScore": 5.6, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -80,6 +79,14 @@ { "url": "https://security.gentoo.org/glsa/201706-23", "source": "cve@mitre.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/15/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201706-23", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3347.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3347.json index 95f559b264f..ebb0ac270f5 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3347.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3347.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3347", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-13T19:55:01.990", - "lastModified": "2012-09-29T03:19:08.393", + "lastModified": "2024-11-21T01:40:40.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -95,6 +94,24 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://secunia.com/advisories/49335", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/773035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MAPG-8RQL83", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3350.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3350.json index 9da571ad8e8..117370065df 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3350.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3350.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3350", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T21:55:07.157", - "lastModified": "2018-05-29T14:16:14.340", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:41.067", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -118,6 +117,53 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://osvdb.org/83538", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/19629", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54287", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76774", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23096", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3355.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3355.json index 2a816a1c44e..4748209af65 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3355.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3355.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3355", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-17T21:55:02.147", - "lastModified": "2017-08-29T01:31:54.227", + "lastModified": "2024-11-21T01:40:41.633", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -417,6 +416,46 @@ { "url": "https://hermes.opensuse.org/messages/15351848", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-3355.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/25/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/25/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54186", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1503-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=678661", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76538", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15351848", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3356.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3356.json index 32d3fb9f1cb..42e08115b55 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3356.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3356.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3356", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T16:55:39.523", - "lastModified": "2023-02-13T04:33:48.863", + "lastModified": "2024-11-21T01:40:41.770", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -292,6 +291,66 @@ { "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175", "source": "secalert@redhat.com" + }, + { + "url": "http://osvdb.org/83225", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://viewvc.tigris.org/issues/show_bug.cgi?id=353", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://viewvc.tigris.org/source/browse/%2Acheckout%2A/viewvc/tags/1.1.15/CHANGES", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2755", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2757", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2759", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2760", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/25/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54197", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76614", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lwn.net/Articles/505096/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3357.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3357.json index 7c9c0b004fc..f6ab49c91fa 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3357.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3357.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3357", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T16:55:39.603", - "lastModified": "2017-08-29T01:31:54.383", + "lastModified": "2024-11-21T01:40:41.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -268,6 +267,42 @@ { "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175", "source": "secalert@redhat.com" + }, + { + "url": "http://osvdb.org/83227", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://viewvc.tigris.org/source/browse/viewvc?view=rev&revision=2758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:134", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/25/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lwn.net/Articles/505096/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0175", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3358.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3358.json index fbf1be0ecf5..4544e1bdb4a 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3358.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3358.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3358", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-18T23:55:03.247", - "lastModified": "2023-02-13T04:33:50.803", + "lastModified": "2024-11-21T01:40:42.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +105,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76850", "source": "secalert@redhat.com" + }, + { + "url": "http://code.google.com/p/openjpeg/source/detail?r=1727", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/83741", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1068.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49913", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:104", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54373", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76850", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3360.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3360.json index 1ac2b01ca3f..381267296d7 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3360.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3360.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3360", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T16:55:45.853", - "lastModified": "2012-08-17T03:53:53.473", + "lastModified": "2024-11-21T01:40:42.273", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -122,6 +121,52 @@ { "url": "https://lists.launchpad.net/openstack/msg14089.html", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083984.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49802", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1497-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/nova/+bug/1015531", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/nova/commit/b0feaffdb2b1c51182b8dce41b367f3449af5dd9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://lists.launchpad.net/openstack/msg14089.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3361.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3361.json index 2616f7adc79..037411769e6 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3361.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3361.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3361", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T16:55:48.227", - "lastModified": "2012-08-17T03:53:53.677", + "lastModified": "2024-11-21T01:40:42.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -139,6 +138,64 @@ { "url": "https://review.openstack.org/#/c/9268/", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083969.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083984.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49802", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1497-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/nova/+bug/1015531", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/openstack/nova/commit/b0feaffdb2b1c51182b8dce41b367f3449af5dd9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://lists.launchpad.net/openstack/msg14089.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://review.openstack.org/#/c/9268/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3362.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3362.json index d04f10dc345..23efa15808d 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3362.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3362.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3362", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-12T20:55:16.047", - "lastModified": "2012-07-27T03:40:39.460", + "lastModified": "2024-11-21T01:40:42.547", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,33 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/06/27/1", "source": "secalert@redhat.com" + }, + { + "url": "http://www.autosectools.com/Advisories/eXtplorer.2.1.RC3_Cross-site.Request.Forgery_174.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2510", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/24/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/25/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/26/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/27/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3365.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3365.json index 81d2dea00ad..02ac9e7520d 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3365.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3365.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3365", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-20T10:40:37.313", - "lastModified": "2017-12-01T02:29:00.397", + "lastModified": "2024-11-21T01:40:42.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -692,6 +691,46 @@ { "url": "https://hermes.opensuse.org/messages/15376003", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84100", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49969", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51178", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027286", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15376003", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3366.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3366.json index 3c96aa212ea..30ea4cf0334 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3366.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3366.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3366", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T16:40:35.007", - "lastModified": "2017-08-29T01:31:54.507", + "lastModified": "2024-11-21T01:40:43.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.0, @@ -113,6 +112,43 @@ "tags": [ "Patch" ] + }, + { + "url": "http://permalink.gmane.org/gmane.comp.sysutils.bcfg2.devel/4539", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49629", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/49690", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54217", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Bcfg2/bcfg2/commit/a524967e8d5c4c22e49cd619aed20c87a316c0be", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3367.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3367.json index 1f1ea4fca08..e9a44ead266 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3367.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3367.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3367", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T20:55:08.397", - "lastModified": "2017-08-29T01:31:54.587", + "lastModified": "2024-11-21T01:40:43.213", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -141,6 +140,45 @@ "Exploit", "Patch" ] + }, + { + "url": "http://osvdb.org/84098", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1103.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50013", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54608", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836268", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77102", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://fedorahosted.org/pki/changeset/2430", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3368.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3368.json index 5c30f067427..47c48a0f609 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3368.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3368.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3368", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-03T21:55:01.567", - "lastModified": "2012-07-04T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:43.347", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -100,6 +99,35 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835849", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=812551", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835849", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3371.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3371.json index ab220830e4a..b9088b5a611 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3371.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3371.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3371", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-17T21:55:02.350", - "lastModified": "2012-08-24T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:43.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -112,6 +111,37 @@ { "url": "https://lists.launchpad.net/openstack/msg14452.html", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/11/13", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54388", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1501-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/nova/+bug/1017795", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/openstack/nova/commit/034762e8060dcf0a11cb039b9d426b0d0bb1801d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://lists.launchpad.net/openstack/msg14452.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3372.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3372.json index 74a57f377e6..1d6bf5a66db 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3372.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3372.json @@ -2,7 +2,7 @@ "id": "CVE-2012-3372", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-09T10:20:44.417", - "lastModified": "2024-08-06T20:15:35.837", + "lastModified": "2024-11-21T01:40:43.900", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -98,6 +98,26 @@ { "url": "https://media.torproject.org/misc/2012-07-03-cyberoam-CVE-2012-3372.txt", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://blog.cyberoam.com/2012/07/ssl-bridging-cyberoam-approach/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.theregister.co.uk/2012/07/07/cyberoam_tor_ssl_spying_flap/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://blog.torproject.org/blog/security-vulnerability-found-cyberoam-dpi-devices-cve-2012-3372", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://media.torproject.org/misc/2012-07-03-cyberoam-CVE-2012-3372.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3374.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3374.json index 1f8f46cbb1e..3479848ae33 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3374.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3374.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3374", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-07T10:21:14.650", - "lastModified": "2017-12-01T02:29:00.473", + "lastModified": "2024-11-21T01:40:44.163", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -347,6 +346,41 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17678", "source": "secalert@redhat.com" + }, + { + "url": "http://hg.pidgin.im/pidgin/main/rev/ded93865ef42", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:105", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.pidgin.im/news/security/index.php?id=64", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17678", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3376.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3376.json index 0604242524f..09e6c12f129 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3376.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3376.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3376", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-12T19:55:06.343", - "lastModified": "2017-03-24T01:59:00.390", + "lastModified": "2024-11-21T01:40:44.443", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -83,6 +82,18 @@ { "url": "https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0049.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3377.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3377.json index f2201a1da5c..0873621b273 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3377.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3377.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3377", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-12T21:55:07.920", - "lastModified": "2023-11-07T02:11:33.393", + "lastModified": "2024-11-21T01:40:44.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -593,6 +592,37 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15299", "source": "secalert@redhat.com" + }, + { + "url": "http://git.videolan.org/?p=vlc/vlc-2.0.git%3Ba=commitdiff%3Bh=16e9e126333fb7acb47d363366fee3deadc8331e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49835", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/06/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/06/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54345", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027224", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15299", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3378.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3378.json index 5d7f964451a..d304ff93d0b 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3378.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3378.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3378", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T18:55:02.887", - "lastModified": "2012-09-05T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:44.733", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -87,6 +86,22 @@ { "url": "https://bugzilla.gnome.org/show_bug.cgi?id=678348", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/05/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/06/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=678348", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3380.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3380.json index 4058bf2fc3d..6642d7f7c69 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3380.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3380.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3380", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T18:55:03.387", - "lastModified": "2023-10-17T17:00:32.600", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:44.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -102,6 +101,36 @@ { "url": "http://www.osvdb.org/83617", "source": "secalert@redhat.com" + }, + { + "url": "http://code.google.com/p/naxsi/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/naxsi/source/detail?r=307", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49811", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/05/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/06/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/83617", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3381.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3381.json index 825d01bc8a3..510aee3c3a4 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3381.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3381.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3381", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-17T00:55:03.813", - "lastModified": "2012-08-17T14:20:17.543", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:44.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -91,6 +90,26 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=838160", "source": "secalert@redhat.com" + }, + { + "url": "http://sourceforge.net/tracker/index.php?func=detail&aid=3541554&group_id=128809&atid=712784", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/06/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/06/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=770234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=838160", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3382.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3382.json index 7a1271e207d..d957ac7fb78 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3382.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3382.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3382", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-12T21:55:08.187", - "lastModified": "2013-04-05T03:11:57.297", + "lastModified": "2024-11-21T01:40:45.110", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,30 @@ { "url": "https://hermes.opensuse.org/messages/15374367", "source": "secalert@redhat.com" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:140", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/06/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=769799", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/mono/mono/commit/d16d4623edb210635bec3ca3786481b82cde25a2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15374367", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3383.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3383.json index f1e4f69970a..8829d4f4be2 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3383.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3383.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3383", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T17:55:03.210", - "lastModified": "2012-09-18T03:35:06.537", + "lastModified": "2024-11-21T01:40:45.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -99,6 +98,34 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/07/08/1", "source": "secalert@redhat.com" + }, + { + "url": "http://codex.wordpress.org/Version_3.4.1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://codex.wordpress.org/Version_3.4.2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://core.trac.wordpress.org/changeset?old_path=%2Ftags%2F3.4.1&old=21780&new_path=%2Ftags%2F3.4.2&new=21780#file23", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://core.trac.wordpress.org/changeset?reponame=&new=21153%40branches%2F3.4&old=21076%40trunk#file16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/09/12/17", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/02/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/08/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3384.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3384.json index 57b129650d3..d1f0c5e92ec 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3384.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3384.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3384", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T17:55:03.257", - "lastModified": "2012-08-09T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:45.393", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -504,6 +503,18 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/07/08/1", "source": "secalert@redhat.com" + }, + { + "url": "http://codex.wordpress.org/Version_3.4.1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/02/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/08/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3385.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3385.json index c94fcef9a30..f85d6c147f8 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3385.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3385.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3385", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-22T17:55:03.290", - "lastModified": "2012-07-23T19:03:10.717", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:45.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -504,6 +503,18 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/07/08/1", "source": "secalert@redhat.com" + }, + { + "url": "http://codex.wordpress.org/Version_3.4.1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/02/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/08/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3386.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3386.json index 5ed7bb9c157..d5ddf24fb74 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3386.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3386.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3386", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T21:55:01.420", - "lastModified": "2023-02-13T04:33:53.380", + "lastModified": "2024-11-21T01:40:45.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -374,6 +373,59 @@ "tags": [ "Patch" ] + }, + { + "url": "http://git.savannah.gnu.org/cgit/automake.git/commit/?id=784b3e6ccc7c72a1c95c340cbbe8897d6b689d76", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089187.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087538.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087665.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00038.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0526.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:103", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.gnu.org/archive/html/automake/2012-07/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://lists.gnu.org/archive/html/automake/2012-07/msg00022.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3387.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3387.json index b15d745860d..e0ea688f3e6 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3387.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3387.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3387", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:04.513", - "lastModified": "2020-12-01T14:52:17.767", + "lastModified": "2024-11-21T01:40:45.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -91,6 +90,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76954", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76954", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3388.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3388.json index d4c784842ba..811325df0f9 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3388.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3388.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3388", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:04.577", - "lastModified": "2020-12-01T14:52:17.767", + "lastModified": "2024-11-21T01:40:45.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -111,6 +110,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76955", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33916", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76955", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3389.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3389.json index 62c92d90d84..b99fa962b99 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3389.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3389.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3389", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:04.623", - "lastModified": "2020-12-01T14:52:17.767", + "lastModified": "2024-11-21T01:40:46.087", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76965", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-31692", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76965", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3390.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3390.json index 258a317b19e..d853e8f7024 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3390.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3390.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3390", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:04.670", - "lastModified": "2023-02-13T04:33:53.810", + "lastModified": "2024-11-21T01:40:46.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -144,6 +143,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76956", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=c58c05ad4f22c6ee1e136a7d4caaddd809a7134d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76956", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3391.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3391.json index f1dd2518368..c76d7ec4cd7 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3391.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3391.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3391", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:04.717", - "lastModified": "2020-12-01T14:43:58.053", + "lastModified": "2024-11-21T01:40:46.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -141,6 +140,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76957", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=refs%2Fheads%2FMOODLE_22_STABLE&st=commit&s=MDL-32199", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76957", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3392.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3392.json index 526bb4e9cf2..ad276190be0 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3392.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3392.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3392", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:04.763", - "lastModified": "2020-12-01T14:43:58.053", + "lastModified": "2024-11-21T01:40:46.453", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", + "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -141,6 +140,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76958", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=refs%2Fheads%2FMOODLE_22_STABLE&st=commit&s=MDL-31460", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76958", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3393.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3393.json index b4f5d23bf4a..fdbcfd5d0c9 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3393.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3393.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3393", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:04.810", - "lastModified": "2020-12-01T14:43:58.053", + "lastModified": "2024-11-21T01:40:46.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -141,6 +140,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76959", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=refs%2Fheads%2FMOODLE_22_STABLE&st=commit&s=MDL-33808", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76959", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3394.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3394.json index 7e6734f8dd2..a1dac0131e9 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3394.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3394.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3394", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:04.857", - "lastModified": "2023-02-13T04:34:19.847", + "lastModified": "2024-11-21T01:40:46.703", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -146,6 +145,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76960", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=9d8d2ee6192e8b7ebb6713bd6215e06f94e2a9f7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76960", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3395.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3395.json index ff5c6f2cb7c..f403b39aedc 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3395.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3395.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3395", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:04.907", - "lastModified": "2020-12-01T14:43:58.053", + "lastModified": "2024-11-21T01:40:46.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -191,6 +190,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76961", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=9d8d2ee6192e8b7ebb6713bd6215e06f94e2a9f7&st=commit&s=MDL-27675", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76961", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3396.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3396.json index e906a820fb4..f8e6b1a89e4 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3396.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3396.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3396", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:04.937", - "lastModified": "2023-11-07T02:11:33.920", + "lastModified": "2024-11-21T01:40:46.957", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -196,6 +195,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76962", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-34045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76962", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3397.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3397.json index 7c023d3bfaa..4bd455321dc 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3397.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3397.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3397", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:04.983", - "lastModified": "2020-12-01T14:52:17.767", + "lastModified": "2024-11-21T01:40:47.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -196,6 +195,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76963", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33466", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76963", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3398.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3398.json index 6fd0540d814..eed14864355 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3398.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3398.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3398", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-23T21:55:05.030", - "lastModified": "2020-12-01T14:43:58.053", + "lastModified": "2024-11-21T01:40:47.217", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/407.html 'CWE-407: Algorithmic Complexity'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -282,6 +280,27 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76964", "source": "secalert@redhat.com" + }, + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=refs%2Fheads%2FMOODLE_22_STABLE&st=commit&s=MDL-32126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/07/17/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49890", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76964", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/407.html 'CWE-407: Algorithmic Complexity'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3399.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3399.json index c65c440e10d..924f7a8c3d5 100644 --- a/CVE-2012/CVE-2012-33xx/CVE-2012-3399.json +++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3399.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3399", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-12T19:55:06.390", - "lastModified": "2017-08-29T01:31:54.917", + "lastModified": "2024-11-21T01:40:47.343", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -105,6 +104,40 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76667", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0043.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/19631", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/09/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/10/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54234", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76667", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3401.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3401.json index e9853d57c33..93edb2d3a4f 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3401.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3401.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3401", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T20:55:08.600", - "lastModified": "2023-02-13T00:25:23.867", + "lastModified": "2024-11-21T01:40:47.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -430,6 +429,84 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77088", "source": "secalert@redhat.com" + }, + { + "url": "http://libjpeg-turbo.svn.sourceforge.net/viewvc/libjpeg-turbo?view=revision&revision=830", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84090", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1590.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49938", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50726", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-02.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2552", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/19/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/19/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54601", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1511-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/attachment.cgi?id=596457", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837577", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77088", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3402.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3402.json index 4b3f007110f..3862b1e4353 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3402.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3402.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3402", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:49.457", - "lastModified": "2023-02-13T00:25:24.437", + "lastModified": "2024-11-21T01:40:47.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -126,6 +125,60 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1181.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-23.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027411", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://bugzilla.redhat.com/attachment.cgi?id=603059&action=diff", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=838941", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3403.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3403.json index 7c2b5ea8da6..5d251a7872f 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3403.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3403.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3403", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:49.520", - "lastModified": "2023-02-13T00:25:24.933", + "lastModified": "2024-11-21T01:40:47.957", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -162,6 +161,96 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1180.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1181.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50296", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:142", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:082", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027411", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1559-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3408.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3408.json index 15697a6692b..a6ce1c955fc 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3408.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3408.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3408", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-06T16:55:05.133", - "lastModified": "2022-01-24T16:46:02.250", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:48.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -101,6 +100,29 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-3408/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839166", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3410.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3410.json index 0a8a8577717..466b67529fd 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3410.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3410.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3410", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-27T23:55:01.947", - "lastModified": "2017-08-29T01:31:55.070", + "lastModified": "2024-11-21T01:40:48.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -121,6 +120,56 @@ { "url": "https://hermes.opensuse.org/messages/15227834", "source": "secalert@redhat.com" + }, + { + "url": "ftp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-033", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/51086", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201210-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/11/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/11/22", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/12/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54937", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77551", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15227834", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3413.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3413.json index ee89211e1a6..421fd0af830 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3413.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3413.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3413", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T20:55:03.610", - "lastModified": "2012-08-08T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:49.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -115,6 +114,45 @@ { "url": "https://projects.kde.org/projects/kde/kdepim/repository/revisions/dbb2f72f4745e00f53031965a9c10b2d6862bd54", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083946.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084262.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50008", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://ubuntu.com/usn/usn-1512-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/13/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/13/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/16/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/17/11", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://projects.kde.org/projects/kde/kdepim/repository/revisions/dbb2f72f4745e00f53031965a9c10b2d6862bd54", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3416.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3416.json index b88ee4b27eb..18f1a35eddf 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3416.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3416.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3416", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:50.617", - "lastModified": "2023-02-13T04:34:21.780", + "lastModified": "2024-11-21T01:40:49.707", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -304,6 +303,48 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77748", "source": "secalert@redhat.com" + }, + { + "url": "http://osvdb.org/84766", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1168.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1169.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50246", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50294", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55032", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027395", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77748", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3417.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3417.json index f945d6a9cf3..2a828670d7d 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3417.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3417.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3417", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T20:55:08.867", - "lastModified": "2023-02-13T04:34:21.973", + "lastModified": "2024-11-21T01:40:49.877", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -224,6 +223,38 @@ { "url": "https://hermes.opensuse.org/messages/15509723", "source": "secalert@redhat.com" + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota%3Ba=commitdiff%3Bh=0abbfe92536fa5854eb65572de0cf131f80e2387", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0120.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/19/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/19/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566717", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15509723", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3418.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3418.json index 4f46914d269..93c00416df6 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3418.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3418.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3418", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-27T23:55:02.040", - "lastModified": "2023-11-07T02:11:34.437", + "lastModified": "2024-11-21T01:40:50.027", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -252,6 +251,126 @@ { "url": "https://hermes.opensuse.org/messages/15540172", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085324.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085333.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=blob%3Bf=CHANGELOG%3Bh=16c9cbb2f61d909487ea1c3171f4ab33e5648ac5%3Bhb=fe51067ae869a4d59f350ac319b09edcb77ac8e6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=b441980d53be1835b25f0cd6bcc0062da82032dd", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=babd6c5c527f87ec838c13a1b4eba612af6ea27c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=e4faa1f0ba29151340920d975fc7639adf8371d5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=f190942b552aa80d59bbe718866aa00b8e3fd5cc", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=49c679c44425915a8d6aa4af5f90b35384843c12", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=7eb479b91ef12bf89a15b078af2107c8c4746a4a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=9f4e392c97ce42744ec73f82268ce6c815fdca0e", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=bfb3ab8c6b3d75b1a6580feee76a7d0925a3633c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=cced6012b4b93bfb640a9678589ced5416743910", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commitdiff%3Bh=f0eaefe046b1061797f45b0c20bb2ac371b504a5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/16/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840822", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840920", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841112", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841126", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841159", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841180", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841240", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841249", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841284", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841698", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15471040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15540133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15540172", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3419.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3419.json index 3e3e34a8f10..cbeaa0369e4 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3419.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3419.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3419", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-27T23:55:02.147", - "lastModified": "2023-11-07T02:11:34.540", + "lastModified": "2024-11-21T01:40:50.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -167,6 +166,46 @@ { "url": "https://hermes.opensuse.org/messages/15540172", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085324.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085333.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=blob%3Bf=CHANGELOG%3Bh=16c9cbb2f61d909487ea1c3171f4ab33e5648ac5%3Bhb=fe51067ae869a4d59f350ac319b09edcb77ac8e6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/16/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841702", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15471040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15540133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15540172", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3420.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3420.json index 29ad492c503..1c3556b7c01 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3420.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3420.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3420", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-27T23:55:02.227", - "lastModified": "2023-11-07T02:11:34.603", + "lastModified": "2024-11-21T01:40:50.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -188,6 +187,62 @@ { "url": "https://hermes.opensuse.org/messages/15540172", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085324.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085333.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=blob%3Bf=CHANGELOG%3Bh=16c9cbb2f61d909487ea1c3171f4ab33e5648ac5%3Bhb=fe51067ae869a4d59f350ac319b09edcb77ac8e6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=68fb968b4ee635bb301dc9ab64e633b0d66d27b4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=a7dc844d3586ea79887655a97c4252a79751fdae", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/16/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841298", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841319", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841704", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15471040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15540133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15540172", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3421.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3421.json index eed6f406a5e..31871ad9cf2 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3421.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3421.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3421", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-27T23:55:02.290", - "lastModified": "2023-11-07T02:11:34.667", + "lastModified": "2024-11-21T01:40:50.463", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -176,6 +175,50 @@ { "url": "https://hermes.opensuse.org/messages/15540172", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085324.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085333.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=blob%3Bf=CHANGELOG%3Bh=16c9cbb2f61d909487ea1c3171f4ab33e5648ac5%3Bhb=fe51067ae869a4d59f350ac319b09edcb77ac8e6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://oss.sgi.com/cgi-bin/gitweb.cgi?p=pcp/pcp.git%3Ba=commit%3Bh=9ba85dca940de976176ce196fd5e3c4170936354", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/16/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841706", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15471040", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15540133", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15540172", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3422.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3422.json index 3cafeb620d4..ffb494a247b 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3422.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3422.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3422", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T21:55:01.717", - "lastModified": "2014-10-04T04:53:51.270", + "lastModified": "2024-11-21T01:40:50.590", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -141,6 +140,65 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840592", "source": "secalert@redhat.com" + }, + { + "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.1/NEWS", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840592", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3423.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3423.json index 6e4452f29cc..ed5804bfaef 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3423.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3423.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3423", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T21:55:01.780", - "lastModified": "2014-10-04T04:53:51.457", + "lastModified": "2024-11-21T01:40:50.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -168,6 +167,92 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841345", "source": "secalert@redhat.com" + }, + { + "url": "http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=518", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=863", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.1/NEWS", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d65bd94e0ba9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/d7375e2a9076", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1132.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1521-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841345", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3424.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3424.json index 99018af19ed..3f6a6dce476 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3424.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3424.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3424", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-08T10:26:19.063", - "lastModified": "2019-08-08T15:42:45.623", + "lastModified": "2024-11-21T01:40:50.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -487,6 +486,22 @@ { "url": "https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en&dmode=source&output=gplain", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en&dmode=source&output=gplain", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3425.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3425.json index 25be7eab4c4..48ae75f4409 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3425.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3425.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3425", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-13T20:55:09.207", - "lastModified": "2023-11-07T02:11:34.770", + "lastModified": "2024-11-21T01:40:51.033", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -916,6 +915,51 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=284de253b1561b976291ba7405acd71ae71ff597%3Bhb=refs/heads/libpng10", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=2da5a7a8b690e257f94353b5b49d493cdc385322%3Bhb=refs/heads/libpng14", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bh=73e2ffd6a1471f2144d0ce7165d7323cb109f10f%3Bhb=refs/heads/libpng15", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=blob%3Bf=CHANGES%3Bhb=a4b640865ae47986bbe71ecc0e7d5181dcb0bac8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00004.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/24/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/24/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-2815-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3426.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3426.json index 5032e1296bb..002ba505194 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3426.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3426.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3426", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-31T10:45:42.670", - "lastModified": "2012-09-07T04:30:35.663", + "lastModified": "2024-11-21T01:40:51.183", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -159,6 +158,79 @@ "tags": [ "Patch" ] + }, + { + "url": "http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://github.com/openstack/keystone/commit/628149b3dc6b58b91fd08e6ca8d91c728ccb8626", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://github.com/openstack/keystone/commit/ea03d05ed5de0c015042876100d37a6a14bf56de", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/50045", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50494", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/27/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1552-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/keystone/+bug/996595", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/keystone/+bug/997194", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/keystone/+bug/998185", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3429.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3429.json index aca2a38c6c9..c39e85c4c5c 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3429.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3429.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3429", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T21:55:01.983", - "lastModified": "2017-08-29T01:31:55.290", + "lastModified": "2024-11-21T01:40:51.580", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -166,6 +165,55 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77391", "source": "secalert@redhat.com" + }, + { + "url": "http://git.fedorahosted.org/cgit/bind-dyndb-ldap.git/commit/?id=f345805c73c294db42452ae966c48fbc36c48006", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1139.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50086", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50159", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/02/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54787", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027341", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842466", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77391", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3434.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3434.json index 048b626876a..e5c0ab7e77e 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3434.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3434.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3434", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-15T21:55:03.713", - "lastModified": "2020-07-13T10:51:06.210", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:52.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -131,6 +130,48 @@ { "url": "http://www.tomsdimension.de/wp-plugins/count-per-day", "source": "secalert@redhat.com" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset/571926/count-per-day", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49692", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] + }, + { + "url": "http://www.darksecurity.de/advisories/2012/SSCHADV2012-015.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/24/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/27/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/83491", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.tomsdimension.de/wp-plugins/count-per-day", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3435.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3435.json index 494844889b3..b9ba955943c 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3435.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3435.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3435", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-15T20:55:03.070", - "lastModified": "2017-08-29T01:31:55.417", + "lastModified": "2024-11-21T01:40:52.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -474,6 +473,63 @@ { "url": "https://support.zabbix.com/browse/ZBX-5348", "source": "secalert@redhat.com" + }, + { + "url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://osvdb.org/84127", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49809", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50475", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2539", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/20087", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/27/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/28/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54661", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://support.zabbix.com/browse/ZBX-5348", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3437.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3437.json index 7795494b8f3..aabe02c1dd5 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3437.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3437.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3437", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T21:55:02.063", - "lastModified": "2017-08-29T01:31:55.540", + "lastModified": "2024-11-21T01:40:52.637", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -118,6 +117,53 @@ { "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0243", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50091", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50398", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:160", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:092", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54714", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027321", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1544-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844101", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77260", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0243", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3438.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3438.json index 259412b2da5..fc607f299a1 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3438.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3438.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3438", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T21:55:02.127", - "lastModified": "2017-08-29T01:31:55.587", + "lastModified": "2024-11-21T01:40:52.770", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://xforce.iss.net/xforce/xfdb/77259\r\n\r\n'Platforms Affected: GraphicsMagick 1.3.16'\r\n", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -110,6 +108,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77259", "source": "secalert@redhat.com" + }, + { + "url": "http://graphicsmagick.hg.sourceforge.net/hgweb/graphicsmagick/graphicsmagick/rev/d6e469d02cd2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00102.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50090", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:165", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54716", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844105", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77259", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://xforce.iss.net/xforce/xfdb/77259\r\n\r\n'Platforms Affected: GraphicsMagick 1.3.16'\r\n" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3440.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3440.json index c9d0bf21ede..96daddee697 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3440.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3440.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3440", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-08T10:26:19.220", - "lastModified": "2023-02-13T04:34:22.927", + "lastModified": "2024-11-21T01:40:52.910", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Additional information: https://rhn.redhat.com/errata/RHSA-2012-1149.html", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:C/A:C", + "baseScore": 5.6, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -92,6 +90,22 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54868", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844442", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "Additional information: https://rhn.redhat.com/errata/RHSA-2012-1149.html" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3441.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3441.json index 4f23f77caf5..b65a9e01c7c 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3441.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3441.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3441", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:51.160", - "lastModified": "2023-11-07T02:11:35.237", + "lastModified": "2024-11-21T01:40:53.023", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +102,38 @@ { "url": "https://git.icinga.org/?p=icinga-doc.git%3Ba=commitdiff%3Bh=619a08ca1178144b8a3a5caafff32a2d3918edab", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/30/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/30/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=767319", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78874", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=712813d3118a5b9e5a496179cab81dbe91f69d63", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=dcd45fb6931c4abf710829bee21af09f842bc281", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.icinga.org/?p=icinga-doc.git%3Ba=commitdiff%3Bh=619a08ca1178144b8a3a5caafff32a2d3918edab", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3442.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3442.json index 3b57cb1b124..3df373163e5 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3442.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3442.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3442", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-31T17:55:01.607", - "lastModified": "2013-04-11T03:29:59.033", + "lastModified": "2024-11-21T01:40:53.147", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -240,6 +239,34 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2529", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1560-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3443.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3443.json index e116bb7cf60..c96f7e1ed19 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3443.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3443.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3443", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-31T17:55:04.577", - "lastModified": "2013-04-11T03:29:59.107", + "lastModified": "2024-11-21T01:40:53.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -240,6 +239,34 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2529", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1560-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3444.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3444.json index a33e34934d5..e876ed8e010 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3444.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3444.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3444", "sourceIdentifier": "secalert@redhat.com", "published": "2012-07-31T17:55:04.623", - "lastModified": "2013-04-11T03:29:59.177", + "lastModified": "2024-11-21T01:40:53.403", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -240,6 +239,34 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2529", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/31/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/31/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1560-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3445.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3445.json index b0105239631..ad9efcd14cf 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3445.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3445.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3445", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T21:55:02.187", - "lastModified": "2013-03-22T03:11:32.787", + "lastModified": "2024-11-21T01:40:53.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -114,6 +113,49 @@ { "url": "https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1202.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50118", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50299", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50372", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/31/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/31/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54748", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844734", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.redhat.com/archives/libvir-list/2012-July/msg01650.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3447.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3447.json index 3df68a94618..7482fa59918 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3447.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3447.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3447", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-20T18:55:03.293", - "lastModified": "2023-11-07T02:11:35.343", + "lastModified": "2024-11-21T01:40:53.753", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -116,6 +115,46 @@ { "url": "https://review.openstack.org/#/c/10953/", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/07/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54869", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/nova/+bug/1031311", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845106", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77539", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/nova/commit/ce4b2e27be45a85b310237615c47eb53f37bb5f3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/openstack/nova/commit/d9577ce9f266166a297488445b5b0c93c1ddb368", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://review.openstack.org/#/c/10953/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3448.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3448.json index 7f0214abe2f..fa874e7a9b4 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3448.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3448.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3448", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-06T18:55:01.197", - "lastModified": "2018-08-04T01:29:00.297", + "lastModified": "2024-11-21T01:40:53.873", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -188,6 +187,57 @@ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html", "source": "secalert@redhat.com" + }, + { + "url": "http://ganglia.info/?p=549", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084196.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/084202.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50047", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2013/dsa-2610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/02/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54699", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=428776", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845124", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.exploit-db.com/exploits/38030/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00136.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3449.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3449.json index bfbb3e61a0d..ef3560caac8 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3449.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3449.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3449", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T20:55:03.780", - "lastModified": "2017-08-29T01:31:55.807", + "lastModified": "2024-11-21T01:40:54.010", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -99,6 +98,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77417", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/02/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/03/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54789", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845350", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77417", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3450.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3450.json index 8791129763f..9d637556300 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3450.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3450.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3450", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-06T16:55:05.963", - "lastModified": "2013-04-19T03:23:28.883", + "lastModified": "2024-11-21T01:40:54.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -197,6 +196,46 @@ { "url": "https://bugzilla.novell.com/show_bug.cgi?id=769785", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/bugtraq/2012/Jun/60", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2527", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/02/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/02/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.php.net/ChangeLog-5.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1569-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=61755", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=769785", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3452.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3452.json index ae284f5e102..973b86e382f 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3452.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3452.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3452", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T20:55:03.967", - "lastModified": "2012-08-08T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:54.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.3 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -98,6 +97,18 @@ { "url": "https://bugzilla.gnome.org/show_bug.cgi?id=679441", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/03/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/03/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.gnome.org/show_bug.cgi?id=679441", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3453.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3453.json index cbae1e2e5bb..c6f931d7205 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3453.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3453.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3453", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T20:55:04.093", - "lastModified": "2012-08-08T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:54.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -83,6 +82,18 @@ { "url": "http://www.securityfocus.com/bid/54802", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/03/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54802", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3454.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3454.json index 17189e8c2f9..aa9caef3823 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3454.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3454.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3454", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-07T20:55:04.203", - "lastModified": "2012-08-08T15:21:09.703", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:54.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 3.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 3.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -79,6 +78,14 @@ { "url": "http://www.securityfocus.com/bid/54801", "source": "secalert@redhat.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/03/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54801", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3455.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3455.json index 71eb927aaa8..409a4aee3e8 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3455.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3455.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3455", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-20T19:55:05.433", - "lastModified": "2023-11-07T02:11:35.467", + "lastModified": "2024-11-21T01:40:54.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -198,6 +197,57 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77483", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00040.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50199", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kde.org/info/security/advisory-20120810-1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/04/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/04/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/06/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/06/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/10/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54816", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1526-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77483", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3456.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3456.json index ab4f8051b20..30421e087ee 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3456.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3456.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3456", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-20T18:55:03.810", - "lastModified": "2023-11-07T02:11:35.523", + "lastModified": "2024-11-21T01:40:54.833", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -126,6 +125,10 @@ "url": "http://marc.info/?l=bugtraq&m=136733075705494&w=2", "source": "secalert@redhat.com" }, + { + "url": "http://marc.info/?l=bugtraq&m=136733075705494&w=2", + "source": "secalert@redhat.com" + }, { "url": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf", "source": "secalert@redhat.com" @@ -175,6 +178,68 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77482", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00026.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=136733075705494&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://marc.info/?l=bugtraq&m=136733075705494&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50050", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kde.org/info/security/advisory-20120810-1.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/04/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/04/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/06/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/06/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/10/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54816", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1525-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77482", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3457.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3457.json index 64f831abe0f..353281dbbb0 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3457.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3457.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3457", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-12T00:55:00.810", - "lastModified": "2013-04-05T03:12:05.163", + "lastModified": "2024-11-21T01:40:54.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -165,6 +164,30 @@ { "url": "http://www.securityfocus.com/bid/54863", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683879", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086161.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086387.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/06/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/06/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54863", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3461.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3461.json index 4f4e63187b9..31bd621a43c 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3461.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3461.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3461", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-20T19:55:05.527", - "lastModified": "2023-02-13T00:25:34.703", + "lastModified": "2024-11-21T01:40:55.463", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -141,6 +140,70 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77528", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684121", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.cypherpunks.ca/pipermail/otr-dev/2012-July/001347.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.cypherpunks.ca/pipermail/otr-dev/2012-July/001348.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://otr.git.sourceforge.net/git/gitweb.cgi?p=otr/libotr%3Ba=commitdiff%3Bh=1902baee5d4b056850274ed0fa8c2409f1187435", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://otr.git.sourceforge.net/git/gitweb.cgi?p=otr/libotr%3Ba=commitdiff%3Bh=6d4ca89cf1d3c9a8aff696c3a846ac5a51f762c1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://otr.git.sourceforge.net/git/gitweb.cgi?p=otr/libotr%3Ba=commitdiff%3Bh=b17232f86f8e60d0d22caf9a2400494d3c77da58", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2526", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:097", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54907", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1541-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846377", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77528", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3463.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3463.json index e1833be3b8f..eff0577b6be 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3463.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3463.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3463", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-10T10:34:47.843", - "lastModified": "2019-08-08T15:42:45.623", + "lastModified": "2024-11-21T01:40:55.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -501,6 +500,21 @@ "tags": [ "Patch" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source&output=gplain", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3464.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3464.json index dbf15dbef1b..c81bf0af896 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3464.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3464.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3464", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-10T10:34:47.890", - "lastModified": "2019-08-08T15:42:45.623", + "lastModified": "2024-11-21T01:40:55.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -816,6 +815,25 @@ { "url": "https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source&output=gplain", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50694", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source&output=gplain", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3465.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3465.json index 4917e94cf31..6925624c8bb 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3465.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3465.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3465", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-10T10:34:47.937", - "lastModified": "2019-08-08T15:42:45.623", + "lastModified": "2024-11-21T01:40:55.987", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -816,6 +815,25 @@ { "url": "https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source&output=gplain", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0154.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50694", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source&output=gplain", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3467.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3467.json index f71e425e05c..8bd8e6231ec 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3467.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3467.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3467", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-27T23:55:02.383", - "lastModified": "2017-08-29T01:31:56.167", + "lastModified": "2024-11-21T01:40:56.260", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -130,6 +129,49 @@ { "url": "https://issues.apache.org/jira/browse/QPID-3849", "source": "secalert@redhat.com" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1277.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1279.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50186", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50698", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://svn.apache.org/viewvc?view=revision&revision=1352992", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/09/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54954", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77568", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.apache.org/jira/browse/QPID-3849", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3468.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3468.json index 2b500ed0145..3edf308da49 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3468.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3468.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3468", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-12T21:55:01.387", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:56.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -145,6 +144,34 @@ "Exploit", "Patch" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/09/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/4764792", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/d954093", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/fdb48d1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3469.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3469.json index f149db43875..507fbe4fff0 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3469.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3469.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3469", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-12T21:55:01.417", - "lastModified": "2012-08-13T17:47:44.457", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:56.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -153,6 +152,42 @@ "Exploit", "Patch" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/09/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/68d9916", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/6f6a919", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/a11d43c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/e0e2b66", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3470.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3470.json index b113fa429e7..733bd1bfb39 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3470.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3470.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3470", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-12T21:55:01.467", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:56.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -129,6 +128,18 @@ "Exploit", "Patch" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/09/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/3301e48", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3471.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3471.json index 8fcb00af1f0..f12a01c6148 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3471.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3471.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3471", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-12T21:55:01.513", - "lastModified": "2012-08-13T17:52:03.507", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:56.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -129,6 +128,18 @@ "Exploit", "Patch" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/09/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/3f14fa0", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3472.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3472.json index e45ce9e3ab4..472522ab306 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3472.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3472.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3472", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-12T21:55:01.543", - "lastModified": "2012-08-13T17:53:09.147", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:56.863", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -129,6 +128,18 @@ "Exploit", "Patch" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/09/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/4c24325", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3473.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3473.json index 897b20cb303..7274db0f72b 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3473.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3473.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3473", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-12T21:55:01.590", - "lastModified": "2012-08-13T17:54:29.490", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:56.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 6.4 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -136,6 +135,25 @@ "tags": [ "Patch" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/09/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/13ca6f4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/f67f4ad", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3474.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3474.json index fb8aeba92b8..86c8a3a0875 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3474.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3474.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3474", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-12T21:55:01.637", - "lastModified": "2012-08-13T17:55:16.443", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:57.090", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -129,6 +128,18 @@ "Exploit", "Patch" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/09/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/529f353", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3475.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3475.json index a323d855db0..3b3210f8f3f 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3475.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3475.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3475", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-12T21:55:01.700", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:57.207", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -135,6 +134,24 @@ "tags": [ "Patch" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/09/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/7892559", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/fcdad03", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3476.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3476.json index 9c281d64da4..fa00185573b 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3476.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3476.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3476", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-12T21:55:01.777", - "lastModified": "2012-08-13T17:58:43.553", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:57.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -129,6 +128,18 @@ "Exploit", "Patch" ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/09/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/ushahidi/Ushahidi_Web/commit/00eae4f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3477.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3477.json index 03aaf5f9629..e712e987062 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3477.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3477.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3477", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T03:17:43.997", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:57.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0087.html", "source": "secalert@redhat.com" + }, + { + "url": "http://adamcaudill.com/2012/08/12/neoinvoice-blind-sql-injection-cve-2012-3477/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0087.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3478.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3478.json index 396976c8ed7..094321ebe9b 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3478.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3478.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3478", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T18:55:05.683", - "lastModified": "2013-03-02T04:44:07.983", + "lastModified": "2024-11-21T01:40:57.527", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -171,6 +170,45 @@ { "url": "http://www.securityfocus.com/bid/53430", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50272", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29235647", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2530", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/10/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/11/28/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53430", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3479.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3479.json index bd256e6f452..31d21978793 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3479.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3479.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3479", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:51.520", - "lastModified": "2013-12-13T05:03:02.563", + "lastModified": "2024-11-21T01:40:57.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -140,6 +139,60 @@ { "url": "http://www.ubuntu.com/usn/USN-1586-1", "source": "secalert@redhat.com" + }, + { + "url": "http://debbugs.gnu.org/cgi/bugreport.cgi?bug=12155", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00057.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50157", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50801", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2013/dsa-2603", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/13/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/13/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54969", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.420006", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1586-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3480.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3480.json index fc1c73d5acd..85456a26534 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3480.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3480.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3480", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:51.770", - "lastModified": "2023-02-13T03:28:28.790", + "lastModified": "2024-11-21T01:40:57.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -138,6 +137,73 @@ { "url": "https://security.gentoo.org/glsa/201503-04", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84710", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1207.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1208.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50201", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50422", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=14459", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/13/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/13/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54982", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027374", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1589-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.gentoo.org/glsa/201503-04", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3481.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3481.json index f6aaef2dd02..c0f374f64ca 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3481.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3481.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3481", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:51.833", - "lastModified": "2023-11-07T02:11:35.770", + "lastModified": "2024-11-21T01:40:57.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -175,6 +174,109 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-09/msg00043.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1180.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1181.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50296", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:142", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:082", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027411", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1559-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=776572", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847303", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3483.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3483.json index 67c78fb53dd..120c0e12dd3 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3483.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3483.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3483", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T19:55:01.967", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:58.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 6.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, @@ -88,6 +87,22 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0122.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/tunnelblick/issues/detail?id=212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.zx2c4.com/Pwnnel-Blicker/tree/pwnnel-blicker.c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3484.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3484.json index ec1286b3898..df73915076e 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3484.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3484.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3484", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T19:55:01.997", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:58.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -84,6 +83,18 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0122.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/tunnelblick/issues/detail?id=212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3485.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3485.json index ef6ec4a318f..9d12089f962 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3485.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3485.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3485", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T19:55:02.043", - "lastModified": "2013-12-13T05:03:03.297", + "lastModified": "2024-11-21T01:40:58.447", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.2 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, @@ -92,6 +91,26 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0122.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/tunnelblick/issues/detail?id=212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://git.zx2c4.com/Pwnnel-Blicker/tree/pwnnel-blicker-for-kids.sh", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/24578", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3486.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3486.json index b27e11c86cf..abe1d1c7530 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3486.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3486.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3486", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T19:55:02.090", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:58.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -84,6 +83,18 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0122.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/tunnelblick/issues/detail?id=212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-34xx/CVE-2012-3487.json b/CVE-2012/CVE-2012-34xx/CVE-2012-3487.json index 1feffe6e620..f83ce4d6f6f 100644 --- a/CVE-2012/CVE-2012-34xx/CVE-2012-3487.json +++ b/CVE-2012/CVE-2012-34xx/CVE-2012-3487.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3487", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T19:55:02.120", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:40:58.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 1.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.2 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -84,6 +83,18 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", "source": "secalert@redhat.com" + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0122.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://code.google.com/p/tunnelblick/issues/detail?id=212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3501.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3501.json index 691548e5d99..94c45cff8ae 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3501.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3501.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3501", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:52.630", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:00.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -187,6 +186,52 @@ "Exploit", "Patch" ] + }, + { + "url": "http://freecode.com/projects/squidclamav/releases/346722", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49057", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://squidclamav.darold.net/news.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/16/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/16/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/84138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54663", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.gentoo.org/show_bug.cgi?id=428778", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/darold/squidclamav/commit/80f74451f628264d1d9a1f1c0bbcebc932ba5e00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3502.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3502.json index a916fd7dfd9..43ebb5fb5a2 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3502.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3502.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3502", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-22T19:55:01.773", - "lastModified": "2023-11-07T02:11:36.420", + "lastModified": "2024-11-21T01:41:00.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -152,6 +151,77 @@ { "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", "source": "secalert@redhat.com" + }, + { + "url": "http://httpd.apache.org/security/vulnerabilities_24.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201208.mbox/%3C0BFFEA9B-801B-4BAA-9534-56F640268E30%40apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.apache.org/dist/httpd/CHANGES_2.4.3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3503.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3503.json index d04d2830763..2796c6210aa 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3503.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3503.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3503", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:52.693", - "lastModified": "2024-02-13T16:44:47.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:00.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -45,13 +44,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -154,6 +153,51 @@ "tags": [ "Issue Tracking" ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1186.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1187.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50344", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55140", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://github.com/Katello/katello/commit/7c256fef9d75029d0ffff58ff1dcda915056d3a3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/Katello/katello/pull/499", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3507.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3507.json index 141fe41481b..16db692caad 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3507.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3507.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3507", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:52.803", - "lastModified": "2015-08-24T16:48:35.827", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:01.267", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -296,6 +295,40 @@ { "url": "http://www.securelist.com/en/advisories/50212", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/50212", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.net/projects/roundcubemail/files/roundcubemail/0.8.0/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://trac.roundcube.net/ticket/1488519", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securelist.com/en/advisories/50212", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3508.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3508.json index 85c865627d9..e872e7240d4 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3508.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3508.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3508", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:52.850", - "lastModified": "2012-08-29T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:01.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -105,6 +104,40 @@ "tags": [ "Patch" ] + }, + { + "url": "http://secunia.com/advisories/50279", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.net/news/?group_id=139281&id=309011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://trac.roundcube.net/ticket/1488613", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securelist.com/en/advisories/50279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/roundcube/roundcubemail/commit/5ef8e4ad9d3ee8689d2b83750aa65395b7cd59ee", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3509.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3509.json index 31d9b811f60..1d66b86c9f6 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3509.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3509.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3509", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:01.727", - "lastModified": "2017-08-29T01:31:56.883", + "lastModified": "2024-11-21T01:41:01.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -178,6 +177,63 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78135", "source": "secalert@redhat.com" + }, + { + "url": "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=54411", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] + }, + { + "url": "http://gcc.gnu.org/ml/gcc-patches/2012-08/msg01986.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://security-tracker.debian.org/tracker/CVE-2012-3509", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/29/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-2496-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78135", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3514.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3514.json index 9168c97a7db..7ce0ea62740 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3514.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3514.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3514", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T10:29:52.897", - "lastModified": "2014-02-12T04:38:04.580", + "lastModified": "2024-11-21T01:41:02.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,29 @@ { "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0266", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/50311", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:107", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/21/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55114", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0266", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3517.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3517.json index 02ad932c823..869ef2d0b40 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3517.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3517.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3517", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T03:17:44.043", - "lastModified": "2013-08-22T03:56:41.617", + "lastModified": "2024-11-21T01:41:02.587", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -107,6 +106,41 @@ "tags": [ "Patch" ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/21/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.torproject.org/projects/tor/ticket/6480", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3518.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3518.json index 6b51216015c..33bc30648eb 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3518.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3518.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3518", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T03:17:44.090", - "lastModified": "2013-08-22T03:56:41.690", + "lastModified": "2024-11-21T01:41:02.720", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ { "url": "https://trac.torproject.org/projects/tor/ticket/6530", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/21/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.torproject.org/projects/tor/ticket/6530", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3519.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3519.json index ec5ddde312b..316ca1093d8 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3519.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3519.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3519", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-26T03:17:44.153", - "lastModified": "2013-08-22T03:56:41.763", + "lastModified": "2024-11-21T01:41:02.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -104,6 +103,38 @@ { "url": "https://trac.torproject.org/projects/tor/ticket/6537", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/21/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50583", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.torproject.org/projects/tor/ticket/6537", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3525.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3525.json index d63651d752f..df396d83651 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3525.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3525.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3525", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-25T16:55:00.837", - "lastModified": "2023-02-13T04:34:26.153", + "lastModified": "2024-11-21T01:41:03.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -340,6 +339,64 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1538.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1539.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50124", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50859", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mail-archive.com/jabberd2%40lists.xiaoka.com/msg01903.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/22/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/22/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55167", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xmpp.org/resources/security-notices/server-dialback/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850872", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/Jabberd2/jabberd2/commit/aabcffae560d5fd00cd1d2ffce5d760353cf0a4d", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3526.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3526.json index 2a1b57d6606..1a8229c9651 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3526.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3526.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3526", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:01.803", - "lastModified": "2017-08-29T01:31:56.947", + "lastModified": "2024-11-21T01:41:03.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77987", "source": "secalert@redhat.com" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683984", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2532", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/22/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/22/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55154", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://zecrazytux.net/troubleshooting/apache2-segfault-debugging-tutorial", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77987", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3527.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3527.json index ea3ef718978..88fb960062d 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3527.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3527.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3527", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:01.880", - "lastModified": "2024-01-21T02:47:51.273", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:03.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -150,6 +149,49 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://osvdb.org/84773", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://secunia.com/advisories/50287", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2537", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/22/8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77791", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3528.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3528.json index c7e258f32b1..b185b828292 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3528.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3528.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3528", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:01.990", - "lastModified": "2017-08-29T01:31:57.070", + "lastModified": "2024-11-21T01:41:04.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -306,6 +305,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77792", "source": "secalert@redhat.com" + }, + { + "url": "http://osvdb.org/84771", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50287", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2537", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/22/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77792", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3529.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3529.json index aeb74ee6dc4..e8ef654db5e 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3529.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3529.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3529", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.100", - "lastModified": "2017-08-29T01:31:57.133", + "lastModified": "2024-11-21T01:41:04.167", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -303,6 +302,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77793", "source": "secalert@redhat.com" + }, + { + "url": "http://osvdb.org/84775", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50287", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2537", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/22/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77793", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3530.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3530.json index 57d9e97696d..47ab520162c 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3530.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3530.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3530", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.177", - "lastModified": "2017-08-29T01:31:57.197", + "lastModified": "2024-11-21T01:41:04.300", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\r\n\r\n'CWE-184: Incomplete Blacklist'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -307,6 +305,37 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77794", "source": "secalert@redhat.com" + }, + { + "url": "http://osvdb.org/84772", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50287", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2537", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/22/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77794", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\r\n\r\n'CWE-184: Incomplete Blacklist'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3531.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3531.json index 7bc0cfd498e..03be712fa3c 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3531.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3531.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3531", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.240", - "lastModified": "2017-08-29T01:31:57.260", + "lastModified": "2024-11-21T01:41:04.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -295,6 +294,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78888", "source": "secalert@redhat.com" + }, + { + "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-004/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2537", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/22/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78888", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3533.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3533.json index 93127f2f28d..30b8a4aab85 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3533.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3533.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3533", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T20:55:01.043", - "lastModified": "2017-08-29T01:31:57.320", + "lastModified": "2024-11-21T01:41:04.747", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -117,6 +116,41 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77984", "source": "secalert@redhat.com" + }, + { + "url": "http://gerrit.ovirt.org/#/c/7209/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://gerrit.ovirt.org/#/c/7249/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50409", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/24/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/26/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55208", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851672", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77984", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3534.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3534.json index 1e173e6e192..1a36b68823b 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3534.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3534.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3534", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-31T20:55:08.263", - "lastModified": "2018-10-30T16:27:35.843", + "lastModified": "2024-11-21T01:41:04.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -279,6 +278,68 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77975", "source": "secalert@redhat.com" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00070.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50343", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Vendor Advisory" + ] + }, + { + "url": "http://www.gnugk.org/gnugk-3.1.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/25/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/25/4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/27/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.osvdb.org/84862", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55198", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77975", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3535.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3535.json index fd4106ab657..8f07b1ce327 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3535.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3535.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3535", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.287", - "lastModified": "2023-02-13T04:34:27.247", + "lastModified": "2024-11-21T01:41:05.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -140,6 +139,64 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77994", "source": "secalert@redhat.com" + }, + { + "url": "http://code.google.com/p/openjpeg/issues/detail?id=170", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090021.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090579.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84978", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1283.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50360", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50681", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:157", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/27/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/27/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55214", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842918", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77994", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3537.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3537.json index 351ab1ff713..fdb5fdd7900 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3537.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3537.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3537", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.380", - "lastModified": "2017-08-29T01:31:57.570", + "lastModified": "2024-11-21T01:41:05.367", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.6 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, @@ -123,6 +122,57 @@ { "url": "https://github.com/dellcloudedge/barclamp-deployer/pull/57", "source": "secalert@redhat.com" + }, + { + "url": "http://osvdb.org/84955", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50442", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/27/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/27/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55240", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=774967", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78041", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/SUSE-Cloud/barclamp-deployer/commit/5ea8d4ddaa4cb1ce834d36889f0fe7ac0d617bc8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/SUSE-Cloud/barclamp-deployer/commit/b6454268a067fc77ff5de82057b5b53b3cc38b87", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/dellcloudedge/barclamp-deployer/pull/57", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3540.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3540.json index 927532c7c32..33a6354fcaa 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3540.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3540.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3540", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.460", - "lastModified": "2023-11-07T02:11:37.127", + "lastModified": "2024-11-21T01:41:05.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -118,6 +117,53 @@ { "url": "https://lists.launchpad.net/openstack/msg16281.html", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/50480", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/30/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/30/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55329", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1565-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/horizon/+bug/1039077", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/horizon/commit/35eada8a27323c0f83c400177797927aba6bc99b", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://lists.launchpad.net/openstack/msg16278.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.launchpad.net/openstack/msg16281.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3542.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3542.json index aa8b8c189a9..71d727d158e 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3542.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3542.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3542", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.523", - "lastModified": "2023-11-07T02:11:37.400", + "lastModified": "2024-11-21T01:41:05.780", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,54 @@ { "url": "https://lists.launchpad.net/openstack/msg16282.html", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/50467", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50494", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/30/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55326", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1552-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/keystone/+bug/1040626", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/openstack/keystone/commit/5438d3b5a219d7c8fa67e66e538d325a61617155", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/openstack/keystone/commit/c13d0ba606f7b2bdc609a7f388334e5efec3f3aa", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://lists.launchpad.net/openstack/msg16282.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3548.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3548.json index f5ef3833d87..3c78d13c343 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3548.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3548.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3548", "sourceIdentifier": "secalert@redhat.com", "published": "2012-08-30T22:55:05.857", - "lastModified": "2017-09-19T01:35:06.557", + "lastModified": "2024-11-21T01:41:06.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -178,6 +177,38 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15646", "source": "secalert@redhat.com" + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/29/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027464", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7666", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849926", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15646", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3551.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3551.json index 449ac7588db..f4669f0f800 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3551.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3551.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3551", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.600", - "lastModified": "2012-09-06T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:06.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,37 @@ "Exploit", "Patch" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/31/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55315", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bugzilla.novell.com/show_bug.cgi?id=771840", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/SUSE-Cloud/barclamp-crowbar/commit/90e905b7668a1cc884fb70040f96c7a0a287de48", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/SUSE-Cloud/barclamp-crowbar/commit/a82ed926c6e3ba2b0cada213c35e4b00f34ea629", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3553.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3553.json index 09475307c72..b4581276528 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3553.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3553.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3553", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-19T20:55:07.973", - "lastModified": "2012-06-26T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'CWE-476: NULL Pointer Dereference'", + "lastModified": "2024-11-21T01:41:07.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -234,6 +232,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2012-009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'CWE-476: NULL Pointer Dereference'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3554.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3554.json index 0f20c87148f..8851e951068 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3554.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3554.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3554", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-10T10:34:48.437", - "lastModified": "2012-08-10T13:59:17.327", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:07.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -667,6 +666,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://extensions.joomla.org/extensions/photos-a-images/photo-gallery/142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://joomlacode.org/gf/project/rsgallery2/news/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.rsgallery2.nl/announcements/rsgallery2_3.2.0_and_2.3.0_released_16845.0.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3555.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3555.json index 1d1a4512044..abaf7427532 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3555.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3555.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3555", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:00.907", - "lastModified": "2012-06-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:07.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 7.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.9, @@ -725,6 +724,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1165/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1021/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3556.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3556.json index 719c4056eb7..95cc940521d 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3556.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3556.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3556", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:00.953", - "lastModified": "2012-06-15T13:39:03.187", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:07.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -725,6 +724,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1165/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1020/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3557.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3557.json index 262ea43ff73..1ec47b7fc91 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3557.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3557.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3557", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:01.013", - "lastModified": "2012-06-15T13:45:17.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:07.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -725,6 +724,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1165/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1019/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3558.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3558.json index 0f782c0283c..a2cbad51327 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3558.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3558.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3558", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:01.077", - "lastModified": "2012-06-15T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:07.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -730,6 +729,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1165/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1018/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3559.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3559.json index 73b7d16c30c..2b3b5220de8 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3559.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3559.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3559", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:01.157", - "lastModified": "2012-08-09T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:08.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -488,6 +487,10 @@ { "url": "http://www.opera.com/docs/changelogs/mac/1200/", "source": "cve@mitre.org" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3560.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3560.json index 7158796a245..04984cb2806 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3560.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3560.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3560", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:01.640", - "lastModified": "2012-06-15T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:08.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -734,6 +733,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://blog.vulnhunt.com/index.php/2012/06/14/cal-2012-0015-opera-website-spoof/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1165/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1022/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3561.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3561.json index 72ce2bd62f9..4fef127074b 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3561.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3561.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3561", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:01.703", - "lastModified": "2012-08-14T03:38:36.567", + "lastModified": "2024-11-21T01:41:08.407", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -725,6 +724,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/81809", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1164/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1164/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1164/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1016/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3562.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3562.json index c78ba19192c..e75cc862c86 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3562.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3562.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3562", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:01.750", - "lastModified": "2017-08-29T01:31:57.837", + "lastModified": "2024-11-21T01:41:08.573", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -720,6 +719,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76357", "source": "cve@mitre.org" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200b/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76357", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3563.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3563.json index 04e3f076670..634e3f1d4d3 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3563.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3563.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3563", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:01.797", - "lastModified": "2017-08-29T01:31:57.917", + "lastModified": "2024-11-21T01:41:08.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -723,6 +722,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76358", "source": "cve@mitre.org" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200b/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76358", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3564.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3564.json index 55274e12c75..3c844c1ea6b 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3564.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3564.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3564", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:01.827", - "lastModified": "2017-08-29T01:31:57.993", + "lastModified": "2024-11-21T01:41:08.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -720,6 +719,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76359", "source": "cve@mitre.org" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200b/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76359", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3565.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3565.json index 0594ba11ee2..0e05e734c88 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3565.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3565.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3565", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:01.873", - "lastModified": "2017-08-29T01:31:58.070", + "lastModified": "2024-11-21T01:41:09.020", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -720,6 +719,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76360", "source": "cve@mitre.org" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200b/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76360", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3566.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3566.json index 33aa7908d12..9190769a7de 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3566.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3566.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3566", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:01.907", - "lastModified": "2017-08-29T01:31:58.150", + "lastModified": "2024-11-21T01:41:09.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -720,6 +719,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76361", "source": "cve@mitre.org" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200b/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76361", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3567.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3567.json index fef702c2d78..a6815c3e65b 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3567.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3567.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3567", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:01.967", - "lastModified": "2017-08-29T01:31:58.213", + "lastModified": "2024-11-21T01:41:09.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -720,6 +719,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76362", "source": "cve@mitre.org" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200b/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76362", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3568.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3568.json index 9ec9b664923..e8fc6521404 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3568.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3568.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3568", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-14T19:55:02.013", - "lastModified": "2017-08-29T01:31:58.290", + "lastModified": "2024-11-21T01:41:09.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -720,6 +719,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76363", "source": "cve@mitre.org" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1200b/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76363", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3570.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3570.json index 40263932298..7911c87d9ff 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3570.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3570.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3570", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T10:42:35.710", - "lastModified": "2016-11-28T19:08:17.610", + "lastModified": "2024-11-21T01:41:09.767", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C", + "baseScore": 5.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 5.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -174,6 +173,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201301-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54665", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.isc.org/article/AA-00714", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3571.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3571.json index 7229ec0904c..10e83ca4bf1 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3571.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3571.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3571", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T10:42:35.757", - "lastModified": "2020-04-01T13:58:10.143", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:09.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 6.1, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.1 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -354,6 +353,99 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1140.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1141.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201301-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2516", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2519", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:116", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1519-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://kb.isc.org/article/AA-00712", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3572.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3572.json index 8f4c00db1ff..d33521445b5 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3572.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3572.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3572", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-11T19:55:00.910", - "lastModified": "2012-09-12T14:53:26.353", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:10.070", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -85,6 +84,14 @@ { "url": "http://www.mycert.org.my/en/services/advisories/mycert/2012/main/detail/904/index.html", "source": "cve@mitre.org" + }, + { + "url": "http://sourceforge.net/projects/mymesyuarat/files/mymesyuarat/mymesyuarat%20ver0.9b-2.zip/download", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mycert.org.my/en/services/advisories/mycert/2012/main/detail/904/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3574.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3574.json index 16901beb933..4faf85bebb6 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3574.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3574.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3574", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-16T00:55:07.640", - "lastModified": "2017-08-29T01:31:58.417", + "lastModified": "2024-11-21T01:41:10.213", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +119,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76133", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49411", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18997", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.opensyscom.fr/Actualites/wordpress-plugins-mm-forms-community-shell-upload-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53852", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76133", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3575.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3575.json index d57a6ed9fe1..fa6c3ee00ce 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3575.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3575.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3575", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-16T00:55:07.670", - "lastModified": "2017-08-29T01:31:58.463", + "lastModified": "2024-11-21T01:41:10.367", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -105,6 +104,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76170", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49463", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/19019", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opensyscom.fr/Actualites/wordpress-plugins-rbx-gallery-multiple-arbitrary-file-upload-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76170", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3576.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3576.json index b89f25e7f09..f59ff5715ad 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3576.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3576.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3576", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-16T00:55:07.873", - "lastModified": "2017-08-29T01:31:58.540", + "lastModified": "2024-11-21T01:41:10.517", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -595,6 +594,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76166", "source": "cve@mitre.org" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fwpstorecart&old=555124&new_path=%2Fwpstorecart&new=555124", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49459", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/wpstorecart/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/19023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76166", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3577.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3577.json index 53b0fd2aca5..962a7bdb13d 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3577.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3577.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3577", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-17T03:41:42.857", - "lastModified": "2017-08-29T01:31:58.603", + "lastModified": "2024-11-21T01:41:10.687", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -130,6 +129,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76076", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/113287/WordPress-Nmedia-WP-Member-Conversation-1.35.0-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49375", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/wordpress-member-private-conversation/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opensyscom.fr/Actualites/wordpress-plugins-nmedia-wordpress-member-conversation-shell-upload-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53790", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76076", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3578.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3578.json index de898528dd4..4056d172d43 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3578.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3578.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3578", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-17T03:41:42.907", - "lastModified": "2017-08-29T01:31:58.650", + "lastModified": "2024-11-21T01:41:10.820", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76123", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/113323/WordPress-FCChat-Widget-2.x-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49419", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.opensyscom.fr/Actualites/wordpress-plugins-fcchat-widget-shell-upload-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53855", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76123", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3579.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3579.json index 2daa4bedad3..f06f2daa745 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3579.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3579.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3579", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.143", - "lastModified": "2017-08-29T01:31:58.713", + "lastModified": "2024-11-21T01:41:10.963", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 7.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 5.5, @@ -111,6 +110,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78034", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.com/files/116277/Symantec-Messaging-Gateway-9.5-Default-SSH-Password.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55143", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78034", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3580.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3580.json index 08cbcf1dabc..ddb5bca6686 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3580.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3580.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3580", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.190", - "lastModified": "2017-08-29T01:31:58.773", + "lastModified": "2024-11-21T01:41:11.100", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 7.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 5.1, @@ -107,6 +106,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78032", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/55141", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78032", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3581.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3581.json index a9e213cd15a..544dcb88dec 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3581.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3581.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3581", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.223", - "lastModified": "2013-10-10T20:48:53.180", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:11.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.3 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -103,6 +102,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/55142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3582.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3582.json index 256805c927b..9ffb5845f80 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3582.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3582.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3582", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-04T11:04:49.733", - "lastModified": "2013-02-14T04:55:01.510", + "lastModified": "2024-11-21T01:41:11.370", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.9 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -91,6 +90,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securityfocus.com/bid/55246", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027467", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120830_00", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3585.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3585.json index 4fe36739b38..fbeae6428ec 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3585.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3585.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3585", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-05T22:55:01.293", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:11.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,14 @@ { "url": "http://www.reactionpenetrationtesting.co.uk/Irfanview-JLS-Heap-Overflow.html", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-06/0191.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.reactionpenetrationtesting.co.uk/Irfanview-JLS-Heap-Overflow.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3587.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3587.json index ff9d37678e7..b323cb8ce30 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3587.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3587.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3587", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-19T20:55:08.007", - "lastModified": "2020-01-08T15:13:02.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:11.630", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -387,6 +386,22 @@ { "url": "https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1013128", "source": "cve@mitre.org" + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Jun/267", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1475-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1477-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1013128", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3588.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3588.json index 718b2ae21d2..d99038d03d2 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3588.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3588.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3588", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-19T20:55:08.770", - "lastModified": "2017-08-29T01:31:58.837", + "lastModified": "2024-11-21T01:41:11.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -108,6 +107,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76171", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49464", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/19018", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.opensyscom.fr/Actualites/wordpress-plugins-plugin-newsletter-remote-file-disclosure-vulnerability.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76171", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3589.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3589.json index bd47ba78fae..ac953521a12 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3589.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3589.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3589", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:01.710", - "lastModified": "2012-09-22T03:34:42.680", + "lastModified": "2024-11-21T01:41:11.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3590.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3590.json index 94f82d97675..f15f69747a1 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3590.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3590.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3590", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:01.757", - "lastModified": "2012-09-22T03:34:42.930", + "lastModified": "2024-11-21T01:41:12.047", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:N", + "baseScore": 8.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 8.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3591.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3591.json index 5fe247e9b11..3063cba0fe3 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3591.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3591.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3591", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:01.820", - "lastModified": "2012-09-22T03:34:43.167", + "lastModified": "2024-11-21T01:41:12.170", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3592.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3592.json index 92257b45e0c..e1954e8b953 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3592.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3592.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3592", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:01.867", - "lastModified": "2012-09-22T03:34:43.353", + "lastModified": "2024-11-21T01:41:12.297", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3593.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3593.json index 7b16f89a254..bc75321c139 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3593.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3593.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3593", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:01.917", - "lastModified": "2012-09-22T03:34:43.523", + "lastModified": "2024-11-21T01:41:12.437", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3594.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3594.json index be00367d5d2..c7e50675a0b 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3594.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3594.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3594", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:01.993", - "lastModified": "2012-09-22T03:34:43.710", + "lastModified": "2024-11-21T01:41:12.560", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3595.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3595.json index 2dc57283904..2ce1f45b6f2 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3595.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3595.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3595", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.040", - "lastModified": "2012-09-22T03:34:43.900", + "lastModified": "2024-11-21T01:41:12.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3596.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3596.json index f5b986f4dd1..207b1ba3fc4 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3596.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3596.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3596", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.087", - "lastModified": "2012-09-22T03:34:44.070", + "lastModified": "2024-11-21T01:41:12.833", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3597.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3597.json index 7ec3951fccc..49f5ad83857 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3597.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3597.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3597", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.133", - "lastModified": "2012-09-22T03:34:44.243", + "lastModified": "2024-11-21T01:41:12.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-35xx/CVE-2012-3599.json b/CVE-2012/CVE-2012-35xx/CVE-2012-3599.json index 05664dc351a..ba0c772fb83 100644 --- a/CVE-2012/CVE-2012-35xx/CVE-2012-3599.json +++ b/CVE-2012/CVE-2012-35xx/CVE-2012-3599.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3599", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.180", - "lastModified": "2012-09-22T03:34:44.570", + "lastModified": "2024-11-21T01:41:13.253", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3600.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3600.json index 31e94675073..616ff6acfdf 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3600.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3600.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3600", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.227", - "lastModified": "2012-09-22T03:34:44.743", + "lastModified": "2024-11-21T01:41:13.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3603.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3603.json index c8ed4ff6aad..1c1df289cdb 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3603.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3603.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3603", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.273", - "lastModified": "2012-09-22T03:34:45.260", + "lastModified": "2024-11-21T01:41:13.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3604.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3604.json index d8f1607e88f..9f042e787a2 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3604.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3604.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3604", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.320", - "lastModified": "2012-09-22T03:34:45.417", + "lastModified": "2024-11-21T01:41:13.953", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3605.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3605.json index fcfc73fc8c4..6f3d9d82141 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3605.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3605.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3605", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.367", - "lastModified": "2012-09-22T03:34:45.587", + "lastModified": "2024-11-21T01:41:14.080", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3608.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3608.json index ea105d90c25..9c2eea8f982 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3608.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3608.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3608", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.417", - "lastModified": "2012-09-22T03:34:46.103", + "lastModified": "2024-11-21T01:41:14.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3609.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3609.json index 78ea44aba12..65a29e34d5a 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3609.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3609.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3609", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.460", - "lastModified": "2012-09-22T03:34:46.273", + "lastModified": "2024-11-21T01:41:14.620", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3610.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3610.json index 81ea6494109..8284c96d518 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3610.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3610.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3610", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.507", - "lastModified": "2012-09-22T03:34:46.447", + "lastModified": "2024-11-21T01:41:14.743", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3611.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3611.json index 0c4412fe693..a8fee5ff891 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3611.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3611.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3611", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.557", - "lastModified": "2012-09-22T03:34:46.617", + "lastModified": "2024-11-21T01:41:14.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3615.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3615.json index 2e7672f8774..e7770c4a9bc 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3615.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3615.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3615", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.633", - "lastModified": "2012-09-22T03:34:47.320", + "lastModified": "2024-11-21T01:41:15.397", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3618.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3618.json index 9e75111e4a0..7dc2f53bd31 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3618.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3618.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3618", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.837", - "lastModified": "2012-09-22T03:34:47.900", + "lastModified": "2024-11-21T01:41:15.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3620.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3620.json index 62bea4f6b14..f9b0d2bee57 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3620.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3620.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3620", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.883", - "lastModified": "2012-09-22T03:34:48.087", + "lastModified": "2024-11-21T01:41:15.993", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3625.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3625.json index 2bc8e853952..f8376fd527e 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3625.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3625.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3625", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.930", - "lastModified": "2012-09-22T03:34:48.947", + "lastModified": "2024-11-21T01:41:16.663", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3626.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3626.json index 0d61620209f..93dd4fc0620 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3626.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3626.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3626", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:02.993", - "lastModified": "2012-09-22T03:34:49.117", + "lastModified": "2024-11-21T01:41:16.793", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3627.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3627.json index bc1903ee7f2..3aa32d85d11 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3627.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3627.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3627", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.057", - "lastModified": "2012-09-22T03:34:49.290", + "lastModified": "2024-11-21T01:41:16.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3628.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3628.json index f07d8d77f35..bac36d70221 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3628.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3628.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3628", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.103", - "lastModified": "2012-09-22T03:34:49.447", + "lastModified": "2024-11-21T01:41:17.060", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3629.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3629.json index 38b50360af1..3c366da7f1a 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3629.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3629.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3629", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.150", - "lastModified": "2012-09-22T03:34:49.633", + "lastModified": "2024-11-21T01:41:17.197", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3630.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3630.json index d3882758115..548fdd98a96 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3630.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3630.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3630", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.197", - "lastModified": "2012-09-22T03:34:49.807", + "lastModified": "2024-11-21T01:41:17.327", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3631.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3631.json index 23da8512c2d..3aeb12b4714 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3631.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3631.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3631", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.243", - "lastModified": "2012-09-22T03:34:50.133", + "lastModified": "2024-11-21T01:41:17.457", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3633.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3633.json index 5cdf6626142..3abd1b90a41 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3633.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3633.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3633", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.290", - "lastModified": "2012-09-22T03:34:50.823", + "lastModified": "2024-11-21T01:41:17.750", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3634.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3634.json index ad9e1bd75a4..4a7476982a4 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3634.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3634.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3634", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.353", - "lastModified": "2012-09-22T03:34:51.133", + "lastModified": "2024-11-21T01:41:17.890", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3635.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3635.json index bb1666bcf71..af3d5e1b107 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3635.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3635.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3635", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.417", - "lastModified": "2012-09-22T03:34:51.400", + "lastModified": "2024-11-21T01:41:18.027", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3636.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3636.json index d988c424ca9..64c4c41fb2d 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3636.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3636.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3636", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.447", - "lastModified": "2012-09-22T03:34:51.573", + "lastModified": "2024-11-21T01:41:18.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3637.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3637.json index 9c91810ec51..b9c2e22cfab 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3637.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3637.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3637", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.493", - "lastModified": "2012-09-22T03:34:51.743", + "lastModified": "2024-11-21T01:41:18.290", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3638.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3638.json index 293a1443413..c9522c0cf75 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3638.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3638.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3638", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.540", - "lastModified": "2012-09-22T03:34:51.917", + "lastModified": "2024-11-21T01:41:18.420", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3639.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3639.json index 7ec0674f3c9..56cbc45bc48 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3639.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3639.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3639", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.587", - "lastModified": "2012-09-22T03:34:52.260", + "lastModified": "2024-11-21T01:41:18.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3640.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3640.json index 02001b90d56..4e53f896e66 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3640.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3640.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3640", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.633", - "lastModified": "2012-09-22T03:34:52.760", + "lastModified": "2024-11-21T01:41:18.693", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3641.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3641.json index b9e34c7142a..318fedd0c6e 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3641.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3641.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3641", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.680", - "lastModified": "2012-09-22T03:34:53.040", + "lastModified": "2024-11-21T01:41:18.830", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3642.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3642.json index 43f86b84e26..abb04423937 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3642.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3642.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3642", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.743", - "lastModified": "2012-09-22T03:34:53.260", + "lastModified": "2024-11-21T01:41:18.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3644.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3644.json index 2587e4073fa..58ea73cbd05 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3644.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3644.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3644", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.773", - "lastModified": "2012-09-22T03:34:53.637", + "lastModified": "2024-11-21T01:41:19.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3645.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3645.json index 6836b126e71..0dc79c22e9c 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3645.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3645.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3645", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.820", - "lastModified": "2012-09-22T03:34:53.870", + "lastModified": "2024-11-21T01:41:19.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3646.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3646.json index b80b9081adc..270f97eae07 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3646.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3646.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3646", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.867", - "lastModified": "2012-09-22T03:34:54.057", + "lastModified": "2024-11-21T01:41:20.250", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3650.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3650.json index 26fbc83fedf..a4ad3b7681f 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3650.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3650.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3650", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T19:55:05.710", - "lastModified": "2013-03-22T03:11:49.887", + "lastModified": "2024-11-21T01:41:20.913", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -603,6 +602,32 @@ { "url": "http://www.securityfocus.com/bid/54703", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54703", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3653.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3653.json index 19789ba8dce..ac66c34969b 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3653.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3653.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3653", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.917", - "lastModified": "2012-09-22T03:34:55.400", + "lastModified": "2024-11-21T01:41:21.387", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3655.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3655.json index a070f664083..475bee4e5f7 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3655.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3655.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3655", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:03.960", - "lastModified": "2012-09-22T03:34:55.760", + "lastModified": "2024-11-21T01:41:21.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3656.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3656.json index f0e35c445a3..4418b8521ad 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3656.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3656.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3656", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.007", - "lastModified": "2012-09-22T03:34:55.963", + "lastModified": "2024-11-21T01:41:21.840", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3661.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3661.json index 1b8d0588d74..24aa6984064 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3661.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3661.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3661", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.057", - "lastModified": "2012-09-22T03:34:56.917", + "lastModified": "2024-11-21T01:41:22.617", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3663.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3663.json index 44910acc5ae..9eb62c7289a 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3663.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3663.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3663", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.133", - "lastModified": "2012-09-22T03:34:57.120", + "lastModified": "2024-11-21T01:41:22.783", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3664.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3664.json index e5f924e3547..cccd28da439 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3664.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3664.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3664", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.180", - "lastModified": "2012-09-22T03:34:57.337", + "lastModified": "2024-11-21T01:41:22.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3665.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3665.json index 3ae8d3bddfe..d7b78cd90d0 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3665.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3665.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3665", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.227", - "lastModified": "2012-09-22T03:34:57.587", + "lastModified": "2024-11-21T01:41:23.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3666.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3666.json index 330564bd973..c15a4740ac2 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3666.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3666.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3666", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.273", - "lastModified": "2012-09-22T03:34:57.793", + "lastModified": "2024-11-21T01:41:23.207", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3667.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3667.json index c29a82bc150..f69a6748e08 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3667.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3667.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3667", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.320", - "lastModified": "2012-09-22T03:34:57.963", + "lastModified": "2024-11-21T01:41:23.353", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3668.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3668.json index 594d463376e..0024fe17ca4 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3668.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3668.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3668", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.383", - "lastModified": "2012-09-22T03:34:58.150", + "lastModified": "2024-11-21T01:41:23.493", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3669.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3669.json index a2d231d61ec..43fb39ffed5 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3669.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3669.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3669", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.430", - "lastModified": "2012-09-22T03:34:58.340", + "lastModified": "2024-11-21T01:41:23.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3670.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3670.json index f117e950657..6738f837fea 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3670.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3670.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3670", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.477", - "lastModified": "2012-09-22T03:34:58.543", + "lastModified": "2024-11-21T01:41:23.777", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3674.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3674.json index 6bf090b6022..a62b4724449 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3674.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3674.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3674", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.523", - "lastModified": "2012-09-22T03:34:59.590", + "lastModified": "2024-11-21T01:41:24.343", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3678.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3678.json index a3414735a9a..71f788ead09 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3678.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3678.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3678", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.570", - "lastModified": "2012-09-22T03:35:00.370", + "lastModified": "2024-11-21T01:41:24.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3679.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3679.json index c4f837a4b18..7a9112599bd 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3679.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3679.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3679", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.617", - "lastModified": "2012-09-22T03:35:00.573", + "lastModified": "2024-11-21T01:41:25.070", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3680.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3680.json index 00a12fa4aeb..ac20e7bd01e 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3680.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3680.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3680", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.680", - "lastModified": "2012-09-22T03:35:00.777", + "lastModified": "2024-11-21T01:41:25.630", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3681.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3681.json index 16437c54ca9..8f1dc23bc1a 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3681.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3681.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3681", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.727", - "lastModified": "2012-09-22T03:35:00.980", + "lastModified": "2024-11-21T01:41:26.360", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3682.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3682.json index f7bde62f349..c115cfcc2f3 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3682.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3682.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3682", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.773", - "lastModified": "2012-09-22T03:35:01.167", + "lastModified": "2024-11-21T01:41:26.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3683.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3683.json index e2b40e5b08c..3b2620d8bba 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3683.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3683.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3683", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.820", - "lastModified": "2012-09-22T03:35:01.370", + "lastModified": "2024-11-21T01:41:26.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3686.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3686.json index 98dd5b89e74..d19f5e925c7 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3686.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3686.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3686", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T20:55:04.867", - "lastModified": "2012-09-22T03:35:01.947", + "lastModified": "2024-11-21T01:41:27.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -607,6 +606,36 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5485", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3689.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3689.json index 27871d4b265..601f5ea8d7c 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3689.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3689.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3689", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T19:55:06.007", - "lastModified": "2012-07-30T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:27.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -591,6 +590,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3690.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3690.json index bc45aece8d9..069b32373b8 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3690.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3690.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3690", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T19:55:06.057", - "lastModified": "2012-07-26T14:23:26.077", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:27.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -591,6 +590,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3691.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3691.json index 87223588db0..3c7ccdc6c97 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3691.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3691.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3691", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T19:55:06.087", - "lastModified": "2012-09-22T03:35:02.713", + "lastModified": "2024-11-21T01:41:27.790", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -599,6 +598,28 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3693.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3693.json index 41a382b62a1..13d4ec0838c 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3693.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3693.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3693", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T19:55:06.133", - "lastModified": "2012-09-22T03:35:03.043", + "lastModified": "2024-11-21T01:41:28.063", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\r\n\r\n'CWE-184: Incomplete Blacklist'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -600,6 +598,29 @@ { "url": "http://support.apple.com/kb/HT5503", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\r\n\r\n'CWE-184: Incomplete Blacklist'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3694.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3694.json index a1f1c3194fd..8912f75be0d 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3694.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3694.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3694", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T19:55:06.167", - "lastModified": "2012-11-30T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:28.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -591,6 +590,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3695.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3695.json index ad989ed76f2..3d34acdbf33 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3695.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3695.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3695", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T19:55:06.210", - "lastModified": "2013-03-22T03:11:53.400", + "lastModified": "2024-11-21T01:41:28.343", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -603,6 +602,32 @@ { "url": "http://www.securityfocus.com/bid/54695", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54695", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3696.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3696.json index 3aa3d468904..df00076df58 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3696.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3696.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3696", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T19:55:06.243", - "lastModified": "2013-03-22T03:11:53.467", + "lastModified": "2024-11-21T01:41:28.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -603,6 +602,32 @@ { "url": "http://www.securityfocus.com/bid/54700", "source": "product-security@apple.com" + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5503", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54700", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3697.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3697.json index 054998444f6..06b07ed66a3 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3697.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3697.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3697", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-25T19:55:06.290", - "lastModified": "2012-07-30T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:28.617", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", + "baseScore": 7.1, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.1 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -591,6 +590,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://support.apple.com/kb/HT5400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-36xx/CVE-2012-3698.json b/CVE-2012/CVE-2012-36xx/CVE-2012-3698.json index ba808c88f2b..1569ba4a6f0 100644 --- a/CVE-2012/CVE-2012-36xx/CVE-2012-3698.json +++ b/CVE-2012/CVE-2012-36xx/CVE-2012-3698.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3698", "sourceIdentifier": "product-security@apple.com", "published": "2012-07-26T19:55:01.200", - "lastModified": "2012-07-31T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:28.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -209,6 +208,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-37xx/CVE-2012-3789.json b/CVE-2012/CVE-2012-37xx/CVE-2012-3789.json index a4ef0d252e8..f094151fe3a 100644 --- a/CVE-2012/CVE-2012-37xx/CVE-2012-3789.json +++ b/CVE-2012/CVE-2012-37xx/CVE-2012-3789.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3789", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:05.993", - "lastModified": "2020-03-18T17:38:21.580", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:37.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -254,6 +253,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://en.bitcoin.it/wiki/CVEs", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-37xx/CVE-2012-3790.json b/CVE-2012/CVE-2012-37xx/CVE-2012-3790.json index fa9dc137e2a..8f7504fefdd 100644 --- a/CVE-2012/CVE-2012-37xx/CVE-2012-3790.json +++ b/CVE-2012/CVE-2012-37xx/CVE-2012-3790.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3790", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-20T15:55:01.860", - "lastModified": "2012-06-21T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:37.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -169,6 +168,38 @@ { "url": "http://secpod.org/blog/?p=504", "source": "cve@mitre.org" + }, + { + "url": "http://loganalyzer.adiscon.com/downloads/loganalyzer-3-4-4-v3-stable", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://loganalyzer.adiscon.com/downloads/loganalyzer-v3-5-5-v3-beta", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-highlight-parameter", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secpod.org/advisories/SecPod_LogAnalyzer_XSS_Vuln.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secpod.org/blog/?p=504", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-37xx/CVE-2012-3791.json b/CVE-2012/CVE-2012-37xx/CVE-2012-3791.json index 4111e296a13..5b2d3544c94 100644 --- a/CVE-2012/CVE-2012-37xx/CVE-2012-3791.json +++ b/CVE-2012/CVE-2012-37xx/CVE-2012-3791.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3791", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-21T16:55:01.473", - "lastModified": "2017-08-29T01:32:05.273", + "lastModified": "2024-11-21T01:41:37.640", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75999", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/82412", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82413", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/82414", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18955", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53749", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75999", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-37xx/CVE-2012-3792.json b/CVE-2012/CVE-2012-37xx/CVE-2012-3792.json index d0788eeda83..53e448f8cda 100644 --- a/CVE-2012/CVE-2012-37xx/CVE-2012-3792.json +++ b/CVE-2012/CVE-2012-37xx/CVE-2012-3792.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3792", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-25T17:55:01.113", - "lastModified": "2013-05-21T03:19:19.620", + "lastModified": "2024-11-21T01:41:37.773", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://aluigi.org/adv/proservrex_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-179-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/download/update/server_ex/server_ex/Readme_E.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/news/2012/0606.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-37xx/CVE-2012-3793.json b/CVE-2012/CVE-2012-37xx/CVE-2012-3793.json index cd73edf40eb..df48f808859 100644 --- a/CVE-2012/CVE-2012-37xx/CVE-2012-3793.json +++ b/CVE-2012/CVE-2012-37xx/CVE-2012-3793.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3793", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-25T17:55:01.193", - "lastModified": "2017-08-29T01:32:05.337", + "lastModified": "2024-11-21T01:41:37.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -127,6 +126,40 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://aluigi.org/adv/proservrex_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-179-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75547", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/download/update/server_ex/server_ex/Readme_E.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/news/2012/0606.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-37xx/CVE-2012-3794.json b/CVE-2012/CVE-2012-37xx/CVE-2012-3794.json index 466fec6172d..46d2f476246 100644 --- a/CVE-2012/CVE-2012-37xx/CVE-2012-3794.json +++ b/CVE-2012/CVE-2012-37xx/CVE-2012-3794.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3794", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-25T17:55:01.253", - "lastModified": "2017-08-29T01:32:05.400", + "lastModified": "2024-11-21T01:41:38.050", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -127,6 +126,40 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://aluigi.org/adv/proservrex_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-179-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75551", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/download/update/server_ex/server_ex/Readme_E.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/news/2012/0606.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-37xx/CVE-2012-3795.json b/CVE-2012/CVE-2012-37xx/CVE-2012-3795.json index 660bafbb365..4b0c41f5d50 100644 --- a/CVE-2012/CVE-2012-37xx/CVE-2012-3795.json +++ b/CVE-2012/CVE-2012-37xx/CVE-2012-3795.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3795", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-25T17:55:01.363", - "lastModified": "2013-05-21T03:19:25.783", + "lastModified": "2024-11-21T01:41:38.190", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://aluigi.org/adv/proservrex_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-179-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/download/update/server_ex/server_ex/Readme_E.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/news/2012/0606.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-37xx/CVE-2012-3796.json b/CVE-2012/CVE-2012-37xx/CVE-2012-3796.json index 4f18ba65914..deea2e4dfce 100644 --- a/CVE-2012/CVE-2012-37xx/CVE-2012-3796.json +++ b/CVE-2012/CVE-2012-37xx/CVE-2012-3796.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3796", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-25T17:55:01.410", - "lastModified": "2013-05-21T03:19:25.970", + "lastModified": "2024-11-21T01:41:38.337", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -123,6 +122,36 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://aluigi.org/adv/proservrex_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-179-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/download/update/server_ex/server_ex/Readme_E.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/news/2012/0606.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-37xx/CVE-2012-3797.json b/CVE-2012/CVE-2012-37xx/CVE-2012-3797.json index df2613779a8..3ba8b8ef847 100644 --- a/CVE-2012/CVE-2012-37xx/CVE-2012-3797.json +++ b/CVE-2012/CVE-2012-37xx/CVE-2012-3797.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3797", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-25T17:55:01.457", - "lastModified": "2013-05-21T03:19:26.073", + "lastModified": "2024-11-21T01:41:38.477", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +119,33 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://aluigi.org/adv/proservrex_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-179-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49172", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53499", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/download/update/server_ex/server_ex/Readme_E.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.hmisource.com/otasuke/news/2012/0606.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-37xx/CVE-2012-3798.json b/CVE-2012/CVE-2012-37xx/CVE-2012-3798.json index 7e5a6a73f44..cb20548608a 100644 --- a/CVE-2012/CVE-2012-37xx/CVE-2012-3798.json +++ b/CVE-2012/CVE-2012-37xx/CVE-2012-3798.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3798", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-27T00:55:06.613", - "lastModified": "2012-06-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:38.623", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -114,6 +113,32 @@ { "url": "http://osvdb.org/82957", "source": "cve@mitre.org" + }, + { + "url": "http://drupal.org/node/1632702", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1632704", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1632734", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://osvdb.org/82957", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-37xx/CVE-2012-3799.json b/CVE-2012/CVE-2012-37xx/CVE-2012-3799.json index 76138263af2..e6f37ed8df5 100644 --- a/CVE-2012/CVE-2012-37xx/CVE-2012-3799.json +++ b/CVE-2012/CVE-2012-37xx/CVE-2012-3799.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3799", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-27T00:55:06.660", - "lastModified": "2017-08-29T01:32:05.477", + "lastModified": "2024-11-21T01:41:38.760", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -159,6 +158,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76146", "source": "cve@mitre.org" + }, + { + "url": "http://drupal.org/node/1617952", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1619830", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/maestro.git/commitdiff/c499971", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49393", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82714", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53836", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76146", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3800.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3800.json index d72930913f0..bfbce919288 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3800.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3800.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3800", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-27T00:55:06.707", - "lastModified": "2017-08-29T01:32:05.557", + "lastModified": "2024-11-21T01:41:38.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -164,6 +163,52 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76149", "source": "cve@mitre.org" + }, + { + "url": "http://drupal.org/node/1619736", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://drupal.org/node/1619810", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://drupalcode.org/project/og.git/commitdiff/d48fef5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49397", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82712", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53838", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76149", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3802.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3802.json index cddaad2fd08..de49970f1be 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3802.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3802.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3802", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-27T18:55:01.493", - "lastModified": "2017-08-29T01:32:05.617", + "lastModified": "2024-11-21T01:41:39.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -103,6 +102,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75716", "source": "cve@mitre.org" + }, + { + "url": "http://drupal.org/node/1585648", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53589", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75716", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3805.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3805.json index e7bbe341a51..eb02a243a66 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3805.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3805.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3805", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T19:55:06.967", - "lastModified": "2012-07-26T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:39.207", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -136,6 +135,35 @@ { "url": "https://www.htbridge.com/advisory/HTB23097", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0058.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49849", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.kajona.de/changelog_34x.de.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kajona.de/newsdetails.Kajona-V3-4-2-available.newsDetail.616decb4fe9b7a5929fb.en.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23097", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3811.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3811.json index 4aafde6a7e9..d1cde7e0d4e 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3811.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3811.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3811", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T19:55:04.663", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/434.html\r\n\r\n'CWE-434: Unrestricted Upload of File with Dangerous Type'", + "lastModified": "2024-11-21T01:41:40.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -88,6 +86,18 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://zerodayinitiative.com/advisories/ZDI-12-106/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://downloads.avaya.com/css/P8/documents/100164021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/434.html\r\n\r\n'CWE-434: Unrestricted Upload of File with Dangerous Type'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3812.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3812.json index 20c55de083e..393fe0357f5 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3812.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3812.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3812", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-09T22:55:01.260", - "lastModified": "2013-04-19T03:24:11.410", + "lastModified": "2024-11-21T01:41:40.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -773,6 +772,33 @@ { "url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2012-011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50687", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54317", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.asterisk.org/jira/browse/ASTERISK-20052", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3814.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3814.json index 6c32a11b9a8..a9caf08e91f 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3814.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3814.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3814", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-27T21:55:03.533", - "lastModified": "2012-06-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:40.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -98,6 +97,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/82657", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49327", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3815.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3815.json index b35667b31ca..2c89782e7b4 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3815.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3815.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3815", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-27T21:55:05.957", - "lastModified": "2017-08-29T01:32:05.697", + "lastModified": "2024-11-21T01:41:40.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -380,6 +379,58 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76060", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-06/0009.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49395", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://securitytracker.com/id?1027128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/82654", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.s3cur1ty.de/m1adv2012-001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53811", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.sielcosistemi.com/en/news/index.html?id=69", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.sielcosistemi.com/en/news/index.html?id=70", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-213-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76060", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3816.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3816.json index 17a937c945c..cfda8ae6346 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3816.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3816.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3816", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-27T21:55:06.017", - "lastModified": "2017-08-29T01:32:05.760", + "lastModified": "2024-11-21T01:41:40.680", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75890", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0135.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49299", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18945", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53702", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75890", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3817.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3817.json index 0597c744f41..35236c99750 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3817.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3817.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3817", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T10:42:35.803", - "lastModified": "2018-10-30T16:27:02.467", + "lastModified": "2024-11-21T01:41:40.823", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -647,6 +646,57 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1122.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1123.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51096", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.apple.com/kb/HT5880", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2517", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027296", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1518-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.isc.org/article/AA-00729", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3818.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3818.json index 69e88041371..d16523ddc40 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3818.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3818.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3818", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-29T17:55:01.390", - "lastModified": "2012-07-02T12:36:42.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:40.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -195,6 +194,14 @@ { "url": "http://knoxin.blogspot.co.uk/2012/06/revelation-password-manager-considered.html", "source": "cve@mitre.org" + }, + { + "url": "http://als.regnet.cz/fpm2/feedback/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://knoxin.blogspot.co.uk/2012/06/revelation-password-manager-considered.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3825.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3825.json index 78b52cdc8ec..b262d2d3601 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3825.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3825.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3825", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-30T10:15:05.153", - "lastModified": "2017-09-19T01:35:11.230", + "lastModified": "2024-11-21T01:41:41.973", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -209,6 +208,39 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15478", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49226", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-08.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7121", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7122", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15478", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3826.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3826.json index 6020f049166..b148d5abcda 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3826.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3826.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3826", "sourceIdentifier": "cve@mitre.org", "published": "2012-06-30T10:15:05.187", - "lastModified": "2017-09-19T01:35:11.293", + "lastModified": "2024-11-21T01:41:42.120", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -202,6 +201,32 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15536", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49226", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027094", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-08.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7125", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15536", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3828.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3828.json index d64d824167d..09a6e6eaa6e 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3828.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3828.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3828", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:01.693", - "lastModified": "2017-08-29T01:32:05.930", + "lastModified": "2024-11-21T01:41:42.263", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -83,6 +82,18 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75223", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112249/Joomla-2.5.3-Host-Header-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53277", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75223", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3829.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3829.json index 41f105b348c..1c7d8ac9d35 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3829.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3829.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3829", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:01.740", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:42.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.org/files/112249/Joomla-2.5.3-Host-Header-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3830.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3830.json index a0158d07f5e..2dfd82e18af 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3830.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3830.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3830", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.163", - "lastModified": "2017-08-29T01:32:05.993", + "lastModified": "2024-11-21T01:41:42.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -174,6 +173,48 @@ "Exploit", "Patch" ] + }, + { + "url": "http://osvdb.org/81637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48931", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.redteam-pentesting.de/en/advisories/rt-sa-2012-002/-php-decoda-cross-site-scripting-in-video-tags", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53332", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75333", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/milesj/php-decoda/commit/4068257bb4e1071d1d60577289d3da922c296c83", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/milesj/php-decoda/commit/666778f326dff3bd213be9f624f0fcb337c0b4c9", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3831.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3831.json index d7811be4e69..2616d50cfd7 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3831.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3831.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3831", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.210", - "lastModified": "2012-08-14T03:38:51.877", + "lastModified": "2024-11-21T01:41:42.683", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -139,6 +138,18 @@ "Exploit", "Patch" ] + }, + { + "url": "http://osvdb.org/81637", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/milesj/php-decoda/commit/104afad9d3cb1fbb766c4bc5b98e070a8a13fbd8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3832.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3832.json index 40edc4d370e..639836c7964 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3832.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3832.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3832", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.257", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:42.843", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -125,6 +124,14 @@ "Exploit", "Patch" ] + }, + { + "url": "https://github.com/milesj/php-decoda/commit/6f2b9fb48bc110edeab17459038feb2627d52320", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3833.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3833.json index 88248b1ccf4..c87e2f57c36 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3833.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3833.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3833", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.303", - "lastModified": "2017-08-29T01:32:06.040", + "lastModified": "2024-11-21T01:41:42.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75224", "source": "cve@mitre.org" + }, + { + "url": "http://hauntit.blogspot.com/2012/03/en-quickcmsv40-xss-over-get.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.org/files/112243/Quick.CMS-4.0-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53273", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75224", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3834.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3834.json index 3e9ced2231b..d47f855642f 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3834.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3834.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3834", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.663", - "lastModified": "2017-08-29T01:32:06.133", + "lastModified": "2024-11-21T01:41:43.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -110,6 +109,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75290", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49005", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.darksecurity.de/index.php?/211-KORAMIS-ADV2012-002-Alienvault-OSSIM-Open-Source-SIEM-3.1-Multiple-security-vulnerabilities.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18800", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-002.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53331", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75290", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3835.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3835.json index 154963dc1bf..505aaec25da 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3835.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3835.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3835", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.710", - "lastModified": "2017-08-29T01:32:06.197", + "lastModified": "2024-11-21T01:41:43.277", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -110,6 +109,45 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75297", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49005", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.darksecurity.de/index.php?/211-KORAMIS-ADV2012-002-Alienvault-OSSIM-Open-Source-SIEM-3.1-Multiple-security-vulnerabilities.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18800", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.koramis.com/advisories/2012/KORAMIS-ADV2012-002.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53331", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75297", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3836.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3836.json index 7e7123ba28e..f5f3061b7a6 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3836.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3836.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3836", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.770", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:43.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -156,6 +155,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/49023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.babygekko.com/site/news/general/baby-gekko-v1-2-0-released-with-3rd-party-independent-security-testing-performed-by-zero-science-lab.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18827", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53366", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5086.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3837.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3837.json index 8df3c8acbb2..163405909ad 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3837.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3837.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3837", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.817", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:43.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -161,6 +160,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/49052", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.babygekko.com/site/news/general/baby-gekko-v1-2-0-released-with-3rd-party-independent-security-testing-performed-by-zero-science-lab.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18827", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53366", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5086.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3838.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3838.json index 721ba7d4460..eb25080f95e 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3838.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3838.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3838", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.850", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:43.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -145,6 +144,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.babygekko.com/site/news/general/baby-gekko-v1-2-0-released-with-3rd-party-independent-security-testing-performed-by-zero-science-lab.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18827", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5086.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3839.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3839.json index 4722f5cc0b9..9d6120fe8c1 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3839.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3839.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3839", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.913", - "lastModified": "2017-08-29T01:32:06.260", + "lastModified": "2024-11-21T01:41:43.920", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -104,6 +103,39 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75298", "source": "cve@mitre.org" + }, + { + "url": "http://myclientbase.com/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18814", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53311", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://bitbucket.org/jesseterry/myclientbase/changeset/789099396f05", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75298", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3840.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3840.json index 224d055b732..7b7e298f4b1 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3840.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3840.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3840", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.943", - "lastModified": "2017-08-29T01:32:06.307", + "lastModified": "2024-11-21T01:41:44.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75299", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48961", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18814", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53311", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75299", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3841.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3841.json index 10dfd3a9bff..b027e450662 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3841.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3841.json @@ -2,10 +2,8 @@ "id": "CVE-2012-3841", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:02.990", - "lastModified": "2017-08-29T01:32:06.367", + "lastModified": "2024-11-21T01:41:44.217", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorImpact": "Per indicated reference links 1182120 and 1182121, the attack can be leveraged remotely has been scored as such pending clarification of CVE description.", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -87,6 +85,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75193", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81558", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/112218/KMPlayer-3.2.0.19-DLL-Hijack.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75193", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorImpact": "Per indicated reference links 1182120 and 1182121, the attack can be leveraged remotely has been scored as such pending clarification of CVE description." } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3842.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3842.json index 9911b8fb30e..acc7067653f 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3842.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3842.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3842", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:03.037", - "lastModified": "2012-07-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:44.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "http://www.vulnerability-lab.com/get_content.php?id=509", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0214.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=509", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3843.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3843.json index 744998cdc53..a05321b83b6 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3843.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3843.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3843", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:03.083", - "lastModified": "2017-08-29T01:32:06.417", + "lastModified": "2024-11-21T01:41:44.497", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75225", "source": "cve@mitre.org" + }, + { + "url": "http://hauntit.blogspot.com/2012/04/en-e107-cms-reflected-xss-in.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/112241/e107-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53271", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75225", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3844.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3844.json index b139dc23e0f..31a7a1d378a 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3844.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3844.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3844", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:03.117", - "lastModified": "2017-08-29T01:32:06.463", + "lastModified": "2024-11-21T01:41:44.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75325", "source": "cve@mitre.org" + }, + { + "url": "http://hauntit.blogspot.com/2012/04/en-vbulletin-4112-cross-site-scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/112385/vBulletin-4.1.12-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53319", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75325", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3845.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3845.json index 31213f81d58..2308044daaa 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3845.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3845.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3845", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:03.163", - "lastModified": "2017-08-29T01:32:06.523", + "lastModified": "2024-11-21T01:41:44.760", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75319", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-05/0005.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18816", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53333", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75319", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3846.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3846.json index e3e95cf27b3..7258e6ad212 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3846.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3846.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3846", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-03T22:55:03.490", - "lastModified": "2017-08-29T01:32:06.570", + "lastModified": "2024-11-21T01:41:44.900", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75323", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112375/PHP-Pastebin-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/81661", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53329", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75323", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3847.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3847.json index 81ca006f2ad..bc6897b10a1 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3847.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3847.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3847", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-05T03:23:18.683", - "lastModified": "2012-08-14T03:38:54.987", + "lastModified": "2024-11-21T01:41:45.030", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,17 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://secunia.com/advisories/49173", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-171-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3848.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3848.json index 92aecdb2b4d..4dc163ef68d 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3848.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3848.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3848", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-31T10:45:42.717", - "lastModified": "2018-03-08T18:30:40.520", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:45.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,22 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] + }, + { + "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2012-014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3859.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3859.json index 7aec9d847fc..29d44f61983 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3859.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3859.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3859", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-09T18:55:01.027", - "lastModified": "2012-07-10T14:29:29.247", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:45.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -75,6 +74,10 @@ { "url": "http://infosec42.blogspot.com/2012/07/cve-2012-2446-cve-2012-2447-cve-2012.html", "source": "cve@mitre.org" + }, + { + "url": "http://infosec42.blogspot.com/2012/07/cve-2012-2446-cve-2012-2447-cve-2012.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3863.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3863.json index c1ffba6f533..b857b057761 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3863.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3863.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3863", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-09T10:20:44.823", - "lastModified": "2013-10-10T18:24:06.903", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:45.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -799,6 +798,34 @@ { "url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2012-010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50687", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54327", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.asterisk.org/jira/browse/ASTERISK-19992", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3864.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3864.json index ea069121094..e476e8d37df 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3864.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3864.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3864", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:06.040", - "lastModified": "2019-07-10T18:02:28.767", + "lastModified": "2024-11-21T01:41:45.597", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -300,6 +299,53 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-3864/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1506-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839130", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/puppetlabs/puppet/commit/10f6cb8969b4d5a933b333ecb01ce3696b1d57d4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/puppetlabs/puppet/commit/c3c7462e4066bf3a563987a402bf3ddf278bcd87", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3865.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3865.json index 34c8575afde..dbcb01916ef 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3865.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3865.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3865", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:06.070", - "lastModified": "2019-07-10T18:02:28.767", + "lastModified": "2024-11-21T01:41:45.757", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -306,6 +305,53 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-3865/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1506-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3866.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3866.json index cf16edd14e4..2205c02d780 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3866.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3866.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3866", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:06.367", - "lastModified": "2019-07-10T18:02:28.767", + "lastModified": "2024-11-21T01:41:45.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -198,6 +197,41 @@ "Exploit", "Patch" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-3866/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2511", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1506-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839135", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3867.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3867.json index 266d29437e3..6595c31b221 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3867.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3867.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3867", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:06.680", - "lastModified": "2019-07-10T18:02:28.767", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:46.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -395,8 +394,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch", - "Issue Tracking" + "Issue Tracking", + "Patch" ] }, { @@ -404,9 +403,73 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Patch", + "Issue Tracking", + "Patch" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://puppetlabs.com/security/cve/cve-2012-3867/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50014", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2511", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1506-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839158", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ "Issue Tracking" ] + }, + { + "url": "https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] + }, + { + "url": "https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3868.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3868.json index f21a733d7cf..8dbddb0857f 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3868.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3868.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3868", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T10:42:35.850", - "lastModified": "2013-11-25T04:27:14.883", + "lastModified": "2024-11-21T01:41:46.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -137,6 +136,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2012&m=slackware-security.536004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kb.isc.org/article/AA-00730", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3869.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3869.json index 5a849ce45f9..8362e76ab38 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3869.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3869.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3869", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T20:55:09.973", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:46.417", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -123,6 +122,38 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0142.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49904", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.redaxo.org/de/download/sicherheitshinweise/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54670", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.htbridge.com/advisory/HTB23098", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3881.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3881.json index e0ca0b8f51c..46b145dd048 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3881.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3881.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3881", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T19:55:07.030", - "lastModified": "2012-07-16T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:47.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -84,6 +83,14 @@ { "url": "https://code.google.com/p/rtg2/issues/detail?id=35", "source": "cve@mitre.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/09/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://code.google.com/p/rtg2/issues/detail?id=35", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3884.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3884.json index 050e835a057..2272afb8e25 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3884.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3884.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3884", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-26T22:55:01.700", - "lastModified": "2012-07-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:47.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0087.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.tele-consulting.com/advisories/TC-SA-2012-02.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3885.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3885.json index 84093b01476..281ae347196 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3885.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3885.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3885", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-26T22:55:01.747", - "lastModified": "2012-07-27T13:45:49.840", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:47.427", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0087.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.tele-consulting.com/advisories/TC-SA-2012-02.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3886.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3886.json index b9f11b4a263..de32a73f6a9 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3886.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3886.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3886", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-26T22:55:01.793", - "lastModified": "2012-07-27T13:48:13.463", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:47.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0087.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.tele-consulting.com/advisories/TC-SA-2012-02.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3887.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3887.json index e5286c34313..cd87f75bc75 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3887.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3887.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3887", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-26T22:55:01.887", - "lastModified": "2012-07-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:47.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -116,6 +115,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0087.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.tele-consulting.com/advisories/TC-SA-2012-02.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3888.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3888.json index 4d8f373811c..6f519556c40 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3888.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3888.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3888", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-26T22:55:01.980", - "lastModified": "2012-07-27T13:58:19.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:47.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -85,6 +84,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0087.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.tele-consulting.com/advisories/TC-SA-2012-02.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3889.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3889.json index 7a62e143a2b..3801e3793fe 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3889.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3889.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3889", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-11T10:26:11.860", - "lastModified": "2017-09-19T01:35:11.357", + "lastModified": "2024-11-21T01:41:48.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -396,6 +395,25 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14748", "source": "cve@mitre.org" + }, + { + "url": "http://forums.winamp.com/showthread.php?t=345684", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/46624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14748", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-38xx/CVE-2012-3890.json b/CVE-2012/CVE-2012-38xx/CVE-2012-3890.json index 692cc57e5f1..5fe565d2349 100644 --- a/CVE-2012/CVE-2012-38xx/CVE-2012-3890.json +++ b/CVE-2012/CVE-2012-38xx/CVE-2012-3890.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3890", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-11T10:26:11.907", - "lastModified": "2017-09-19T01:35:11.417", + "lastModified": "2024-11-21T01:41:48.180", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -396,6 +395,25 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15553", "source": "cve@mitre.org" + }, + { + "url": "http://forums.winamp.com/showthread.php?t=345684", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/46624", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15553", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3951.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3951.json index f82b647af59..c0b60c6a439 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3951.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3951.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3951", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-31T10:45:42.763", - "lastModified": "2018-03-12T17:21:34.897", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:50.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,21 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "http://www.plixer.com/Press-Releases/plixer-releases-9-5-2.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2012-014.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3952.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3952.json index cff0d4d7de2..3d0b984c0ac 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3952.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3952.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3952", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T00:55:00.887", - "lastModified": "2017-08-29T01:32:07.197", + "lastModified": "2024-11-21T01:41:50.923", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -219,6 +218,43 @@ { "url": "https://www.htbridge.com/advisory/HTB23100", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0059.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/84482", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50150", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.phplist.com/?lid=579", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54887", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77526", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23100", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3953.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3953.json index 9684279f3ea..05c9f19e3af 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3953.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3953.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3953", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T00:55:00.933", - "lastModified": "2017-08-29T01:32:07.260", + "lastModified": "2024-11-21T01:41:51.067", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -215,6 +214,39 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0059.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/84483", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.phplist.com/?lid=579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77527", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23100", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3954.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3954.json index 7d7c39ded98..be6bdcc8ab9 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3954.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3954.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3954", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T10:42:35.913", - "lastModified": "2020-04-01T13:59:57.067", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:51.227", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -416,6 +415,86 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1141.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201301-06.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2516", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2519", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:115", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:116", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54665", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027300", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1519-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://kb.isc.org/article/AA-00737", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3956.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3956.json index f491d080cb4..88da0ee365b 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3956.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3956.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3956", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.270", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:53.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -312,6 +311,95 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55320", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=774597", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16997", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3957.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3957.json index 01144b6a597..9426332b50b 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3957.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3957.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3957", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.317", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:53.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -312,6 +311,95 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55341", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=774548", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16940", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3958.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3958.json index 42ab2ebf266..fbcf11e083a 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3958.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3958.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3958", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.347", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:41:53.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -1870,6 +1869,57 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16782", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55323", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=772346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16782", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3959.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3959.json index 2663ec05f87..ab090d31b9f 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3959.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3959.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3959", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.393", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:53.583", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -353,6 +352,116 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55324", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=771994", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16805", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3960.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3960.json index af6ce15c51d..8a6dac24d20 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3960.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3960.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3960", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.457", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:53.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -312,6 +311,95 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55325", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=771976", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16853", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3961.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3961.json index ac9896962d7..246cc106976 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3961.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3961.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3961", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.487", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:53.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -313,6 +312,96 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55321", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=771873", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16514", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3962.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3962.json index a6f678cb01c..11c60987658 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3962.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3962.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3962", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.537", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:41:54.083", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -1878,6 +1877,65 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16494", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2553", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2554", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2556", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=769120", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16494", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3963.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3963.json index ed343d7dc9c..bd812c6a902 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3963.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3963.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3963", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.567", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:54.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -312,6 +311,95 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55340", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=762280", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16437", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3964.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3964.json index 53adbebc51c..26dd24f0931 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3964.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3964.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3964", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.613", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:41:54.433", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -1870,6 +1869,57 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16857", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-58.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55322", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=756241", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16857", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3965.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3965.json index 3d111d717f6..6650856dc28 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3965.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3965.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3965", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.660", - "lastModified": "2017-09-19T01:35:12.653", + "lastModified": "2024-11-21T01:41:54.627", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -834,6 +833,38 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16442", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-60.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=769108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16442", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3966.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3966.json index b85e244eeaa..83d12f351e0 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3966.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3966.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3966", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.723", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:41:54.787", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -1870,6 +1869,57 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16246", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-61.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=775793", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=775794", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16246", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3967.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3967.json index d5525cb1199..eb8c53f9bdb 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3967.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3967.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3967", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.787", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:54.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -319,6 +318,90 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-62.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55277", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=777028", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3968.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3968.json index 2fe0123a393..6d308538103 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3968.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3968.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3968", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.833", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:55.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -312,6 +311,95 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-62.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55276", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=775852", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16280", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3969.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3969.json index dd84033236d..32f38bb2c56 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3969.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3969.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3969", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.880", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:41:55.303", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -1882,6 +1881,69 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16635", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2553", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2554", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2556", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-63.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55292", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=782141", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16635", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3970.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3970.json index 043fae7ca48..be9c4efab12 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3970.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3970.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3970", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.927", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:41:55.497", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -1870,6 +1869,57 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16876", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-63.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55278", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=760996", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16876", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3971.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3971.json index be713cd23b6..8a8232e1427 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3971.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3971.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3971", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:40.957", - "lastModified": "2017-09-19T01:35:13.510", + "lastModified": "2024-11-21T01:41:55.697", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -1772,6 +1771,49 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16062", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-64.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55304", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=753230", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=753623", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16062", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3972.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3972.json index 3c4bd62e566..9d6873844b4 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3972.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3972.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3972", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.003", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:55.883", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -345,6 +344,108 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2553", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2554", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2556", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-65.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=746855", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16234", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3973.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3973.json index f8d605d9287..ecb02f08cca 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3973.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3973.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3973", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.037", - "lastModified": "2017-09-19T01:35:13.730", + "lastModified": "2024-11-21T01:41:56.077", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", + "baseScore": 7.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.6 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 4.9, @@ -845,6 +844,49 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17039", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/85005", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-66.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55308", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=757128", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17039", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3974.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3974.json index 9d4c37959ae..0724213cc13 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3974.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3974.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3974", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.083", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:41:56.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -1502,6 +1501,37 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16692", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-67.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55312", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=770478", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16692", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3975.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3975.json index 771f55a811f..f6f055dce9d 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3975.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3975.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3975", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.113", - "lastModified": "2017-09-19T01:35:13.983", + "lastModified": "2024-11-21T01:41:56.417", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1768,6 +1767,45 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16855", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-68.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55311", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=770684", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16855", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3976.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3976.json index 49d2ef1345e..8fedf2aa6e0 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3976.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3976.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3976", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.160", - "lastModified": "2024-10-21T13:55:03.510", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:41:56.597", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -292,6 +291,88 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-69.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=768568", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16060", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3978.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3978.json index a5dec76bdab..bd38192dee7 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3978.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3978.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3978", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.207", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:41:56.767", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -1882,6 +1881,69 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16923", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2553", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2554", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2556", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-70.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55306", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=770429", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16923", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3979.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3979.json index 763faa743b2..92865d32d18 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3979.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3979.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3979", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.237", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:41:56.957", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -977,6 +976,29 @@ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=769265", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-71.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55344", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=769265", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3980.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3980.json index dcbd58b39e9..9e180a94d2f 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3980.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3980.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3980", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T10:56:41.287", - "lastModified": "2024-10-21T13:55:03.510", + "lastModified": "2024-11-21T01:41:57.123", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -1464,6 +1463,57 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17000", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1210.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1211.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-72.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55257", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1548-2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=771859", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17000", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3981.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3981.json index db2317972c0..7f884b0bfc4 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3981.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3981.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3981", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-04T11:04:50.310", - "lastModified": "2017-08-29T01:32:07.353", + "lastModified": "2024-11-21T01:41:57.300", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -994,6 +993,34 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78193", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/85072", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.bugzilla.org/security/3.6.10/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:066", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=785112", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=785470", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78193", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3996.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3996.json index 0c85050f24a..e4e3c523c9b 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3996.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3996.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3996", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T19:55:07.077", - "lastModified": "2012-10-24T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:00.080", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -233,6 +232,52 @@ { "url": "http://www.osvdb.org/83533", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-07/0020.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://dev.tiki.org/item4109", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://info.tiki.org/article190-Tiki-Wiki-CMS-Groupware-Updates-Tiki-6-7-LTS", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://info.tiki.org/article191-Tiki-Releases-8-4", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/19573", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/19630", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/83533", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3997.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3997.json index 203251a31a7..3c16e49b862 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3997.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3997.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3997", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T21:55:08.500", - "lastModified": "2012-07-19T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:00.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,26 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810928", "source": "cve@mitre.org" + }, + { + "url": "http://gitorious.org/sticky-notes/sticky-notes/commit/d97475f07520d61af3d20fbaeb2e9a974c190308", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/083120.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/083169.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810928", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3998.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3998.json index 69a78366fa8..60f04ed163a 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3998.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3998.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3998", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T21:55:08.560", - "lastModified": "2012-07-19T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:00.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,26 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810928", "source": "cve@mitre.org" + }, + { + "url": "http://gitorious.org/sticky-notes/sticky-notes/commit/d97475f07520d61af3d20fbaeb2e9a974c190308", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/083120.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/083169.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810928", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-39xx/CVE-2012-3999.json b/CVE-2012/CVE-2012-39xx/CVE-2012-3999.json index c13b8c31cc8..6f9cbda2567 100644 --- a/CVE-2012/CVE-2012-39xx/CVE-2012-3999.json +++ b/CVE-2012/CVE-2012-39xx/CVE-2012-3999.json @@ -2,9 +2,8 @@ "id": "CVE-2012-3999", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T21:55:08.607", - "lastModified": "2017-12-01T02:29:01.270", + "lastModified": "2024-11-21T01:42:00.557", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -80,6 +79,14 @@ { "url": "https://gitorious.org/sticky-notes/sticky-notes/merge_requests/2", "source": "cve@mitre.org" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77138", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://gitorious.org/sticky-notes/sticky-notes/merge_requests/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4000.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4000.json index 45c9b2bdc08..a59b732703d 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4000.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4000.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4000", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-12T21:55:08.733", - "lastModified": "2017-08-29T01:32:08.023", + "lastModified": "2024-11-21T01:42:00.700", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -361,6 +360,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76604", "source": "cve@mitre.org" + }, + { + "url": "http://disse.cting.org/blog/2012/06/22/fckeditor-reflected-xss-vulnerability/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49606", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.debian.org/security/2012/dsa-2522", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54188", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76604", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4004.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4004.json index e970e3c3c6a..0ec2130bcf0 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4004.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4004.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4004", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-08-08T18:55:01.980", - "lastModified": "2012-08-09T13:47:10.197", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:01.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -284,6 +283,22 @@ { "url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN39519659/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000076", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://play.google.com/store/apps/details?id=jp.co.fenrir.android.sleipnir_black", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4005.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4005.json index 548e7a66c7b..4dbb5cbcf50 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4005.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4005.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4005", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-08-07T19:55:02.797", - "lastModified": "2012-12-18T05:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:01.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN67435981/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000074", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lineblog.naver.jp/archives/12893561.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4006.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4006.json index dacc6af50a6..3e7e814fbb9 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4006.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4006.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4006", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-08-17T20:55:04.840", - "lastModified": "2015-11-10T18:57:32.893", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:01.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -140,6 +139,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://jvn.jp/en/jp/JVN99192898/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000077", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4007.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4007.json index c4f723d7019..2a8a3ab699f 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4007.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4007.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4007", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-08-17T20:55:04.887", - "lastModified": "2012-08-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:01.720", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -92,6 +91,14 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000078", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN92038939/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000078", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4008.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4008.json index 74f8c07e8ff..87501a57ce2 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4008.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4008.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4008", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-08-31T14:55:01.013", - "lastModified": "2013-06-19T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:01.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "http://magazine.cybozulive.com/2012/08/291200.html", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN23009798/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000081", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://magazine.cybozulive.com/2012/08/291200.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4009.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4009.json index 14a10304aef..7872b7197df 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4009.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4009.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4009", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-08-31T14:55:01.060", - "lastModified": "2013-06-19T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:01.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "http://magazine.cybozulive.com/2012/08/291200.html", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN77393797/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000082", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://magazine.cybozulive.com/2012/08/291200.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4010.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4010.json index c975c7b128e..082354b7f1e 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4010.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4010.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4010", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-08-30T17:55:02.717", - "lastModified": "2012-09-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:02.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -699,6 +698,18 @@ { "url": "http://www.opera.com/docs/changelogs/windows/1160/", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://jvn.jp/en/jp/JVN69880570/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000080", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1160/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4011.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4011.json index 3775b4fe0bb..2c449d40c6f 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4011.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4011.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4011", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-09-08T10:28:21.713", - "lastModified": "2012-09-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:02.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000083", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://cs.cybozu.co.jp/information/20120910up01.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://jvn.jp/en/jp/JVN23568423/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000083", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4012.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4012.json index d6ea7d300e0..7db173ab0e3 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4012.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4012.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4012", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2012-09-08T10:28:21.760", - "lastModified": "2012-09-10T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:02.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -84,6 +83,18 @@ { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000084", "source": "vultures@jpcert.or.jp" + }, + { + "url": "http://cs.cybozu.co.jp/information/20120910up02.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvn.jp/en/jp/JVN59652356/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000084", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4024.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4024.json index d18199e84b1..d569cf05101 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4024.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4024.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4024", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-19T19:55:02.063", - "lastModified": "2020-01-10T19:07:34.667", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:03.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -129,6 +128,63 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=CAAoG81HL9oP8roPLLhftTSXTzSD%2BZcR66PRkVU%3Df76W3Mjde_w%40mail.gmail.com&forum_name=squashfs-devel", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:128", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/19/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.osvdb.org/83898", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54610", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77106", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-40", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4025.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4025.json index f6be9e66da2..c8b749c74cc 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4025.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4025.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4025", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-19T19:55:02.110", - "lastModified": "2020-01-10T19:08:04.323", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:03.987", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -122,6 +121,56 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=CAAoG81HL9oP8roPLLhftTSXTzSD%2BZcR66PRkVU%3Df76W3Mjde_w%40mail.gmail.com&forum_name=squashfs-devel", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:128", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/07/19/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "http://www.osvdb.org/83899", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54610", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201612-40", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0001", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4026.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4026.json index 9158eb49c78..c62093eb9c3 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4026.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4026.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4026", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-16T20:49:22.050", - "lastModified": "2012-08-24T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:04.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -95,6 +94,17 @@ { "url": "http://www.kb.cert.org/vuls/id/MORO-8UYN8P", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/977312", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MORO-8UYN8P", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4027.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4027.json index 329f8e6f8f7..ea27d9586ca 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4027.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4027.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4027", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-16T20:55:04.957", - "lastModified": "2023-03-22T14:09:05.423", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:04.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ "Broken Link", "Vendor Advisory" ] + }, + { + "url": "http://www.washingtonpost.com/investigations/tridiums-niagara-framework-marvel-of-connectivity-illustrates-new-cyber-risks/2012/07/11/gJQARJL6dW_story.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "https://www.tridium.com/galleries/briefings/NiagaraAX_Framework_Software_Security_Alert.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4028.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4028.json index 7ea4db1edba..c29756bf6e1 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4028.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4028.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4028", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-16T20:55:05.003", - "lastModified": "2023-03-22T14:10:02.130", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:04.447", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.8 + "availabilityImpact": "NONE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ "Broken Link", "Vendor Advisory" ] + }, + { + "url": "http://www.washingtonpost.com/investigations/tridiums-niagara-framework-marvel-of-connectivity-illustrates-new-cyber-risks/2012/07/11/gJQARJL6dW_story.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "https://www.tridium.com/galleries/briefings/NiagaraAX_Framework_Software_Security_Alert.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4031.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4031.json index 016201dd170..058b5bfb05d 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4031.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4031.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4031", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-17T21:55:02.397", - "lastModified": "2017-08-29T01:32:08.197", + "lastModified": "2024-11-21T01:42:04.867", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -105,6 +104,35 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76682", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/83636", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49776", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/19526", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54267", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76682", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4032.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4032.json index 34d291b6930..744b53e5635 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4032.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4032.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4032", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-17T21:55:02.583", - "lastModified": "2017-08-29T01:32:08.260", + "lastModified": "2024-11-21T01:42:05.023", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -138,6 +137,42 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76803", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/83689", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.org/files/114541/WebsitePanel-CMS-Open-Redirect.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49813", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://websitepanel.codeplex.com/workitem/224", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54346", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76803", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4033.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4033.json index 6acd82d2b04..0d0c6b68af5 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4033.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4033.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4033", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-18T18:55:03.887", - "lastModified": "2017-08-29T01:32:08.320", + "lastModified": "2024-11-21T01:42:05.487", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -473,6 +472,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75044", "source": "cve@mitre.org" + }, + { + "url": "http://forums.zingiri.com/announcements.php?aid=2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48909", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/zingiri-web-shop/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75044", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4034.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4034.json index fea9beec60c..59dc83d2504 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4034.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4034.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4034", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T00:55:01.027", - "lastModified": "2024-02-14T01:17:43.863", + "lastModified": "2024-11-21T01:42:05.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,50 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/84480", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.pbboard.com/forums/t10352.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.pbboard.com/forums/t10353.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54916", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77501", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4035.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4035.json index 1d0724998f5..f916c5c56be 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4035.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4035.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4035", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T00:55:01.073", - "lastModified": "2024-02-14T01:17:43.863", + "lastModified": "2024-11-21T01:42:05.807", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,50 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://osvdb.org/84481", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.pbboard.com/forums/t10352.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "URL Repurposed" + ] + }, + { + "url": "http://www.pbboard.com/forums/t10353.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54916", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77506", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23101", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4036.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4036.json index 7c4d07aae04..746998774f4 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4036.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4036.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4036", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-27T23:55:02.460", - "lastModified": "2024-02-14T01:17:43.863", + "lastModified": "2024-11-21T01:42:05.960", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/434.html 'CWE-434: Unrestricted Upload of File with Dangerous Type'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -114,6 +112,49 @@ { "url": "https://www.htbridge.com/advisory/HTB23101", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/84479", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50153", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.pbboard.com/forums/t10352.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory", + "URL Repurposed" + ] + }, + { + "url": "http://www.pbboard.com/forums/t10353.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54916", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77508", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23101", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/434.html 'CWE-434: Unrestricted Upload of File with Dangerous Type'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4037.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4037.json index c21b4276ade..47ab6b28378 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4037.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4037.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4037", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T20:55:03.930", - "lastModified": "2013-02-22T04:40:25.223", + "lastModified": "2024-11-21T01:42:06.107", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -546,6 +545,50 @@ { "url": "https://trac.transmissionbt.com/wiki/Changes#version-2.61", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-07/0349.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/50027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50769", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.madirish.net/541", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54705", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1584-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://trac.transmissionbt.com/ticket/4979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://trac.transmissionbt.com/wiki/Changes#version-2.61", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4043.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4043.json index 8be9a8d9de4..901b36ab534 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4043.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4043.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4043", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-26T19:55:04.183", - "lastModified": "2012-07-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:06.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -137,6 +136,17 @@ { "url": "http://www.osvdb.org/83896", "source": "cve@mitre.org" + }, + { + "url": "http://blog.abhisek.me/2012/06/xss-on-palo-alto-networks-global.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/83896", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4045.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4045.json index 2d14764aa2f..a15a6baf829 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4045.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4045.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4045", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-22T17:55:03.337", - "lastModified": "2017-09-19T01:35:16.120", + "lastModified": "2024-11-21T01:42:06.413", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -91,6 +90,25 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15335", "source": "cve@mitre.org" + }, + { + "url": "http://forums.winamp.com/showthread.php?t=345684", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/46624", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54131", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15335", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4048.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4048.json index b9ae9fcfcff..dd93332ea6e 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4048.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4048.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4048", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-24T19:55:00.877", - "lastModified": "2017-09-19T01:35:16.200", + "lastModified": "2024-11-21T01:42:06.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -496,6 +495,41 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15547", "source": "cve@mitre.org" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680056", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49971", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2590", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-11.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15547", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4049.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4049.json index 2dbe9d6bc87..3dfe9e96ae7 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4049.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4049.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4049", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-24T19:55:03.077", - "lastModified": "2018-10-30T16:27:33.653", + "lastModified": "2024-11-21T01:42:06.860", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 2.9, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 2.9 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 5.5, @@ -509,6 +508,49 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15707", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-nfs.c?r1=43576&r2=43575&pathrev=43576", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=43576", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00000.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49971", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-12.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7436", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15707", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4050.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4050.json index 3dc8e56b513..9b4fee7c16a 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4050.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4050.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4050", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-24T19:55:03.173", - "lastModified": "2017-08-29T01:32:08.557", + "lastModified": "2024-11-21T01:42:07.007", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -260,6 +259,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77191", "source": "cve@mitre.org" + }, + { + "url": "http://googlechromereleases.blogspot.com/2012/07/beta-channel-update-for-chrome-os.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77191", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4052.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4052.json index 1c17b546c4d..2bff641cdd9 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4052.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4052.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4052", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-20T20:55:03.643", - "lastModified": "2023-11-07T02:11:42.593", + "lastModified": "2024-11-21T01:42:07.287", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -224,6 +223,18 @@ { "url": "https://www.htbridge.com/advisory/HTB23104", "source": "cve@mitre.org" + }, + { + "url": "http://www.jease.org/download/2.9/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://groups.google.com/forum/?fromgroups#%21topic/jease/2BHaDww-5ac%5B1-25%5D", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23104", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4053.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4053.json index 4920ef43f1a..4eef9f3e824 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4053.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4053.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4053", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T19:55:06.523", - "lastModified": "2019-07-30T15:51:48.520", + "lastModified": "2024-11-21T01:42:07.423", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76811", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/83676", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49812", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://share.ez.no/community-project/security-advisories/ezsa-2012-009-ezoe-flash-player-csrf-security-issues", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76811", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4054.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4054.json index 03b567d81e0..12557f3084f 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4054.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4054.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4054", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T21:55:03.727", - "lastModified": "2017-08-29T01:32:08.680", + "lastModified": "2024-11-21T01:42:07.557", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -94,6 +93,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75238", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81496", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18792", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53286", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75238", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4055.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4055.json index 887d274cdb8..31e3d58ed12 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4055.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4055.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4055", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T21:55:03.773", - "lastModified": "2017-08-29T01:32:08.727", + "lastModified": "2024-11-21T01:42:07.690", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75288", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112287/Uiga-FanClub-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53295", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75288", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4056.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4056.json index 73e0795be71..186cf71767d 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4056.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4056.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4056", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T21:55:03.807", - "lastModified": "2017-08-29T01:32:08.773", + "lastModified": "2024-11-21T01:42:07.827", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75281", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112288/Uiga-Personal-Portal-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53296", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75281", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4057.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4057.json index b41560a1595..ac93ed628ee 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4057.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4057.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4057", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T21:55:03.853", - "lastModified": "2017-08-29T01:32:08.837", + "lastModified": "2024-11-21T01:42:07.980", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75237", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49008", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18799", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53303", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75237", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4058.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4058.json index 53646b4a59e..c1ff8ff876a 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4058.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4058.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4058", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T21:55:03.900", - "lastModified": "2017-08-29T01:32:08.883", + "lastModified": "2024-11-21T01:42:08.133", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75113", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81532", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/112090/SocketMail-Pro-2.2.9-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75113", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4059.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4059.json index 2784ea721e7..01e9352d1a4 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4059.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4059.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4059", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T21:55:03.930", - "lastModified": "2017-08-29T01:32:08.947", + "lastModified": "2024-11-21T01:42:08.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75114", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112090/SocketMail-Pro-2.2.9-Cross-Site-Request-Forgery-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/81531", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75114", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4060.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4060.json index 08dab51cd68..21610e4e322 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4060.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4060.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4060", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T21:55:03.977", - "lastModified": "2017-08-29T01:32:08.993", + "lastModified": "2024-11-21T01:42:08.410", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75261", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112259/ASP-DEv-XM-Forums-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53292", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75261", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4061.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4061.json index 2983349ded0..855fe265411 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4061.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4061.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4061", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-25T21:55:04.023", - "lastModified": "2017-08-29T01:32:09.057", + "lastModified": "2024-11-21T01:42:08.540", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75262", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112257/ASP-DEv-XM-Diary-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75262", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4068.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4068.json index 2381fe8e381..fc30b52d73d 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4068.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4068.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4068", "sourceIdentifier": "cve@mitre.org", "published": "2012-07-26T19:55:04.810", - "lastModified": "2017-08-29T01:32:09.180", + "lastModified": "2024-11-21T01:42:09.440", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -122,6 +121,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75311", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/81664", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://support.citrix.com/article/ctx133039", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027004", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75311", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4069.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4069.json index c7e780a25ed..744cb5df544 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4069.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4069.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4069", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T17:55:01.107", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:09.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -75,6 +74,10 @@ { "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0045.html", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0045.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4070.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4070.json index 844855fe984..35c424c2eaf 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4070.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4070.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4070", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T17:55:01.153", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:09.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0045.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-40xx/CVE-2012-4071.json b/CVE-2012/CVE-2012-40xx/CVE-2012-4071.json index e4c8e147fff..5db73d2f73b 100644 --- a/CVE-2012/CVE-2012-40xx/CVE-2012-4071.json +++ b/CVE-2012/CVE-2012-40xx/CVE-2012-4071.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4071", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-10T10:34:48.517", - "lastModified": "2012-08-10T10:34:48.517", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:09.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -658,6 +657,32 @@ { "url": "http://www.rsgallery2.nl/announcements/rsgallery2_3.2.0_and_2.3.0_released_16845.0.html", "source": "cve@mitre.org" + }, + { + "url": "http://extensions.joomla.org/extensions/photos-a-images/photo-gallery/142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://joomlacode.org/gf/download/frsrelease/17325/75427/com_rsgallery2_2.3.0.zip", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://joomlacode.org/gf/download/frsrelease/17326/75428/com_rsgallery2_3.2.0.zip", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://joomlacode.org/gf/project/rsgallery2/news/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.rsgallery2.nl/announcements/rsgallery2_3.2.0_and_2.3.0_released_16845.0.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4142.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4142.json index edf43f58583..bc1e0248601 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4142.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4142.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4142", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:06.977", - "lastModified": "2012-08-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:15.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -355,6 +354,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1166/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1026/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4143.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4143.json index 6b78a6f2bfe..b915ce13db4 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4143.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4143.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4143", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:07.057", - "lastModified": "2012-08-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:15.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -355,6 +354,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1166/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1027/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4144.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4144.json index 8143b3ccd89..558e1be7cce 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4144.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4144.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4144", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:07.150", - "lastModified": "2012-08-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:15.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -355,6 +354,29 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1166/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/support/kb/view/1025/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4145.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4145.json index 9927d9c8b20..ea45a9c3ef8 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4145.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4145.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4145", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:07.243", - "lastModified": "2012-08-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:16.047", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -348,6 +347,22 @@ { "url": "http://www.opera.com/docs/changelogs/windows/1201/", "source": "cve@mitre.org" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1166/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4146.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4146.json index ec1de0c2578..e15bb594602 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4146.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4146.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4146", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-06T16:55:07.273", - "lastModified": "2012-08-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:16.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -879,6 +878,18 @@ { "url": "http://www.opera.com/docs/changelogs/windows/1201/", "source": "cve@mitre.org" + }, + { + "url": "http://www.opera.com/docs/changelogs/mac/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/unix/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.opera.com/docs/changelogs/windows/1201/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4147.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4147.json index 4c756c4f54c..a1833aebfe2 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4147.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4147.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4147", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.117", - "lastModified": "2017-09-19T01:35:16.340", + "lastModified": "2024-11-21T01:42:16.347", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15949", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15949", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4148.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4148.json index 4d0c8d553ff..a087e97d132 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4148.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4148.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4148", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.193", - "lastModified": "2017-09-19T01:35:16.417", + "lastModified": "2024-11-21T01:42:16.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16347", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16347", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4149.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4149.json index 499a29f5040..0617cf0a183 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4149.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4149.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4149", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.257", - "lastModified": "2017-09-19T01:35:16.497", + "lastModified": "2024-11-21T01:42:16.617", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16265", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16265", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4150.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4150.json index c36b9ed6bb7..31bb0231681 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4150.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4150.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4150", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.320", - "lastModified": "2017-09-19T01:35:16.637", + "lastModified": "2024-11-21T01:42:16.747", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16467", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16467", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4151.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4151.json index 8f4fdf7fac3..ac56ef1d298 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4151.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4151.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4151", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.350", - "lastModified": "2017-09-19T01:35:16.713", + "lastModified": "2024-11-21T01:42:16.880", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16243", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16243", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4152.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4152.json index 469e7863d3e..4906a03b879 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4152.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4152.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4152", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.397", - "lastModified": "2017-09-19T01:35:16.793", + "lastModified": "2024-11-21T01:42:17.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15501", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15501", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4153.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4153.json index a7900fce71d..d489a5363c9 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4153.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4153.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4153", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.427", - "lastModified": "2017-09-19T01:35:16.857", + "lastModified": "2024-11-21T01:42:17.140", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16321", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16321", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4154.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4154.json index 051c7b07cbf..7d49b9cfc2b 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4154.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4154.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4154", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.477", - "lastModified": "2017-09-19T01:35:16.933", + "lastModified": "2024-11-21T01:42:17.267", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15479", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15479", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4155.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4155.json index a839e2d1b16..8c202df647d 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4155.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4155.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4155", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.507", - "lastModified": "2017-09-19T01:35:16.997", + "lastModified": "2024-11-21T01:42:17.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15590", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15590", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4156.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4156.json index a5a0e61531a..83af6c6f1c6 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4156.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4156.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4156", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.553", - "lastModified": "2017-09-19T01:35:17.073", + "lastModified": "2024-11-21T01:42:17.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16169", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16169", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4157.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4157.json index 6fa07233576..d0d04b77fce 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4157.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4157.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4157", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.587", - "lastModified": "2017-09-19T01:35:17.153", + "lastModified": "2024-11-21T01:42:17.650", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15749", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15749", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4158.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4158.json index fd590edcf9b..6ea886b2140 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4158.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4158.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4158", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.630", - "lastModified": "2017-09-19T01:35:17.217", + "lastModified": "2024-11-21T01:42:17.773", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16236", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16236", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4159.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4159.json index a04176b891c..1354502a565 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4159.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4159.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4159", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.663", - "lastModified": "2017-09-19T01:35:17.293", + "lastModified": "2024-11-21T01:42:17.903", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16346", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16346", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4160.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4160.json index e3aa1a6040b..76314ab4cbe 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4160.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4160.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4160", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.710", - "lastModified": "2017-09-19T01:35:17.370", + "lastModified": "2024-11-21T01:42:18.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -446,6 +445,22 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15968", "source": "psirt@adobe.com" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15968", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4161.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4161.json index 20bb39b0a15..129826c356b 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4161.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4161.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4161", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.740", - "lastModified": "2012-08-15T10:31:41.740", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:18.173", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -428,6 +427,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4162.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4162.json index 9fa84334fd0..11d245edc5b 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4162.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4162.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4162", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-15T10:31:41.787", - "lastModified": "2012-08-15T10:31:41.787", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:18.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -428,6 +427,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4163.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4163.json index f540e856f63..07ace9616c9 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4163.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4163.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4163", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-21T23:55:01.217", - "lastModified": "2018-12-04T17:12:30.340", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:18.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -254,6 +253,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=139455789818399&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1203.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4164.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4164.json index 3d00ad3651c..607740ec1f6 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4164.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4164.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4164", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-21T23:55:01.310", - "lastModified": "2018-12-04T17:13:12.747", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:18.543", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -254,6 +253,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=139455789818399&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1203.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4165.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4165.json index 303ec35e5e9..90b0e1567ed 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4165.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4165.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4165", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-21T23:55:01.420", - "lastModified": "2018-12-04T17:23:39.167", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:18.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -254,6 +253,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=139455789818399&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1203.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4167.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4167.json index 1cd5eaad9de..35fca6a8cf4 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4167.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4167.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4167", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-21T23:55:01.530", - "lastModified": "2018-12-04T17:24:47.837", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:18.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -254,6 +253,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=139455789818399&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1203.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4168.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4168.json index 5a2f00bdcd3..b3209bf5918 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4168.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4168.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4168", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-21T23:55:01.607", - "lastModified": "2018-12-04T17:28:30.023", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:18.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -254,6 +253,36 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=139455789818399&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1203.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201209-01.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4170.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4170.json index f5ef6883ca8..6be422e1aaf 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4170.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4170.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4170", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-31T14:55:01.137", - "lastModified": "2013-04-19T03:24:32.643", + "lastModified": "2024-11-21T01:42:19.047", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "http://www.securitytracker.com/id?1027477", "source": "psirt@adobe.com" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-20.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55333", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027477", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4171.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4171.json index 2d40efd081c..501186e09eb 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4171.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4171.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4171", "sourceIdentifier": "psirt@adobe.com", "published": "2012-08-31T19:55:01.230", - "lastModified": "2018-10-30T16:26:24.687", + "lastModified": "2024-11-21T01:42:19.157", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -1590,6 +1589,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78226", "source": "psirt@adobe.com" + }, + { + "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55365", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78226", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4177.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4177.json index d7c4a92907c..70c7e8f6c3b 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4177.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4177.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4177", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-07T20:55:04.327", - "lastModified": "2013-04-02T03:19:51.853", + "lastModified": "2024-11-21T01:42:19.927", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -107,6 +106,26 @@ { "url": "http://www.exploit-db.com/exploits/20321", "source": "cve@mitre.org" + }, + { + "url": "http://forums.ubi.com/showthread.php/699940-Uplay-PC-Patch-2-0-4-Security-fix", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/84402", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Jul/375", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.bbc.com/news/technology-19053453", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/20321", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-41xx/CVE-2012-4178.json b/CVE-2012/CVE-2012-41xx/CVE-2012-4178.json index f946d8d5733..01b39741e18 100644 --- a/CVE-2012/CVE-2012-41xx/CVE-2012-4178.json +++ b/CVE-2012/CVE-2012-41xx/CVE-2012-4178.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4178", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-07T22:55:01.640", - "lastModified": "2017-08-29T01:32:10.807", + "lastModified": "2024-11-21T01:42:20.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77264", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/20123", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/54721", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027358", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77264", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4219.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4219.json index 46352f4872f..e071eb2c8c3 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4219.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4219.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4219", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-21T19:55:00.903", - "lastModified": "2012-09-07T04:31:24.803", + "lastModified": "2024-11-21T01:42:28.320", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -99,6 +98,24 @@ { "url": "https://hermes.opensuse.org/messages/15513071", "source": "cve@mitre.org" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2012-3.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://github.com/phpmyadmin/phpmyadmin/commit/0f0c2f1e2b3ece41cc1bb99a9931c8fcc7c917bc", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15513071", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4235.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4235.json index de6979c5629..d7c733751a9 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4235.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4235.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4235", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-10T10:34:48.563", - "lastModified": "2012-08-10T10:34:48.563", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:30.000", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -316,6 +315,28 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://extensions.joomla.org/extensions/photos-a-images/photo-gallery/142", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://joomlacode.org/gf/download/frsrelease/17326/75428/com_rsgallery2_3.2.0.zip", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://joomlacode.org/gf/project/rsgallery2/news/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.rsgallery2.nl/announcements/rsgallery2_3.2.0_and_2.3.0_released_16845.0.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4236.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4236.json index fd2ac4d7824..f441e9aecdd 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4236.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4236.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4236", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-20T19:55:05.590", - "lastModified": "2012-08-21T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:30.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -242,6 +241,31 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/50238", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/13/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.reactionpenetrationtesting.co.uk/totalshop-uk-generic-xss.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4237.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4237.json index 1d6164556e7..91a412ff002 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4237.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4237.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4237", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-20T20:55:03.893", - "lastModified": "2023-11-07T02:11:49.767", + "lastModified": "2024-11-21T01:42:30.337", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -612,6 +611,46 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0079.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://freecode.com/projects/tcexam/releases/347125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50141", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Bh=edf6e08622642f1b2421f4355d98250d9e1b0742", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/13/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.reactionpenetrationtesting.co.uk/tcexam-sql-injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54861", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4238.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4238.json index 76d54d3fe91..87c005df8dd 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4238.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4238.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4238", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-20T20:55:03.940", - "lastModified": "2023-11-07T02:11:49.860", + "lastModified": "2024-11-21T01:42:30.507", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -601,6 +600,35 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0090.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://freecode.com/projects/tcexam/releases/347125", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50141", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Bh=edf6e08622642f1b2421f4355d98250d9e1b0742", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.reactionpenetrationtesting.co.uk/tcexam-cross-site-scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4245.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4245.json index b0c7206b920..e312bd7c35f 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4245.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4245.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4245", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-31T18:55:05.933", - "lastModified": "2022-02-07T18:57:37.273", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:31.330", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -134,6 +133,67 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0106.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/16/6", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/17/2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://www.reactionpenetrationtesting.co.uk/GIMP-scriptfu-python-command-execution.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55089", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://security.gentoo.org/glsa/201603-01", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4246.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4246.json index ae2293e88f6..6c4ecfbc711 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4246.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4246.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4246", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T00:55:01.137", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:31.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -219,6 +218,43 @@ { "url": "https://www.httpcs.com/advisory/httpcs26", "source": "cve@mitre.org" + }, + { + "url": "http://www.phplist.com/?lid=579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://www.httpcs.com/advisories", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.httpcs.com/advisory/httpcs23", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.httpcs.com/advisory/httpcs24", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://www.httpcs.com/advisory/httpcs25", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.httpcs.com/advisory/httpcs26", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4247.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4247.json index f6efec47a87..744cf248613 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4247.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4247.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4247", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T00:55:01.183", - "lastModified": "2012-08-13T14:23:52.707", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:31.663", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -217,6 +216,41 @@ { "url": "https://www.httpcs.com/advisory/httpcs7", "source": "cve@mitre.org" + }, + { + "url": "http://www.phplist.com/?lid=579", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://www.httpcs.com/advisories", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.httpcs.com/advisory/httpcs1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.httpcs.com/advisory/httpcs2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.httpcs.com/advisory/httpcs3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.httpcs.com/advisory/httpcs4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.httpcs.com/advisory/httpcs6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.httpcs.com/advisory/httpcs7", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4248.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4248.json index b053c91de59..a15ae1c5a85 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4248.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4248.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4248", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T17:55:01.230", - "lastModified": "2012-08-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:31.820", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -92,6 +91,21 @@ { "url": "http://www.mobileread.com/forums/showthread.php?s=c7953cc553a4aaa36e880b25aa1a6bf6&t=175368", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/122656", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MORO-8WKGBN", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.mobileread.com/forums/showthread.php?s=c7953cc553a4aaa36e880b25aa1a6bf6&t=175368", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4249.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4249.json index 5bad6bc175b..0beda2084b6 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4249.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4249.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4249", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-12T17:55:01.293", - "lastModified": "2012-08-13T16:49:14.913", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:31.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -94,6 +93,24 @@ { "url": "http://www.mobileread.com/forums/showthread.php?s=c7953cc553a4aaa36e880b25aa1a6bf6&t=175368", "source": "cve@mitre.org" + }, + { + "url": "http://www.kb.cert.org/vuls/id/122656", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/MORO-8WKGBN", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.mobileread.com/forums/showthread.php?s=c7953cc553a4aaa36e880b25aa1a6bf6&t=175368", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4250.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4250.json index 56bb00e3c26..cc5a596008a 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4250.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4250.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4250", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:04.240", - "lastModified": "2017-08-29T01:32:14.790", + "lastModified": "2024-11-21T01:42:32.127", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75310", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18808", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53317", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75310", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4251.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4251.json index ef8c8a7cb22..a5b74fdc3fb 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4251.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4251.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4251", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:05.630", - "lastModified": "2017-08-29T01:32:14.853", + "lastModified": "2024-11-21T01:42:32.283", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75284", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/81610", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81611", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81612", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53306", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75284", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4252.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4252.json index 7e2a1e2b558..c3be1d34e0c 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4252.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4252.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4252", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:05.693", - "lastModified": "2017-08-29T01:32:14.917", + "lastModified": "2024-11-21T01:42:32.450", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", + "baseScore": 5.1, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.1 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 4.9, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75285", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/81613", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53306", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75285", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4253.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4253.json index 321b5d4b3a2..b82ff5dc268 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4253.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4253.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4253", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:05.740", - "lastModified": "2017-08-29T01:32:14.963", + "lastModified": "2024-11-21T01:42:32.607", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75286", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/81609", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53306", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75283", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75286", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4254.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4254.json index 4647056620f..3efd9a50654 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4254.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4254.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4254", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:05.787", - "lastModified": "2017-08-29T01:32:15.027", + "lastModified": "2024-11-21T01:42:32.767", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75287", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/81616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53306", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75287", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4255.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4255.json index 74c10811df8..2b69ed1a4be 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4255.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4255.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4255", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:05.817", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:32.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/81616", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53306", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4256.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4256.json index 1a4780defcf..17b6e678906 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4256.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4256.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4256", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:05.927", - "lastModified": "2017-08-29T01:32:15.073", + "lastModified": "2024-11-21T01:42:33.087", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -101,6 +100,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75198", "source": "cve@mitre.org" + }, + { + "url": "http://hauntit.blogspot.com/2012/04/en-jnews-jnewscore751-information.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.org/files/112233/jNews-7.5.1-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75198", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4257.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4257.json index 9cb29715f0a..32e2fd6ba99 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4257.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4257.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4257", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:05.973", - "lastModified": "2017-08-29T01:32:15.133", + "lastModified": "2024-11-21T01:42:33.240", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75205", "source": "cve@mitre.org" + }, + { + "url": "http://hauntit.blogspot.com/2012/03/en-yaqas-cms-alpha1-information.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://packetstormsecurity.org/files/112248/Yaqas-CMS-Alpha1-Information-Disclosure.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75205", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4258.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4258.json index 2ae093eeecb..4a7f9b2acd6 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4258.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4258.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4258", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:06.507", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:33.380", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,31 @@ { "url": "http://www.vulnerability-lab.com/get_content.php?id=516", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112480/MYRE-Real-Estate-Mobile-2012-2-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18843", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53394", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=516", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4259.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4259.json index 47b3f4ed44c..ce309827279 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4259.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4259.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4259", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:09.100", - "lastModified": "2017-08-29T01:32:15.180", + "lastModified": "2024-11-21T01:42:33.537", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -114,6 +113,49 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75221", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0216.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/81559", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48979", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://security.inshell.net/advisory/16", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18802", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53283", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75221", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4260.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4260.json index a32fc77f540..db091290630 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4260.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4260.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4260", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:09.177", - "lastModified": "2017-08-29T01:32:15.243", + "lastModified": "2024-11-21T01:42:33.730", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -115,6 +114,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75390", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112462/myCare2x-CMS-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18844", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/81685", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81686", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53392", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75390", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4261.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4261.json index 47669bbc6ee..afffad15ebb 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4261.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4261.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4261", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:09.223", - "lastModified": "2017-08-29T01:32:15.290", + "lastModified": "2024-11-21T01:42:33.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75390", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/81684", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75390", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4262.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4262.json index 563f0e8efd2..f169ffc20ff 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4262.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4262.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4262", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T18:55:09.257", - "lastModified": "2017-08-29T01:32:15.353", + "lastModified": "2024-11-21T01:42:34.040", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,59 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75392", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112462/myCare2x-CMS-Cross-Site-Scripting-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49029", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18844", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/81687", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81688", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81690", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53392", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=524", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75391", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75392", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4263.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4263.json index 584523c0a2f..d6cd0625e67 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4263.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4263.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4263", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.037", - "lastModified": "2017-08-29T01:32:15.447", + "lastModified": "2024-11-21T01:42:34.203", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -491,6 +490,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75523", "source": "cve@mitre.org" + }, + { + "url": "http://bit51.com/software/better-wp-security/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/112617/WordPress-Better-WP-Security-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fbetter-wp-security&old=542852&new_path=%2Fbetter-wp-security&new=542852", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53480", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75523", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4264.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4264.json index b96cdcbc773..976a6e8b440 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4264.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4264.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4264", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.083", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:34.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -476,6 +475,18 @@ "Exploit", "Patch" ] + }, + { + "url": "http://bit51.com/software/better-wp-security/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fbetter-wp-security&old=542852&new_path=%2Fbetter-wp-security&new=542852", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4265.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4265.json index f747bfc0b91..1955cf8ea4b 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4265.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4265.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4265", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.130", - "lastModified": "2013-07-14T06:25:04.163", + "lastModified": "2024-11-21T01:42:34.537", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -79,6 +78,14 @@ { "url": "http://www.vulnerability-lab.com/get_content.php?id=512", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/18872", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=512", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4266.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4266.json index 5d0348e7684..1231124a02a 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4266.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4266.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4266", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.193", - "lastModified": "2012-08-14T18:26:29.160", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:34.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "http://www.vulnerability-lab.com/get_content.php?id=512", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49127", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18872", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=512", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4267.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4267.json index d71e3bcb388..e69cf2b3bc1 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4267.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4267.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4267", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.240", - "lastModified": "2024-02-14T01:17:43.863", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:34.833", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -244,6 +243,48 @@ "Exploit", "Patch" ] + }, + { + "url": "http://secunia.com/advisories/49148", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://smwyg.com/blog/#sockso-persistant-xss-attack", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18868", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/rodnaph/sockso/commit/fe2d895ea8eb8b8ccad5a3319f472e45d6ba5136", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/rodnaph/sockso/issues/93", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/rodnaph/sockso/pull/99/files", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4268.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4268.json index d2ee67ffa7c..513f87c6f40 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4268.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4268.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4268", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.303", - "lastModified": "2017-08-29T01:32:15.510", + "lastModified": "2024-11-21T01:42:35.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75522", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112618/WordPress-BulletProof-Security-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fbulletproof-security&old=543044&new_path=%2Fbulletproof-security&new=543044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/bulletproof-security/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53478", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75522", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4269.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4269.json index d3a797d9887..7e258f7d4fc 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4269.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4269.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4269", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.380", - "lastModified": "2017-08-29T01:32:15.573", + "lastModified": "2024-11-21T01:42:35.180", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/434.html 'CWE-434: Unrestricted Upload of File with Dangerous Type'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -87,6 +85,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75443", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112496/Efront-3.6.11-Cross-Site-Scripting-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53412", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75443", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/434.html 'CWE-434: Unrestricted Upload of File with Dangerous Type'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4270.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4270.json index 9b8b094ae67..593ae371868 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4270.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4270.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4270", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.443", - "lastModified": "2017-08-29T01:32:15.633", + "lastModified": "2024-11-21T01:42:35.333", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75442", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112496/Efront-3.6.11-Cross-Site-Scripting-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53412", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75442", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4271.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4271.json index 36cb2b59e4e..e64275eecbe 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4271.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4271.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4271", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.490", - "lastModified": "2017-08-29T01:32:15.680", + "lastModified": "2024-11-21T01:42:35.490", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -129,6 +128,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75521", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112619/WordPress-Bad-Behavior-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fbad-behavior&old=543807&new_path=%2Fbad-behavior&new=543807", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53477", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75521", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4272.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4272.json index 3a834c21b95..e8cf13e3712 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4272.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4272.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4272", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.520", - "lastModified": "2012-08-22T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:35.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -281,6 +280,18 @@ { "url": "http://wordpress.org/extend/plugins/2-click-socialmedia-buttons/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2F2-click-socialmedia-buttons&old=532798&new_path=%2F2-click-socialmedia-buttons&new=532798", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/2-click-socialmedia-buttons/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4273.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4273.json index 73e8e080342..8722edc9739 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4273.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4273.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4273", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.567", - "lastModified": "2017-08-29T01:32:15.743", + "lastModified": "2024-11-21T01:42:35.803", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -292,6 +291,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75518", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112615/WordPress-2-Click-Socialmedia-Buttons-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2F2-click-socialmedia-buttons&old=532798&new_path=%2F2-click-socialmedia-buttons&new=532798", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/2-click-socialmedia-buttons/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75518", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4274.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4274.json index 6eaf18b380e..48258fbb97a 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4274.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4274.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4274", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.630", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:35.967", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -142,6 +141,17 @@ { "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-013/index.html", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49158", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-013/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4275.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4275.json index 1ada7ff336b..9a90b978b2b 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4275.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4275.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4275", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.663", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:36.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -110,6 +109,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/49144", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4276.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4276.json index 28c68837534..eeca48ca8e3 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4276.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4276.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4276", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.693", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:36.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -110,6 +109,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/49144", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4277.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4277.json index 3e21ba5a545..7adb3861193 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4277.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4277.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4277", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.770", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:36.433", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -531,6 +530,35 @@ { "url": "http://www.securitytracker.com/id?1027061", "source": "cve@mitre.org" + }, + { + "url": "http://code.google.com/p/smarty-php/issues/detail?id=98&can=1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://code.google.com/p/smarty-php/source/detail?r=4612", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49164", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027061", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4278.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4278.json index 63e8f74dbbd..6f30423b96b 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4278.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4278.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4278", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.817", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:36.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "http://www.vulnerability-lab.com/get_content.php?id=513", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18874", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53491", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=513", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4279.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4279.json index 7ff8341ed03..91965b1d19a 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4279.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4279.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4279", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.850", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:36.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ { "url": "http://www.vulnerability-lab.com/get_content.php?id=513", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18874", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53491", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=513", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4280.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4280.json index d4410ad3753..c2dc31da47c 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4280.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4280.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4280", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:01.897", - "lastModified": "2012-08-14T22:05:32.033", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:36.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,28 @@ { "url": "http://www.vulnerability-lab.com/get_content.php?id=513", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49132", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18874", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53491", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=513", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4281.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4281.json index bcb2100972c..772d3a1ee51 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4281.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4281.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4281", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T22:55:02.757", - "lastModified": "2017-08-29T01:32:15.823", + "lastModified": "2024-11-21T01:42:37.053", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -120,6 +119,55 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75540", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49118", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18871", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.osvdb.org/81882", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81883", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81884", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81885", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81886", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53500", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=530", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75540", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4282.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4282.json index c33dcd76474..80d4f8ee064 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4282.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4282.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4282", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T23:55:02.867", - "lastModified": "2017-08-29T01:32:15.870", + "lastModified": "2024-11-21T01:42:37.210", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75427", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/112488/Trombinoscope-3.5-SQL-Injection.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53398", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75427", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4283.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4283.json index 28d71792f0f..7b0ba9498a5 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4283.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4283.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4283", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-13T23:55:02.913", - "lastModified": "2012-08-14T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:37.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -168,6 +167,25 @@ { "url": "http://wordpress.org/extend/plugins/login-with-ajax/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset/541069", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/49013", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/login-with-ajax/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4285.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4285.json index 857db72df2a..cf320b5dbe6 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4285.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4285.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4285", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:08.313", - "lastModified": "2018-10-30T16:27:33.653", + "lastModified": "2024-11-21T01:42:37.670", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -320,6 +319,75 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15712", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=44247&r2=44246&pathrev=44247", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44247", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-13.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7566", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15712", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4286.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4286.json index c70257ee4d1..7ea7e083213 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4286.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4286.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4286", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:08.377", - "lastModified": "2017-09-19T01:35:21.807", + "lastModified": "2024-11-21T01:42:37.843", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -151,6 +150,66 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15693", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/pcapng.c?r1=44074&r2=44073&pathrev=44074", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?revision=44074&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-24.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7533", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15693", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4287.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4287.json index 6198a356259..a63e2ca90b9 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4287.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4287.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4287", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:08.437", - "lastModified": "2017-09-19T01:35:21.887", + "lastModified": "2024-11-21T01:42:38.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -149,6 +148,64 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15818", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-mongo.c?r1=44288&r2=44287&pathrev=44288", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44288", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-14.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7572", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15818", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4288.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4288.json index cc3ec5d59b8..09c08c74a16 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4288.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4288.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4288", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:08.483", - "lastModified": "2018-10-30T16:27:33.653", + "lastModified": "2024-11-21T01:42:38.173", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -310,6 +309,70 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15789", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-xtp.c?r1=44289&r2=44288&pathrev=44289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44289", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-15.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7571", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15789", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4289.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4289.json index acaf8ff0edb..1dbf5592106 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4289.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4289.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4289", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:08.547", - "lastModified": "2018-10-30T16:27:33.653", + "lastModified": "2024-11-21T01:42:38.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -319,6 +318,74 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14963", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-afp.c?r1=44317&r2=44316&pathrev=44317", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44317", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-17.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7603", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14963", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4290.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4290.json index 6afa723145c..95a6229e429 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4290.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4290.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4290", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:08.640", - "lastModified": "2018-10-30T16:27:33.653", + "lastModified": "2024-11-21T01:42:38.513", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -302,6 +301,57 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15619", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-23.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7573", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15619", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4291.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4291.json index 32f3066e890..b7263f7bc33 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4291.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4291.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4291", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:08.703", - "lastModified": "2018-10-30T16:27:33.653", + "lastModified": "2024-11-21T01:42:38.680", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -302,6 +301,57 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15813", "source": "cve@mitre.org" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2013-0125.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-20.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7570", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15813", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4292.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4292.json index 4af0bf8f636..753cf807fed 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4292.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4292.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4292", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:08.767", - "lastModified": "2018-10-30T16:27:33.653", + "lastModified": "2024-11-21T01:42:38.863", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -321,6 +320,81 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15158", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-stun.c?r1=44366&r2=44365&pathrev=44366", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/emem.c?r1=44380&r2=44379&pathrev=44380", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44366", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44380", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7569", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15158", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4293.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4293.json index 5f3e756638d..9ba40c1a3cd 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4293.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4293.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4293", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:08.843", - "lastModified": "2018-10-30T16:27:33.653", + "lastModified": "2024-11-21T01:42:39.027", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -310,6 +309,70 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15527", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/plugins/ethercat/packet-ecatmb.c?r1=43149&r2=43148&pathrev=43149", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=43149", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-22.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7562", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15527", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4294.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4294.json index e68f3edc4f0..75129baba4b 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4294.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4294.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4294", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:08.907", - "lastModified": "2017-09-19T01:35:22.403", + "lastModified": "2024-11-21T01:42:39.197", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 5.8, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.5, @@ -146,6 +145,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15673", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-erf.c?r1=44377&r2=44376&pathrev=44377", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44377", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15673", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4295.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4295.json index d4b2ac16bad..52f3651b01b 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4295.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4295.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4295", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:08.970", - "lastModified": "2017-09-19T01:35:22.467", + "lastModified": "2024-11-21T01:42:39.350", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -146,6 +145,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15718", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-erf.c?r1=44419&r2=44418&pathrev=44419", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44419", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-16.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7563", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15718", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4296.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4296.json index 8264df32db0..374c15c38fb 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4296.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4296.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4296", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:09.030", - "lastModified": "2018-10-30T16:27:33.653", + "lastModified": "2024-11-21T01:42:39.497", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 3.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 3.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "LOW", "exploitabilityScore": 6.5, @@ -309,6 +308,69 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15583", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-rtps2.c?r1=44320&r2=44319&pathrev=44320", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44320", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2590", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-18.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7568", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15583", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4297.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4297.json index 3154aeea054..dd5183ca5a2 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4297.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4297.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4297", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:09.110", - "lastModified": "2017-09-19T01:35:22.607", + "lastModified": "2024-11-21T01:42:39.657", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 8.3, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 8.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 6.5, @@ -208,6 +207,63 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15741", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gsm_rlcmac.h?r1=44307&r2=44306&pathrev=44307", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=44307", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-19.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7561", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15741", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-42xx/CVE-2012-4298.json b/CVE-2012/CVE-2012-42xx/CVE-2012-4298.json index 0e77a134765..652bc1284ff 100644 --- a/CVE-2012/CVE-2012-42xx/CVE-2012-4298.json +++ b/CVE-2012/CVE-2012-42xx/CVE-2012-4298.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4298", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-16T10:38:09.140", - "lastModified": "2017-09-19T01:35:22.667", + "lastModified": "2024-11-21T01:42:39.810", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 5.4, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 5.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 5.5, @@ -146,6 +145,61 @@ { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15777", "source": "cve@mitre.org" + }, + { + "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=44075&r2=44074&pathrev=44075", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://anonsvn.wireshark.org/viewvc?revision=44075&view=revision", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50276", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/51363", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/54425", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.wireshark.org/security/wnpa-sec-2012-25.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7533", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://hermes.opensuse.org/messages/15514562", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15777", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4324.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4324.json index cf215f7c286..1bebb780583 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4324.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4324.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4324", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T21:55:01.410", - "lastModified": "2017-08-29T01:32:15.947", + "lastModified": "2024-11-21T01:42:40.400", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74683", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80948", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/111564/Vacation-Rental-Listing-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74683", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4325.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4325.json index c99309140a2..44e4d82f3b4 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4325.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4325.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4325", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T21:55:01.470", - "lastModified": "2017-08-29T01:32:15.993", + "lastModified": "2024-11-21T01:42:40.550", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74760", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18720", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74760", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4326.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4326.json index ef9a6985766..86afb056a25 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4326.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4326.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4326", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T21:55:01.517", - "lastModified": "2017-08-29T01:32:16.040", + "lastModified": "2024-11-21T01:42:40.680", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -90,6 +89,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74682", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80947", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/111563/AlstraSoft-Site-Uptime-Cross-Site-Request-Forgery.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48707", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74682", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4327.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4327.json index cd8fc5478b1..1f853a87c7e 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4327.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4327.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4327", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T21:55:01.580", - "lastModified": "2017-08-29T01:32:16.103", + "lastModified": "2024-11-21T01:42:40.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -121,6 +120,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74788", "source": "cve@mitre.org" + }, + { + "url": "http://plugins.trac.wordpress.org/changeset?old_path=%2Fwp-image-news-slider&old=529740&new_path=%2Fwp-image-news-slider&new=529740", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "http://secunia.com/advisories/48747", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/wp-image-news-slider/other_notes/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74788", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4328.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4328.json index bf2ea9999cd..98dd4b489b2 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4328.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4328.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4328", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T22:55:02.237", - "lastModified": "2017-08-29T01:32:16.167", + "lastModified": "2024-11-21T01:42:40.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -158,6 +157,46 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://osvdb.org/81474", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48917", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53226", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75160", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.vbulletin.com/forum/showthread.php/400162-vBulletin-3-x-MAPI-Plugin-1-4-3-released-with-security-patch-04-23-2012", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.vbulletin.com/forum/showthread.php/400164-vBulletin-Security-Patch-for-vBulletin-4-1-2-4-1-11-for-Suite-amp-Forum-04-23-2012", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.vbulletin.com/forum/showthread.php/400165-vBulletin-Security-Patch-for-vBulletin-4-1-12-for-Suite-amp-Forum-04-23-2012", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4329.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4329.json index 5a9890be3d0..bdaf669d65b 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4329.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4329.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4329", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T22:55:02.283", - "lastModified": "2022-02-09T19:21:56.123", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:41.120", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -139,6 +138,62 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://aluigi.org/adv/samsux_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0142.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18751", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.osvdb.org/81221", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026976", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74927", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4330.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4330.json index 499ebdd2e7b..e1595fb780b 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4330.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4330.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4330", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T22:55:02.330", - "lastModified": "2022-02-24T19:12:09.820", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:41.273", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -138,6 +137,61 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "http://aluigi.org/adv/samsux_1-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0142.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18751", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.osvdb.org/81222", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53161", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.securitytracker.com/id?1026976", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74928", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4331.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4331.json index a4fe6c0fa4e..bfa43e7c67b 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4331.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4331.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4331", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T22:55:02.377", - "lastModified": "2012-08-15T20:10:24.150", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:41.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -99,6 +98,14 @@ { "url": "http://www.securitytracker.com/id?1026970", "source": "cve@mitre.org" + }, + { + "url": "http://archives.rezo.net/archives/spip-en.mbox/U5QUZ6WJRAJC7H5BR7W5SQG6WCD3PXL7/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1026970", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4332.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4332.json index 153e0441632..c5bfab84dc9 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4332.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4332.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4332", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T22:55:02.533", - "lastModified": "2012-08-28T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:41.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -98,6 +97,21 @@ { "url": "http://www.securityfocus.com/bid/53241", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48960", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/shareyourcart/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53241", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4333.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4333.json index 349e87bfa98..13f74cda659 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4333.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4333.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4333", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T22:55:02.567", - "lastModified": "2017-08-29T01:32:16.323", + "lastModified": "2024-11-21T01:42:41.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75070", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48966", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18765", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75070", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4334.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4334.json index 785bdff366a..abca9b1abbf 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4334.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4334.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4334", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T22:55:02.613", - "lastModified": "2017-08-29T01:32:16.383", + "lastModified": "2024-11-21T01:42:41.850", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75069", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48965", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18765", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75069", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4335.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4335.json index 224a5578d33..a344cc74299 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4335.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4335.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4335", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-14T22:55:02.660", - "lastModified": "2017-08-29T01:32:16.430", + "lastModified": "2024-11-21T01:42:42.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.8 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -96,6 +95,31 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75066", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48825", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18765", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/53193", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75066", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4337.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4337.json index bf0b96e19be..64194ffe3f0 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4337.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4337.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4337", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-23T15:55:00.937", - "lastModified": "2012-08-24T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:42.300", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -209,6 +208,36 @@ { "url": "http://www.securityfocus.com/bid/55150", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/50359", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://securitytracker.com/id?1027424", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://technet.microsoft.com/security/msvr/msvr12-013", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.foxitsoftware.com/Secure_PDF_Reader/security_bulletins.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/84808", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55150", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4340.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4340.json index 709394ba0b6..2dc5a993480 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4340.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4340.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4340", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T21:55:04.010", - "lastModified": "2012-08-16T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:42.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -135,6 +134,14 @@ { "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000047.html", "source": "cve@mitre.org" + }, + { + "url": "http://jvn.jp/en/jp/JVN47662377/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000047.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4341.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4341.json index 27a1cb1dd30..9f781f8bc66 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4341.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4341.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4341", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T21:55:05.353", - "lastModified": "2023-11-07T02:11:50.587", + "lastModified": "2024-11-21T01:42:42.603", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -116,6 +115,41 @@ { "url": "https://websmp230.sap-ag.de/sap%28bD1lbiZjPTAwMQ==%29/bc/bsp/spn/sapnotes/index2.htm?numm=1649840", "source": "cve@mitre.org" + }, + { + "url": "http://scn.sap.com/docs/DOC-8218", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/49744", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027211", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-12-104/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-12-111/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.zerodayinitiative.com/advisories/ZDI-12-112/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://service.sap.com/sap/support/notes/1649838", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://websmp230.sap-ag.de/sap%28bD1lbiZjPTAwMQ==%29/bc/bsp/spn/sapnotes/index2.htm?numm=1649840", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4342.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4342.json index 17c29a7f674..840e11a5e33 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4342.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4342.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4342", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T21:55:05.853", - "lastModified": "2012-10-09T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:42.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,18 @@ { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082995.html", "source": "cve@mitre.org" + }, + { + "url": "http://gallery.menalto.com/gallery_3_0_4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082954.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082995.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4343.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4343.json index be3e72e1fef..b0ce6bd580c 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4343.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4343.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4343", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T21:55:05.900", - "lastModified": "2012-08-16T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:42.887", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -124,6 +123,18 @@ { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082995.html", "source": "cve@mitre.org" + }, + { + "url": "http://gallery.menalto.com/gallery_3_0_4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082954.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082995.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4344.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4344.json index d56d9bc1e8d..691bae57ab4 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4344.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4344.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4344", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T22:55:02.447", - "lastModified": "2024-08-27T17:48:24.383", + "lastModified": "2024-11-21T01:42:43.017", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77150", "source": "cve@mitre.org" + }, + { + "url": "http://www.exploit-db.com/exploits/20035", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/777007", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77150", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4345.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4345.json index 06c5eeec792..15fe813e7d0 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4345.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4345.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4345", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-21T23:55:01.700", - "lastModified": "2013-04-02T03:20:04.500", + "lastModified": "2024-11-21T01:42:43.147", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -187,6 +186,22 @@ { "url": "https://hermes.opensuse.org/messages/15513071", "source": "cve@mitre.org" + }, + { + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:136", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2012-4.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://hermes.opensuse.org/messages/15513071", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4353.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4353.json index 84db3e7b526..e4fe3745c15 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4353.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4353.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4353", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-19T20:55:01.440", - "lastModified": "2012-08-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:44.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -376,6 +375,34 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://aluigi.org/adv/winlog_2-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49395", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sielcosistemi.com/en/news/index.html?id=69", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-213-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4354.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4354.json index 3aaac5e0ec4..b8e15f2c21b 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4354.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4354.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4354", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-19T20:55:01.690", - "lastModified": "2012-08-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:44.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -373,6 +372,31 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://aluigi.org/adv/winlog_2-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49395", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sielcosistemi.com/en/news/index.html?id=69", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-213-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4355.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4355.json index a4c17c95be7..f1a1f996960 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4355.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4355.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4355", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-19T20:55:01.787", - "lastModified": "2012-08-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:44.413", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -383,6 +382,31 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://aluigi.org/adv/winlog_2-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49395", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sielcosistemi.com/en/news/index.html?id=70", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-213-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4356.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4356.json index 2486cb07869..ed8d23eafb8 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4356.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4356.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4356", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-19T20:55:01.863", - "lastModified": "2012-08-20T16:16:14.573", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:44.557", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -373,6 +372,31 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://aluigi.org/adv/winlog_2-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49395", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sielcosistemi.com/en/news/index.html?id=69", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-213-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4357.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4357.json index 4283a68d431..aebd382c268 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4357.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4357.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4357", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-19T20:55:01.910", - "lastModified": "2012-08-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:44.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -373,6 +372,31 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://aluigi.org/adv/winlog_2-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49395", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sielcosistemi.com/en/news/index.html?id=69", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-213-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4358.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4358.json index 31f84555067..90e9ba1705d 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4358.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4358.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4358", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-19T20:55:01.957", - "lastModified": "2012-08-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:44.840", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -373,6 +372,31 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://aluigi.org/adv/winlog_2-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49395", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sielcosistemi.com/en/news/index.html?id=69", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-213-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4359.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4359.json index 06f785b6577..d59ce96cce2 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4359.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4359.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4359", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-19T20:55:02.003", - "lastModified": "2012-08-20T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:44.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -383,6 +382,31 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://aluigi.org/adv/winlog_2-adv.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/49395", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.sielcosistemi.com/en/news/index.html?id=70", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-213-01.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4361.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4361.json index dc52c36c516..b6a2b2afe09 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4361.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4361.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4361", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-20T22:55:01.503", - "lastModified": "2012-08-21T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:45.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 7.7, "accessVector": "ADJACENT_NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 7.7 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 5.1, @@ -120,6 +119,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.exploit-db.com/exploits/18893/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18901/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/441363", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4362.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4362.json index 7e7a7b45ee1..59b10a05e2a 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4362.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4362.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4362", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-20T22:55:01.550", - "lastModified": "2012-08-21T18:24:46.170", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:45.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -104,6 +103,27 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://www.exploit-db.com/exploits/18893/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18901/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.kb.cert.org/vuls/id/441363", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4363.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4363.json index ef6f1978a03..22e3e29bd93 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4363.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4363.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4363", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-21T10:46:10.843", - "lastModified": "2017-08-29T01:32:16.680", + "lastModified": "2024-11-21T01:42:45.573", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -488,6 +487,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78587", "source": "cve@mitre.org" + }, + { + "url": "http://gynvael.coldwind.pl/?id=483", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://j00ru.vexillium.org/?p=1175", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://security.gentoo.org/glsa/glsa-201308-03.xml", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://vexillium.org/dl.php?ar_callstack.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78587", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4386.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4386.json index 82418ab42e5..ad8f3690f9c 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4386.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4386.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4386", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.663", - "lastModified": "2017-08-29T01:32:16.790", + "lastModified": "2024-11-21T01:42:46.837", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -275,6 +274,40 @@ { "url": "https://issues.apache.org/jira/browse/WW-3858", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/50420", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://struts.apache.org/2.x/docs/s2-010.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/01/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/01/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78182", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.apache.org/jira/browse/WW-3858", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4387.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4387.json index 0c846d2fdcf..78bc1edb2f0 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4387.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4387.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4387", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.710", - "lastModified": "2017-08-29T01:32:16.883", + "lastModified": "2024-11-21T01:42:46.950", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -276,6 +275,41 @@ { "url": "https://issues.apache.org/jira/browse/WW-3860", "source": "secalert@redhat.com" + }, + { + "url": "http://secunia.com/advisories/50420", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://struts.apache.org/2.x/docs/s2-011.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/01/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/01/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55346", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78183", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://issues.apache.org/jira/browse/WW-3860", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4388.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4388.json index 31f1ce01caa..ae2a7b3a376 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4388.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4388.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4388", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-07T22:55:02.883", - "lastModified": "2023-11-07T02:11:50.903", + "lastModified": "2024-11-21T01:42:47.063", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -213,6 +212,91 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://article.gmane.org/gmane.comp.php.devel/70584", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/08/29/5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/09/02/1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/09/05/15", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://openwall.com/lists/oss-security/2012/09/07/3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://security-tracker.debian.org/tracker/CVE-2012-4388", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/main/SAPI.c?r1=323986&r2=323985&pathrev=323986", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027463", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.ubuntu.com/usn/USN-1569-1", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://bugs.php.net/bug.php?id=60227", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4389.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4389.json index bfa3c76bca6..b0338895492 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4389.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4389.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4389", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.757", - "lastModified": "2012-09-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\r\n\r\n'CWE-184: Incomplete Blacklist'", + "lastModified": "2024-11-21T01:42:47.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -135,6 +133,19 @@ "Exploit", "Patch" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/owncloud/core/commit/4fd069b47906ebcf83887970c732d464dbe7d37a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\r\n\r\n'CWE-184: Incomplete Blacklist'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4390.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4390.json index 364f649be84..b533a81c868 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4390.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4390.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4390", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.787", - "lastModified": "2012-09-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:47.297", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -138,6 +137,22 @@ "Exploit", "Patch" ] + }, + { + "url": "http://owncloud.org/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/owncloud/core/commit/4682846d3ecdad15c6a60126dda75eb7fa97c707", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4391.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4391.json index db864b1b72f..d66ace87746 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4391.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4391.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4391", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.833", - "lastModified": "2012-09-11T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:47.407", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -134,6 +133,18 @@ { "url": "https://github.com/owncloud/core/commit/5192eecce239a0b7ade1e60a6cf03075e5cfc188", "source": "secalert@redhat.com" + }, + { + "url": "http://owncloud.org/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/owncloud/core/commit/5192eecce239a0b7ade1e60a6cf03075e5cfc188", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4392.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4392.json index 3c7e823acbe..73de3c3ad46 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4392.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4392.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4392", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.880", - "lastModified": "2012-09-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:47.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -87,6 +86,22 @@ "Exploit", "Patch" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/owncloud/core/commit/4fd069b47906ebcf83887970c732d464dbe7d37a", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4393.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4393.json index 43e1039e91b..3bb94269d8a 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4393.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4393.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4393", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.913", - "lastModified": "2013-10-11T14:10:37.283", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:47.617", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -145,6 +144,34 @@ "Exploit", "Patch" ] + }, + { + "url": "http://owncloud.org/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/owncloud/core/commit/38271ded753bc9ea9943cef3c2706f8d71f3a58f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/owncloud/core/commit/93579d88dcea389205c01ddf6da41f37ad9b8745", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4394.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4394.json index 2fe6b8c25fc..4450db06d9b 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4394.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4394.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4394", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:02.960", - "lastModified": "2012-09-06T15:36:40.737", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:47.730", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -128,6 +127,22 @@ "Exploit", "Patch" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/owncloud/core/commit/d203fa2c50f4b2791e68e2b8ab9a0f8b94f9c9f8", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4395.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4395.json index 75904e6e9e7..cfbcbb023ac 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4395.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4395.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4395", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:03.007", - "lastModified": "2012-09-06T15:39:10.317", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:47.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -113,6 +112,22 @@ "Exploit", "Patch" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/owncloud/core/commit/0074062b5329c3d43679909fddce2d70608a4475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4396.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4396.json index 6111bc9c4bc..6522570429e 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4396.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4396.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4396", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:03.053", - "lastModified": "2012-09-06T15:43:16.940", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:47.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -176,6 +175,85 @@ "Exploit", "Patch" ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/owncloud/core/commit/44260a552cd4ee50ee11eee45164c725f56f7027", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/owncloud/core/commit/642e7ce110cb8c320072532c29abe003385d50f5", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/owncloud/core/commit/8f09299e2468dfc4f9ec72b05acf47de3ef9d1d7", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/owncloud/core/commit/8f616ecf76aac4a8b554fbf5a90b1645d0f25438", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/owncloud/core/commit/cc653a8a408adfb4d0cd532145668aacd85ad96c", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/owncloud/core/commit/d294373f476c795aaee7dc2444e7edfdea01a606", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/owncloud/core/commit/e817504569dce49fd7a677fa510e500394af0c48", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/owncloud/core/commit/f8337c9d723039760eecccf68bcb02752551e254", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/owncloud/core/commit/f955f6a6857754826af8903475688ba54f72c1bb", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4397.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4397.json index 0cb48666bf5..fad2ccfb857 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4397.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4397.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4397", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-05T23:55:03.100", - "lastModified": "2012-09-06T16:05:08.253", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:42:48.087", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -119,6 +118,33 @@ "tags": [ "Patch" ] + }, + { + "url": "http://owncloud.org/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/owncloud/core/commit/00595351400523168e18a08e3ffa5c3b1e7c1f6e", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch" + ] + }, + { + "url": "https://github.com/owncloud/core/commit/54a371700554ed21a5cb7db03126b6c95ae4cbd3", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-44xx/CVE-2012-4404.json b/CVE-2012/CVE-2012-44xx/CVE-2012-4404.json index c11664faa6c..e11eca3e6bf 100644 --- a/CVE-2012/CVE-2012-44xx/CVE-2012-4404.json +++ b/CVE-2012/CVE-2012-44xx/CVE-2012-4404.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4404", "sourceIdentifier": "secalert@redhat.com", "published": "2012-09-10T22:55:05.197", - "lastModified": "2013-04-19T03:24:59.513", + "lastModified": "2024-11-21T01:42:48.910", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -136,6 +135,51 @@ { "url": "http://www.ubuntu.com/usn/USN-1604-1", "source": "secalert@redhat.com" + }, + { + "url": "http://hg.moinmo.in/moin/1.9/rev/7b9f39289e16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://moinmo.in/SecurityFixes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50474", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50496", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50885", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2538", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/04/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/05/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.ubuntu.com/usn/USN-1604-1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4577.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4577.json index 3d24b2fe39b..f01af420c29 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4577.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4577.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4577", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-21T18:55:01.327", - "lastModified": "2017-08-29T01:32:19.633", + "lastModified": "2024-11-21T01:43:10.480", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +105,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77992", "source": "cve@mitre.org" + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-263-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-297-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.digitalbond.com/2012/06/13/korenix-and-oring-insecurity", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55196", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77992", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4578.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4578.json index 5e1b5aa0e59..f0aa02ef3fa 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4578.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4578.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4578", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-21T19:55:00.950", - "lastModified": "2017-08-29T01:32:19.680", + "lastModified": "2024-11-21T01:43:10.633", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -100,6 +99,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78057", "source": "cve@mitre.org" + }, + { + "url": "http://lists.freebsd.org/pipermail/freebsd-security/2012-August/006541.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78057", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4579.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4579.json index e8873289efb..48137c146b1 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4579.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4579.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4579", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-21T23:55:01.747", - "lastModified": "2012-08-22T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:10.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -94,6 +93,14 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "http://www.phpmyadmin.net/home_page/security/PMASA-2012-4.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4580.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4580.json index 655c134ecab..8ddf8edd441 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4580.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4580.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4580", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:04.710", - "lastModified": "2012-08-22T10:42:04.710", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:10.940", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4581.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4581.json index 59c24b97b96..cf8b1baf4f2 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4581.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4581.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4581", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:04.757", - "lastModified": "2012-08-22T10:42:04.757", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:11.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -93,6 +92,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4582.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4582.json index dd677101fd5..6f89c358301 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4582.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4582.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4582", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:04.787", - "lastModified": "2012-11-20T04:49:32.640", + "lastModified": "2024-11-21T01:43:11.220", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", + "baseScore": 4.9, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.9 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -97,6 +96,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0160.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4583.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4583.json index 543dc735307..e4f3653ed35 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4583.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4583.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4583", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:04.820", - "lastModified": "2012-11-20T04:49:32.890", + "lastModified": "2024-11-21T01:43:11.363", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -97,6 +96,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0161.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4584.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4584.json index 95e94a06209..6955156db16 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4584.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4584.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4584", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:04.867", - "lastModified": "2012-10-30T04:07:53.127", + "lastModified": "2024-11-21T01:43:11.520", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -97,6 +96,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0162.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4585.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4585.json index aff8237d040..09fb6ce3cdb 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4585.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4585.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4585", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:04.897", - "lastModified": "2012-11-20T04:49:33.267", + "lastModified": "2024-11-21T01:43:11.660", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -97,6 +96,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0163.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4586.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4586.json index 884b3b1cb22..56ac46283e9 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4586.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4586.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4586", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:04.930", - "lastModified": "2012-08-22T17:55:25.883", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:11.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -93,6 +92,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10020", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4587.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4587.json index 78c4d766042..27b7f2733cc 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4587.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4587.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4587", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.007", - "lastModified": "2017-08-29T01:32:19.743", + "lastModified": "2024-11-21T01:43:11.957", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", + "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 3.5 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, @@ -89,6 +88,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78130", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4588.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4588.json index 933c927e9bc..c5b514abbc9 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4588.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4588.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4588", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.037", - "lastModified": "2012-08-22T10:42:05.037", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:12.117", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -85,6 +84,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10021", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4589.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4589.json index 02588546222..578bbf397fd 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4589.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4589.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4589", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.163", - "lastModified": "2017-08-29T01:32:19.790", + "lastModified": "2024-11-21T01:43:12.270", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 2.1, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.1 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78223", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4590.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4590.json index d7ecfe3db6b..a1b6feccdb3 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4590.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4590.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4590", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.193", - "lastModified": "2017-08-29T01:32:19.853", + "lastModified": "2024-11-21T01:43:12.423", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78222", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4591.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4591.json index a593fef9738..5df45072cad 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4591.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4591.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4591", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.240", - "lastModified": "2017-08-29T01:32:19.900", + "lastModified": "2024-11-21T01:43:12.567", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78221", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4592.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4592.json index 963ce476f65..1e40730a07b 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4592.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4592.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4592", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.273", - "lastModified": "2017-08-29T01:32:19.963", + "lastModified": "2024-11-21T01:43:12.710", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -88,6 +87,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78220", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10022", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4593.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4593.json index a6d0cfd53c3..053c333d241 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4593.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4593.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4593", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.320", - "lastModified": "2012-08-22T10:42:05.320", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:12.853", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -113,6 +112,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10023", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4594.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4594.json index 97ae04c3e11..b9348ffe26c 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4594.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4594.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4594", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.367", - "lastModified": "2017-08-29T01:32:20.027", + "lastModified": "2024-11-21T01:43:13.007", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -148,6 +147,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78132", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10025", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4595.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4595.json index 26576b6c5b7..5af4dd628bf 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4595.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4595.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4595", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.413", - "lastModified": "2017-08-29T01:32:20.087", + "lastModified": "2024-11-21T01:43:13.167", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -101,6 +100,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id?1027444", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10026", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4596.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4596.json index 1f61449a871..cd93b29934a 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4596.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4596.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4596", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.443", - "lastModified": "2013-04-11T03:31:07.060", + "lastModified": "2024-11-21T01:43:13.317", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id?1027444", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10026", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4597.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4597.json index 3515f6b4a77..0b2560250c5 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4597.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4597.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4597", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.490", - "lastModified": "2017-08-29T01:32:20.133", + "lastModified": "2024-11-21T01:43:13.463", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -101,6 +100,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.securitytracker.com/id?1027444", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77979", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10026", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4598.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4598.json index 0398ff95d7f..ddf910941b0 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4598.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4598.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4598", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.523", - "lastModified": "2012-08-22T10:42:05.523", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:13.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -105,6 +104,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10028", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-45xx/CVE-2012-4599.json b/CVE-2012/CVE-2012-45xx/CVE-2012-4599.json index d66599a1b26..468b32b7c85 100644 --- a/CVE-2012/CVE-2012-45xx/CVE-2012-4599.json +++ b/CVE-2012/CVE-2012-45xx/CVE-2012-4599.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4599", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-22T10:42:05.587", - "lastModified": "2017-01-20T02:59:02.120", + "lastModified": "2024-11-21T01:43:13.763", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -85,6 +84,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10029", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4600.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4600.json index 8e2c6b2d7ef..b3fb794649f 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4600.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4600.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4600", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-31T14:55:01.293", - "lastModified": "2023-11-07T02:11:54.567", + "lastModified": "2024-11-21T01:43:13.917", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 2.6, "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 2.6 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, @@ -399,6 +398,29 @@ { "url": "http://znuny.com/en/#%21/advisory/ZSA-2012-02", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/50615", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/511404", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "US Government Resource" + ] + }, + { + "url": "http://www.otrs.com/de/open-source/community-news/security-advisories/security-advisory-2012-02/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://znuny.com/en/#%21/advisory/ZSA-2012-02", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4604.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4604.json index 6f08f8ec54e..a6501b6ef30 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4604.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4604.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4604", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-23T10:32:15.047", - "lastModified": "2012-08-23T10:32:15.047", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:14.570", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.securityfocus.com/archive/1/522530", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4605.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4605.json index 53348efeb1f..f8cef5f28b0 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4605.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4605.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4605", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-23T10:32:15.093", - "lastModified": "2017-08-29T01:32:20.197", + "lastModified": "2024-11-21T01:43:14.717", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -106,6 +105,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78131", "source": "cve@mitre.org" + }, + { + "url": "http://www.securityfocus.com/bid/64758", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.websense.com/support/article/kbarticle/SSL-TLS-weak-and-export-ciphers-detected-in-Websense-Email-Security-deployments", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78131", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4667.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4667.json index 4a6b5a0092b..effd02292e8 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4667.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4667.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4667", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-25T10:29:53.053", - "lastModified": "2012-10-12T03:30:52.787", + "lastModified": "2024-11-21T01:43:18.430", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -129,6 +128,29 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/08/25/1", "source": "cve@mitre.org" + }, + { + "url": "http://freecode.com/projects/squidclamav/releases/346722", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "http://squidclamav.darold.net/news.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/16/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/16/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/25/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4668.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4668.json index 0b3cc89207a..76ddc31ded8 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4668.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4668.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4668", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-25T10:29:53.100", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:18.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -260,6 +259,29 @@ "tags": [ "Patch" ] + }, + { + "url": "http://sourceforge.net/news/?group_id=139281&id=309011", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://trac.roundcube.net/ticket/1488613", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/20/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/roundcube/roundcubemail/commit/c086978f6a91eacb339fd2976202fca9dad2ef32", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4669.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4669.json index 354d9be8e57..1b035d44a93 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4669.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4669.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4669", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-25T16:55:00.887", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:18.747", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,17 @@ { "url": "http://xmpp.org/resources/security-notices/server-dialback/", "source": "cve@mitre.org" + }, + { + "url": "http://isode.com/company/wordpress/xmpp-server-dialback/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://xmpp.org/resources/security-notices/server-dialback/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4670.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4670.json index b3865cdff53..1a07ca3d184 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4670.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4670.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4670", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-25T16:55:01.417", - "lastModified": "2017-08-29T01:32:20.837", + "lastModified": "2024-11-21T01:43:18.893", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -91,6 +90,25 @@ { "url": "https://projects.tigase.org/projects/tigase-server/repository/revisions/2953/diff", "source": "cve@mitre.org" + }, + { + "url": "http://www.tigase.org/content/finally-version-510-final-available", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xmpp.org/resources/security-notices/server-dialback/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://projects.tigase.org/projects/tigase-server/repository/revisions/2953/diff", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4671.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4671.json index 604230f3a3f..583831e5786 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4671.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4671.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4671", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-25T16:55:01.667", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:19.040", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,14 @@ { "url": "http://xmpp.org/resources/security-notices/server-dialback/", "source": "cve@mitre.org" + }, + { + "url": "http://www.psyced.org/files/psyced-20120821.tar.bz2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://xmpp.org/resources/security-notices/server-dialback/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4672.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4672.json index ca9c2ad96f6..df1cf3b865f 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4672.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4672.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4672", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-25T16:55:01.730", - "lastModified": "2017-08-29T01:32:20.900", + "lastModified": "2024-11-21T01:43:19.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 5.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.8 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -79,6 +78,14 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78133", "source": "cve@mitre.org" + }, + { + "url": "http://xmpp.org/resources/security-notices/server-dialback/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78133", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4673.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4673.json index b044dca2c16..b1124c0c69c 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4673.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4673.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4673", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-26T03:17:44.200", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:19.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -89,6 +88,24 @@ { "url": "https://github.com/tlhunter/neoinvoice/issues/2", "source": "cve@mitre.org" + }, + { + "url": "http://adamcaudill.com/2012/08/12/neoinvoice-blind-sql-injection-cve-2012-3477/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://github.com/mweimerskirch/neoinvoice/commit/501a9d5d261c718913cfc13d212b09b56f3bf087", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/tlhunter/neoinvoice/issues/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4674.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4674.json index 4edc2f46c91..0e4de33c485 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4674.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4674.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4674", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-26T18:55:01.730", - "lastModified": "2012-08-27T21:32:36.290", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:19.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -80,6 +79,14 @@ { "url": "http://www.pluxml.org/article59/sortie-de-pluxml-5-1-6", "source": "cve@mitre.org" + }, + { + "url": "http://telechargements.pluxml.org/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.pluxml.org/article59/sortie-de-pluxml-5-1-6", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4675.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4675.json index a2822a9722e..7a677e629cf 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4675.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4675.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4675", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-26T18:55:01.777", - "lastModified": "2017-08-29T01:32:20.963", + "lastModified": "2024-11-21T01:43:19.647", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -95,6 +94,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75331", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/49026", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://telechargements.pluxml.org/changelog", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.pluxml.org/article59/sortie-de-pluxml-5-1-6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53367", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75331", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4676.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4676.json index 9112d758eed..6da0eff6540 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4676.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4676.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4676", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-26T19:55:02.167", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:19.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:N", + "baseScore": 1.2, "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 1.2 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, @@ -87,6 +86,21 @@ { "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0122.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://code.google.com/p/tunnelblick/issues/detail?id=212", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/14/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4677.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4677.json index 04814e83d40..8dc8823d23c 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4677.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4677.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4677", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-26T19:55:02.200", - "lastModified": "2012-08-27T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:19.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 4.4, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 4.4 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -76,6 +75,10 @@ { "url": "http://code.google.com/p/tunnelblick/issues/detail?id=212", "source": "cve@mitre.org" + }, + { + "url": "http://code.google.com/p/tunnelblick/issues/detail?id=212", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4678.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4678.json index 008a08b394e..ac7dfaf427e 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4678.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4678.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4678", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-26T21:55:02.310", - "lastModified": "2012-08-27T13:05:43.227", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:20.097", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -119,6 +118,54 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=812889", "source": "cve@mitre.org" + }, + { + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668667", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://munin-monitoring.org/changeset/4825", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/16/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/16/6", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/18/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/19/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/27/7", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/04/29/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53034", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=812889", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4679.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4679.json index b0e2e2fc00c..da96bae05c8 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4679.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4679.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4679", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-27T21:55:01.850", - "lastModified": "2017-08-29T01:32:21.027", + "lastModified": "2024-11-21T01:43:20.307", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -126,6 +125,40 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://dev.sourcefabric.org/browse/CS-4184", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48769", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52941", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.sourcefabric.org/en/newscoop/latestrelease/1141/Newscoop-355-and-Newscoop-4-RC4-security-releases.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74781", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.htbridge.com/advisory/HTB23084", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4680.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4680.json index edd3f1ff220..32d84c92f48 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4680.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4680.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4680", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-27T23:55:02.523", - "lastModified": "2013-07-25T16:46:00.353", + "lastModified": "2024-11-21T01:43:20.460", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -86,6 +85,21 @@ { "url": "http://www.foofus.net/?page_id=616", "source": "cve@mitre.org" + }, + { + "url": "http://ics-cert.us-cert.gov/advisories/ICSA-12-258-01", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50297", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.foofus.net/?page_id=616", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4681.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4681.json index 6fed5d70338..63b44b3cdc4 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4681.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4681.json @@ -2,13 +2,8 @@ "id": "CVE-2012-4681", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-28T00:55:01.860", - "lastModified": "2022-12-21T15:28:09.200", - "vulnStatus": "Analyzed", - "cveTags": [], - "cisaExploitAdd": "2022-03-03", - "cisaActionDue": "2022-03-24", - "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability", + "lastModified": "2024-11-21T01:43:20.600", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -27,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -46,6 +41,10 @@ } ] }, + "cisaExploitAdd": "2022-03-03", + "cisaActionDue": "2022-03-24", + "cisaRequiredAction": "Apply updates per vendor instructions.", + "cisaVulnerabilityName": "Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -552,6 +551,15 @@ "Third Party Advisory" ] }, + { + "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, { "url": "http://rhn.redhat.com/errata/RHSA-2012-1225.html", "source": "cve@mitre.org", @@ -602,6 +610,112 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "http://labs.alienvault.com/labs/index.php/2012/new-java-0day-exploited-in-the-wild/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Exploit" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List", + "Third Party Advisory" + ] + }, + { + "url": "http://rhn.redhat.com/errata/RHSA-2012-1225.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/51044", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] + }, + { + "url": "http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/55213", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://www.us-cert.gov/cas/techalerts/TA12-240A.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4685.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4685.json index d21d66c2589..45b66597a2b 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4685.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4685.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4685", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-28T17:55:05.547", - "lastModified": "2017-08-29T01:32:21.087", + "lastModified": "2024-11-21T01:43:21.223", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,36 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74648", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0036.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0037.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48728", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52881", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74648", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-46xx/CVE-2012-4686.json b/CVE-2012/CVE-2012-46xx/CVE-2012-4686.json index 603dfbcee92..72daa298548 100644 --- a/CVE-2012/CVE-2012-46xx/CVE-2012-4686.json +++ b/CVE-2012/CVE-2012-46xx/CVE-2012-4686.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4686", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-28T17:55:05.593", - "lastModified": "2012-08-29T14:34:52.630", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:21.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -86,6 +85,21 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0042.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80962", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52897", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4736.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4736.json index 59b7735668e..54c48816afb 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4736.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4736.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4736", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-29T22:55:01.613", - "lastModified": "2017-08-29T01:32:21.290", + "lastModified": "2024-11-21T01:43:25.940", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", + "baseScore": 3.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 3.3 + "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 3.4, @@ -82,6 +81,17 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78580", "source": "cve@mitre.org" + }, + { + "url": "http://www.sophos.com/support/knowledgebase/1376/1380/114138.aspx", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78580", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4737.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4737.json index 3b6c4ea5185..11644b2dfad 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4737.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4737.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4737", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-31T14:55:01.387", - "lastModified": "2013-04-19T03:25:34.037", + "lastModified": "2024-11-21T01:43:26.073", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", + "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, @@ -853,6 +852,33 @@ { "url": "http://www.securitytracker.com/id?1027461", "source": "cve@mitre.org" + }, + { + "url": "http://downloads.asterisk.org/pub/security/AST-2012-013.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/50687", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50756", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.debian.org/security/2012/dsa-2550", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/55335", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securitytracker.com/id?1027461", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4739.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4739.json index 8d58cf63b9c..6ee543caf78 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4739.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4739.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4739", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-31T20:55:08.327", - "lastModified": "2017-08-29T01:32:21.337", + "lastModified": "2024-11-21T01:43:26.233", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -111,6 +110,35 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-08/0003.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/54761", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securitytracker.com/id?1027279", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77365", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.barracudanetworks.com/ns/support/tech_alert.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4740.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4740.json index 75302157cc2..82171f1ed29 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4740.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4740.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4740", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-31T22:55:01.763", - "lastModified": "2017-08-29T01:32:21.383", + "lastModified": "2024-11-21T01:43:26.390", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -91,6 +90,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74887", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48833", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29126135", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53027", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74887", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4741.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4741.json index 57a67067099..477de350315 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4741.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4741.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4741", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-31T22:55:01.810", - "lastModified": "2017-08-29T01:32:21.447", + "lastModified": "2024-11-21T01:43:26.530", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -87,6 +86,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78868", "source": "cve@mitre.org" + }, + { + "url": "http://sourceforge.net/mailarchive/message.php?msg_id=29126135", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.packetfence.org/bugs/view.php?id=1390", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78868", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4742.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4742.json index b3d961686cc..90cd825e008 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4742.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4742.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4742", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-31T22:55:01.857", - "lastModified": "2012-09-03T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:26.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -84,6 +83,18 @@ "Exploit", "Vendor Advisory" ] + }, + { + "url": "http://www.packetfence.org/bugs/changelog_page.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.packetfence.org/bugs/view.php?id=763", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4743.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4743.json index 1443083ef1e..f8447d1f051 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4743.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4743.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4743", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-31T22:55:01.887", - "lastModified": "2017-08-29T01:32:21.493", + "lastModified": "2024-11-21T01:43:26.813", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -106,6 +105,29 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74916", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0099.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/81178", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74916", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4744.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4744.json index 69f69b3b8cb..484f7ae4530 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4744.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4744.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4744", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-31T22:55:01.950", - "lastModified": "2017-08-29T01:32:21.557", + "lastModified": "2024-11-21T01:43:26.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -103,6 +102,26 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74914", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0099.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.osvdb.org/81179", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53035", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=504", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74914", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4745.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4745.json index f0b94e484bc..2b166567ac8 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4745.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4745.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4745", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-31T22:55:01.997", - "lastModified": "2023-11-07T02:11:58.130", + "lastModified": "2024-11-21T01:43:27.107", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -87,6 +86,22 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74919", "source": "cve@mitre.org" + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0125.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/53048", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://yehg.net/lab/pr0js/advisories/%5Bacuity_cms2.6.x_%28asp%29%5D_xss", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74919", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4746.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4746.json index d99d691aa1d..2605f3a6cf5 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4746.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4746.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4746", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-31T22:55:02.060", - "lastModified": "2012-09-03T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:27.253", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -78,6 +77,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://www.exploit-db.com/exploits/18722", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4747.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4747.json index 5f5ffa6e9c7..4910a5b0257 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4747.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4747.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4747", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-04T11:04:50.357", - "lastModified": "2012-09-04T11:04:50.357", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:27.397", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -1052,6 +1051,27 @@ "tags": [ "Patch" ] + }, + { + "url": "http://www.bugzilla.org/security/3.6.10/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=785511", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=785522", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4752.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4752.json index 132a6a09d28..09cee7524b1 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4752.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4752.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4752", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-05T23:55:03.147", - "lastModified": "2012-09-06T16:09:47.347", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:27.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -133,6 +132,22 @@ { "url": "https://github.com/owncloud/core/commit/9605e1926c6081e88326bf78a02c1d1b83126c4f", "source": "cve@mitre.org" + }, + { + "url": "http://owncloud.org/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/08/11/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/09/02/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/owncloud/core/commit/9605e1926c6081e88326bf78a02c1d1b83126c4f", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4753.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4753.json index cef8211febd..c16e0dde272 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4753.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4753.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4753", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-05T23:55:03.193", - "lastModified": "2012-09-06T16:11:58.220", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:28.743", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,10 @@ { "url": "http://owncloud.org/changelog/", "source": "cve@mitre.org" + }, + { + "url": "http://owncloud.org/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4754.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4754.json index a8a97e1eb7d..dd90674ec97 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4754.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4754.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4754", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T10:41:58.660", - "lastModified": "2012-09-06T18:13:19.017", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'\r\n\r\n", + "lastModified": "2024-11-21T01:43:29.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:N", + "baseScore": 6.3, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "NONE", - "baseScore": 6.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -83,6 +81,18 @@ { "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5068.php", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/47797", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5068.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'\r\n\r\n" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4755.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4755.json index be190e2d3d4..6d1f8972a22 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4755.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4755.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4755", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T10:41:58.863", - "lastModified": "2012-09-06T18:18:13.613", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'\r\n\r\n", + "lastModified": "2024-11-21T01:43:29.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -90,6 +88,25 @@ { "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5071.php", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/47921", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.scitools.com/support/buildLogs/understand26_build_log.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5071.php", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'\r\n\r\n" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4756.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4756.json index f8aa8e5ba51..8aa4a619bee 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4756.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4756.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4756", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T10:41:58.923", - "lastModified": "2012-09-06T10:41:58.923", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'", + "lastModified": "2024-11-21T01:43:29.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -79,6 +77,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/49281", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4757.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4757.json index 40d25c69c86..b319b469fd5 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4757.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4757.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4757", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T10:41:58.957", - "lastModified": "2012-09-06T10:41:58.957", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'", + "lastModified": "2024-11-21T01:43:29.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -79,6 +77,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/49290", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4758.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4758.json index b2b5893f817..9e175a57493 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4758.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4758.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4758", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T10:41:59.017", - "lastModified": "2012-09-06T18:21:27.440", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'\r\n\r\n", + "lastModified": "2024-11-21T01:43:29.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -79,6 +77,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/49295", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'\r\n\r\n" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-47xx/CVE-2012-4759.json b/CVE-2012/CVE-2012-47xx/CVE-2012-4759.json index 7aba31fd4a5..3cbc4a0bb7c 100644 --- a/CVE-2012/CVE-2012-47xx/CVE-2012-4759.json +++ b/CVE-2012/CVE-2012-47xx/CVE-2012-4759.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4759", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T10:41:59.173", - "lastModified": "2012-09-06T10:41:59.173", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'", + "lastModified": "2024-11-21T01:43:29.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -83,6 +81,18 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0293.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/50348", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4864.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4864.json index a7668fbec89..10c2b06ef87 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4864.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4864.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4864", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T17:55:01.567", - "lastModified": "2017-08-29T01:32:24.197", + "lastModified": "2024-11-21T01:43:38.000", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -103,6 +102,38 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74170", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/111034", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18637", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52650", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5080.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74170", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4865.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4865.json index d6411fe17c2..877195bd402 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4865.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4865.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4865", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T17:55:01.627", - "lastModified": "2012-09-13T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:38.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -89,6 +88,24 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://packetstormsecurity.org/files/111031", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18636", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5079.php", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4866.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4866.json index aa56aee1086..cd725ebc4da 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4866.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4866.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4866", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T17:55:01.673", - "lastModified": "2017-08-29T01:32:24.260", + "lastModified": "2024-11-21T01:43:38.297", "vulnStatus": "Modified", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -90,6 +88,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74151", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/110949/Xtreme-RAT-DLL-Hijack.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52542", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74151", + "source": "af854a3a-2127-422b-91ae-364da2661108" } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4867.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4867.json index 1691eb98863..3c1fe1b3efd 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4867.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4867.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4867", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T17:55:01.707", - "lastModified": "2012-09-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:38.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -82,6 +81,17 @@ { "url": "http://www.exploit-db.com/exploits/18635", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/111075/Vtiger-5.1.0-Local-File-Inclusion.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18635", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4868.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4868.json index ae7e44e36fd..1c2078d8541 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4868.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4868.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4868", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T17:55:01.970", - "lastModified": "2012-09-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:38.593", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -97,6 +96,20 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://exploitsdownload.com/exploit/na/kunena-20-sql-injection", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52636", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4869.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4869.json index 2ef4e0800d4..82d90c165aa 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4869.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4869.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4869", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T17:55:02.300", - "lastModified": "2019-12-10T16:01:35.610", + "lastModified": "2024-11-21T01:43:38.737", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -121,6 +120,50 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74174", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Mar/234", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/48463", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18659", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.freepbx.org/trac/ticket/5711", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52630", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74174", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4870.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4870.json index b66b22b387a..2252b9042a0 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4870.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4870.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4870", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T17:55:02.377", - "lastModified": "2019-12-10T16:01:29.123", + "lastModified": "2024-11-21T01:43:38.883", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -122,6 +121,56 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74173", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/111028/FreePBX-2.10.0-Remote-Command-Execution-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://seclists.org/fulldisclosure/2012/Mar/234", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48463", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48475", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18649", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.freepbx.org/trac/ticket/5711", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52630", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74173", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4871.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4871.json index ef002d41da4..b7ec89c36f2 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4871.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4871.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4871", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:01.487", - "lastModified": "2024-02-14T01:17:43.863", + "lastModified": "2024-11-21T01:43:39.047", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -97,6 +96,32 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74144", "source": "cve@mitre.org" + }, + { + "url": "http://k1p0d.com/?p=25", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "URL Repurposed" + ] + }, + { + "url": "http://packetstormsecurity.org/files/110974/LiteSpeed-4.1.11-Cross-Site-Scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48400", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74144", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4872.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4872.json index ef87862eb87..91a1b8cfe05 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4872.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4872.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4872", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:01.597", - "lastModified": "2017-08-29T01:32:24.493", + "lastModified": "2024-11-21T01:43:39.193", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -99,6 +98,33 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74143", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48462", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://st2tea.blogspot.com/2012/03/kayako-fusion-cross-site-scripting.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wiki.kayako.com/display/DOCS/4.40.985", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://wiki.kayako.com/display/DOCS/4.40.986", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52625", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74143", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4873.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4873.json index a9cfa2dffe2..4d2d1a3ac2b 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4873.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4873.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4873", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:02.877", - "lastModified": "2012-09-10T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:39.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -94,6 +93,28 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://secunia.com/advisories/48458", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://sir.co.kr/bbs/board.php?bo_table=g4_pds&wr_id=7156", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/18627", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52622", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4874.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4874.json index c6efaac329f..db59f311777 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4874.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4874.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4874", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:03.067", - "lastModified": "2012-09-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:39.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -103,6 +102,25 @@ { "url": "http://www.securityfocus.com/bid/52861", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80881", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47335", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://wordpress.org/extend/plugins/another-wordpress-classifieds-plugin/changelog/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52861", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4875.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4875.json index c52b08477c5..94fd2a43bdf 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4875.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4875.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4875", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:03.143", - "lastModified": "2024-08-06T21:15:49.507", + "lastModified": "2024-11-21T01:43:39.647", "vulnStatus": "Modified", "cveTags": [ { @@ -30,13 +30,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 9.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 9.3 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, @@ -97,6 +97,25 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74554", "source": "cve@mitre.org" + }, + { + "url": "http://bugs.ghostscript.com/show_bug.cgi?id=692856", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://secunia.com/advisories/47855", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52864", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74554", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4876.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4876.json index 3eab15a49d1..b850fd68890 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4876.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4876.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4876", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:03.207", - "lastModified": "2012-09-07T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per Secunia (http://secunia.com/advisories/48601)\"The vulnerability is confirmed in version 1.1.52.18. Other versions may also be affected.\"", + "lastModified": "2024-11-21T01:43:39.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -123,6 +121,46 @@ "tags": [ "Exploit" ] + }, + { + "url": "http://archives.neohapsis.com/archives/bugtraq/2012-03/0152.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://osvdb.org/80661", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://retrogod.altervista.org/9sg_trendnet_adv.htm", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48601", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.exploit-db.com/exploits/18675", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52760", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } - ] + ], + "evaluatorComment": "Per Secunia (http://secunia.com/advisories/48601)\"The vulnerability is confirmed in version 1.1.52.18. Other versions may also be affected.\"" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4877.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4877.json index d6b238f7306..e24c8526b5b 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4877.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4877.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4877", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:03.283", - "lastModified": "2017-08-29T01:32:24.603", + "lastModified": "2024-11-21T01:43:39.967", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -120,6 +119,39 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74567", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80878", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48656", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52846", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74567", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4878.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4878.json index e8b4ec974d7..2d6a732da7b 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4878.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4878.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4878", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-06T21:55:03.330", - "lastModified": "2017-08-29T01:32:24.650", + "lastModified": "2024-11-21T01:43:40.130", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.0 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -93,6 +92,28 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74568", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52846", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74568", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4879.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4879.json index 5b3a5f5125d..c39f82fb97d 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4879.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4879.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4879", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-07T00:55:01.363", - "lastModified": "2013-10-11T14:45:26.637", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:40.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 10.0 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, @@ -100,6 +99,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-249-02.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] + }, + { + "url": "http://www.wago.com/wagoweb/documentation/app_note/a1176/a117600e.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4880.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4880.json index 2fc1cd16f35..a344fc3a95e 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4880.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4880.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4880", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-07T10:32:24.133", - "lastModified": "2012-09-10T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'", + "lastModified": "2024-11-21T01:43:40.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -84,6 +82,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/47282", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4881.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4881.json index 68470155326..3f25115cffb 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4881.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4881.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4881", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-07T10:32:24.163", - "lastModified": "2012-09-10T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'", + "lastModified": "2024-11-21T01:43:40.563", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -79,6 +77,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/47284", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4882.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4882.json index 57907043087..e068bcd0d74 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4882.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4882.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4882", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-07T10:32:24.197", - "lastModified": "2012-09-10T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'", + "lastModified": "2024-11-21T01:43:40.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -79,6 +77,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/48923", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426: Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4883.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4883.json index 514400272ce..84c43da32d6 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4883.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4883.json @@ -2,10 +2,8 @@ "id": "CVE-2012-4883", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-07T10:32:24.243", - "lastModified": "2012-09-17T04:00:00.000", - "vulnStatus": "Analyzed", - "cveTags": [], - "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'", + "lastModified": "2024-11-21T01:43:40.873", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -24,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", + "baseScore": 6.9, "accessVector": "LOCAL", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", - "availabilityImpact": "COMPLETE", - "baseScore": 6.9 + "availabilityImpact": "COMPLETE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.4, @@ -79,6 +77,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "http://secunia.com/advisories/48924", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } - ] + ], + "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html\r\n\r\n'CWE-426 Untrusted Search Path'" } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4885.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4885.json index 460d8b1fcdc..17b6c5c6dce 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4885.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4885.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4885", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-09T21:55:07.510", - "lastModified": "2012-09-10T18:27:56.397", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:41.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 5.0 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, @@ -175,6 +174,50 @@ { "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35315", "source": "cve@mitre.org" + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48504", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52689", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=22555", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35315", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4889.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4889.json index c432d49bb6d..2de6a84cf70 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4889.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4889.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4889", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-10T22:55:07.413", - "lastModified": "2017-08-29T01:32:24.807", + "lastModified": "2024-11-21T01:43:41.523", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -116,6 +115,51 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74538", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80872", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80873", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80874", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://osvdb.org/80875", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://packetstormsecurity.org/files/111474/VL-437.txt", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48657", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.securityfocus.com/bid/52841", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=437", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74538", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4890.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4890.json index 8c141d77d53..29491e0010e 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4890.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4890.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4890", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-10T22:55:07.537", - "lastModified": "2017-08-29T01:32:24.870", + "lastModified": "2024-11-21T01:43:41.680", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -124,6 +123,43 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74566", "source": "cve@mitre.org" + }, + { + "url": "http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] + }, + { + "url": "http://secunia.com/advisories/48656", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://secunia.com/advisories/48676", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/80877", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.securityfocus.com/bid/52846", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.vulnerability-lab.com/get_content.php?id=487", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74566", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4891.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4891.json index 8aa9ecbd739..df0e1ea026a 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4891.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4891.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4891", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-10T22:55:07.587", - "lastModified": "2017-08-29T01:32:24.977", + "lastModified": "2024-11-21T01:43:41.823", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -104,6 +103,39 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100551", "source": "cve@mitre.org" + }, + { + "url": "http://osvdb.org/80874", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] + }, + { + "url": "http://packetstormsecurity.com/files/130169/ManageEngine-Firewall-Analyzer-8.0-Directory-Traversal-XSS.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "http://secunia.com/advisories/48657", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.exploit-db.com/exploits/35933", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100551", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4892.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4892.json index f1ca6ea40a1..1b90131b557 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4892.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4892.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4892", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-10T22:55:07.617", - "lastModified": "2017-08-29T01:32:25.027", + "lastModified": "2024-11-21T01:43:41.970", "vulnStatus": "Modified", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", + "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", - "availabilityImpact": "NONE", - "baseScore": 4.3 + "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -107,6 +106,21 @@ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74566", "source": "cve@mitre.org" + }, + { + "url": "http://secunia.com/advisories/48656", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/80877", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74566", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2012/CVE-2012-48xx/CVE-2012-4893.json b/CVE-2012/CVE-2012-48xx/CVE-2012-4893.json index 34763b25637..df7fbdf41a0 100644 --- a/CVE-2012/CVE-2012-48xx/CVE-2012-4893.json +++ b/CVE-2012/CVE-2012-48xx/CVE-2012-4893.json @@ -2,9 +2,8 @@ "id": "CVE-2012-4893", "sourceIdentifier": "cve@mitre.org", "published": "2012-09-11T19:55:00.970", - "lastModified": "2012-09-12T14:30:24.007", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-21T01:43:42.123", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,13 +22,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", + "baseScore": 6.8, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.8 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, @@ -277,6 +276,21 @@ "tags": [ "US Government Resource" ] + }, + { + "url": "http://americaninfosec.com/research/index.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.americaninfosec.com/research/dossiers/AISG-12-001.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.kb.cert.org/vuls/id/788478", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index e3f75f48d97..def76c1a585 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,7 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-22T13:08:39.730232+00:00 +2024-11-22T15:07:26.368325+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD @@ -46,31 +46,31 @@ Recently added CVEs: `0` Recently modified CVEs: `1999` -- [CVE-2012-0913](CVE-2012/CVE-2012-09xx/CVE-2012-0913.json) (`2024-11-21T01:35:57.413`) -- [CVE-2012-0914](CVE-2012/CVE-2012-09xx/CVE-2012-0914.json) (`2024-11-21T01:35:57.537`) -- [CVE-2012-0915](CVE-2012/CVE-2012-09xx/CVE-2012-0915.json) (`2024-11-21T01:35:57.680`) -- [CVE-2012-0916](CVE-2012/CVE-2012-09xx/CVE-2012-0916.json) (`2024-11-21T01:35:57.807`) -- [CVE-2012-0917](CVE-2012/CVE-2012-09xx/CVE-2012-0917.json) (`2024-11-21T01:35:57.930`) -- [CVE-2012-0918](CVE-2012/CVE-2012-09xx/CVE-2012-0918.json) (`2024-11-21T01:35:58.060`) -- [CVE-2012-0919](CVE-2012/CVE-2012-09xx/CVE-2012-0919.json) (`2024-11-21T01:35:58.200`) -- [CVE-2012-0929](CVE-2012/CVE-2012-09xx/CVE-2012-0929.json) (`2024-11-21T01:35:59.387`) -- [CVE-2012-0930](CVE-2012/CVE-2012-09xx/CVE-2012-0930.json) (`2024-11-21T01:35:59.517`) -- [CVE-2012-0931](CVE-2012/CVE-2012-09xx/CVE-2012-0931.json) (`2024-11-21T01:35:59.653`) -- [CVE-2012-0932](CVE-2012/CVE-2012-09xx/CVE-2012-0932.json) (`2024-11-21T01:35:59.793`) -- [CVE-2012-0933](CVE-2012/CVE-2012-09xx/CVE-2012-0933.json) (`2024-11-21T01:35:59.917`) -- [CVE-2012-0934](CVE-2012/CVE-2012-09xx/CVE-2012-0934.json) (`2024-11-21T01:36:00.047`) -- [CVE-2012-0935](CVE-2012/CVE-2012-09xx/CVE-2012-0935.json) (`2024-11-21T01:36:00.183`) -- [CVE-2012-0936](CVE-2012/CVE-2012-09xx/CVE-2012-0936.json) (`2024-11-21T01:36:00.307`) -- [CVE-2012-0937](CVE-2012/CVE-2012-09xx/CVE-2012-0937.json) (`2024-11-21T01:36:00.460`) -- [CVE-2012-0975](CVE-2012/CVE-2012-09xx/CVE-2012-0975.json) (`2024-11-21T01:36:03.870`) -- [CVE-2012-0976](CVE-2012/CVE-2012-09xx/CVE-2012-0976.json) (`2024-11-21T01:36:04.010`) -- [CVE-2012-0977](CVE-2012/CVE-2012-09xx/CVE-2012-0977.json) (`2024-11-21T01:36:04.157`) -- [CVE-2012-0978](CVE-2012/CVE-2012-09xx/CVE-2012-0978.json) (`2024-11-21T01:36:04.293`) -- [CVE-2012-0979](CVE-2012/CVE-2012-09xx/CVE-2012-0979.json) (`2024-11-21T01:36:04.433`) -- [CVE-2012-0980](CVE-2012/CVE-2012-09xx/CVE-2012-0980.json) (`2024-11-21T01:36:04.580`) -- [CVE-2012-0981](CVE-2012/CVE-2012-09xx/CVE-2012-0981.json) (`2024-11-21T01:36:04.713`) -- [CVE-2012-0982](CVE-2012/CVE-2012-09xx/CVE-2012-0982.json) (`2024-11-21T01:36:04.853`) -- [CVE-2012-0983](CVE-2012/CVE-2012-09xx/CVE-2012-0983.json) (`2024-11-21T01:36:04.990`) +- [CVE-2012-4865](CVE-2012/CVE-2012-48xx/CVE-2012-4865.json) (`2024-11-21T01:43:38.143`) +- [CVE-2012-4866](CVE-2012/CVE-2012-48xx/CVE-2012-4866.json) (`2024-11-21T01:43:38.297`) +- [CVE-2012-4867](CVE-2012/CVE-2012-48xx/CVE-2012-4867.json) (`2024-11-21T01:43:38.450`) +- [CVE-2012-4868](CVE-2012/CVE-2012-48xx/CVE-2012-4868.json) (`2024-11-21T01:43:38.593`) +- [CVE-2012-4869](CVE-2012/CVE-2012-48xx/CVE-2012-4869.json) (`2024-11-21T01:43:38.737`) +- [CVE-2012-4870](CVE-2012/CVE-2012-48xx/CVE-2012-4870.json) (`2024-11-21T01:43:38.883`) +- [CVE-2012-4871](CVE-2012/CVE-2012-48xx/CVE-2012-4871.json) (`2024-11-21T01:43:39.047`) +- [CVE-2012-4872](CVE-2012/CVE-2012-48xx/CVE-2012-4872.json) (`2024-11-21T01:43:39.193`) +- [CVE-2012-4873](CVE-2012/CVE-2012-48xx/CVE-2012-4873.json) (`2024-11-21T01:43:39.343`) +- [CVE-2012-4874](CVE-2012/CVE-2012-48xx/CVE-2012-4874.json) (`2024-11-21T01:43:39.490`) +- [CVE-2012-4875](CVE-2012/CVE-2012-48xx/CVE-2012-4875.json) (`2024-11-21T01:43:39.647`) +- [CVE-2012-4876](CVE-2012/CVE-2012-48xx/CVE-2012-4876.json) (`2024-11-21T01:43:39.807`) +- [CVE-2012-4877](CVE-2012/CVE-2012-48xx/CVE-2012-4877.json) (`2024-11-21T01:43:39.967`) +- [CVE-2012-4878](CVE-2012/CVE-2012-48xx/CVE-2012-4878.json) (`2024-11-21T01:43:40.130`) +- [CVE-2012-4879](CVE-2012/CVE-2012-48xx/CVE-2012-4879.json) (`2024-11-21T01:43:40.280`) +- [CVE-2012-4880](CVE-2012/CVE-2012-48xx/CVE-2012-4880.json) (`2024-11-21T01:43:40.423`) +- [CVE-2012-4881](CVE-2012/CVE-2012-48xx/CVE-2012-4881.json) (`2024-11-21T01:43:40.563`) +- [CVE-2012-4882](CVE-2012/CVE-2012-48xx/CVE-2012-4882.json) (`2024-11-21T01:43:40.713`) +- [CVE-2012-4883](CVE-2012/CVE-2012-48xx/CVE-2012-4883.json) (`2024-11-21T01:43:40.873`) +- [CVE-2012-4885](CVE-2012/CVE-2012-48xx/CVE-2012-4885.json) (`2024-11-21T01:43:41.163`) +- [CVE-2012-4889](CVE-2012/CVE-2012-48xx/CVE-2012-4889.json) (`2024-11-21T01:43:41.523`) +- [CVE-2012-4890](CVE-2012/CVE-2012-48xx/CVE-2012-4890.json) (`2024-11-21T01:43:41.680`) +- [CVE-2012-4891](CVE-2012/CVE-2012-48xx/CVE-2012-4891.json) (`2024-11-21T01:43:41.823`) +- [CVE-2012-4892](CVE-2012/CVE-2012-48xx/CVE-2012-4892.json) (`2024-11-21T01:43:41.970`) +- [CVE-2012-4893](CVE-2012/CVE-2012-48xx/CVE-2012-4893.json) (`2024-11-21T01:43:42.123`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 048a88d2b81..10cfdd9fcfe 100644 --- a/_state.csv +++ b/_state.csv @@ -48816,731 +48816,731 @@ CVE-2011-2085,0,0,59e487a053fde50e7f9866eb29c30df44ed1276b219288d5498a81c829d906 CVE-2011-2087,0,0,29753559f7edaf5d0437ac58c5e01946390268e866c092c911f0c015b8fe884d,2024-11-21T01:27:33.717000 CVE-2011-2088,0,0,1582f26fe06b00a73d31e79c041ae880cf96b52640db57818fcc124f67bd808f,2024-11-21T01:27:33.867000 CVE-2011-2089,0,0,ab0e5364d2750f4618a7458be218f4a6c6bc73a38cd074ac668a3d942be6d8af,2024-11-21T01:27:34.020000 -CVE-2011-2091,0,1,266ac78d35d10bf50517bb9a302b7903cbdda700efd0d445b44a33ce8ea2ac4b,2024-11-21T01:27:34.183000 -CVE-2011-2092,0,1,447f25a42f9827270e23ab73105a7afd9d00b38dd1c840d6cd4ea0e3a22fa969,2024-11-21T01:27:34.310000 -CVE-2011-2093,0,1,411c5c6ad759a3d3dbebc91ef28925b6a0d333bb6fe6af6003c0b5c56ed1aaf1,2024-11-21T01:27:34.427000 -CVE-2011-2094,0,1,91af9af2022b4849a5328f8d2802e53e9fe8a4bde7f2646faf12f856ae7d4732,2024-11-21T01:27:34.550000 -CVE-2011-2095,0,1,5c3d39a4a3ae16efd0549366beee5e9dd2fc8b54dfd9e8cecfe9f88a1ed9891f,2024-11-21T01:27:34.690000 -CVE-2011-2096,0,1,7cfa54f4d75d52bb6526bf77a3b1332ae518545162ba6ff7658cb23bf0df697f,2024-11-21T01:27:34.820000 -CVE-2011-2097,0,1,3a96de5aa70cb26b002aa0aaa36861f42329c7128e79e2520d76935387347597,2024-11-21T01:27:34.947000 -CVE-2011-2098,0,1,8a300ce3d22ce7e5c2e5bf8f044d687e16b0b9f501380949fcd856afb89ab773,2024-11-21T01:27:35.083000 -CVE-2011-2099,0,1,1571cead553b0f5e1ba09cc054df8c023abe9d70e43ab63d913b31e6185e9e76,2024-11-21T01:27:35.220000 -CVE-2011-2100,0,1,74af59b7505db629104fe640d3fce1d8cf93d3a9e3f966949da79d54a9d22282,2024-11-21T01:27:35.360000 -CVE-2011-2101,0,1,450c72817a391137e4a21f95bd9c7c04e319fc7fc9ef9e6b05b3b777e313131d,2024-11-21T01:27:35.500000 -CVE-2011-2102,0,1,359e5838b02a91d53281f968da1032e65326329c44c2f965323dbf6982e05444,2024-11-21T01:27:35.637000 -CVE-2011-2103,0,1,52728612a1a8a21a2293096c5ad6e6e0896f40f6083e29c072715716d4a49635,2024-11-21T01:27:35.757000 -CVE-2011-2104,0,1,4c9a49ac8d82f69ef0cece052cea53519c708b77d12890f85dc9e46a486a8167,2024-11-21T01:27:35.900000 -CVE-2011-2105,0,1,67c67b2bb9a4414c3a5e370f896d5031fcd3e646dcb5b54af5fbf45b03dfbae9,2024-11-21T01:27:36.023000 -CVE-2011-2106,0,1,da4db2c94207323b7af6989d66d35c9dd0cf83d41126efcabc4797c8449c48a5,2024-11-21T01:27:36.157000 -CVE-2011-2107,0,1,5038f14ff2d5a03fc16726acc43fc6e7c0e3ac0cf72c939618ee4c289172c65c,2024-11-21T01:27:36.293000 -CVE-2011-2108,0,1,c5215b980244874221706ef50edbe6f102bea2605873f4d04f0d717ec94187f5,2024-11-21T01:27:36.477000 -CVE-2011-2109,0,1,a7dd049c62d5135329cf7d1de1bb14ece974ccfe53011aa7a67c576de4d1796c,2024-11-21T01:27:36.600000 -CVE-2011-2110,0,1,22312d72f2c10c618aec9bcd4d3c7cc2649c2025626cc9a64ac0ee18303b59b9,2024-11-21T01:27:36.720000 -CVE-2011-2111,0,1,a24c1b4d3908a4aadcc3a7d98778c8d8491f8ef44bd8eb63681498e24d0d9be5,2024-11-21T01:27:36.857000 -CVE-2011-2112,0,1,ab329e21a95b09354a79c37b3f08bd9a5d142fda0bab10d6a56b9bbd5cc94657,2024-11-21T01:27:36.990000 -CVE-2011-2113,0,1,3cf7bbdc16e6a602342c928c2a24b6f7d6a46445091658651b4b5b883fc83879,2024-11-21T01:27:37.117000 -CVE-2011-2114,0,1,cec60f73878c15bb49cfd4d923f758e503a6622a4e0563d33c5d780f6b777d86,2024-11-21T01:27:37.247000 -CVE-2011-2115,0,1,8c6fffa6174dd2916bcc6210c610a10797bbd874f746da4554914719b3f9cef9,2024-11-21T01:27:37.370000 -CVE-2011-2116,0,1,ac02ba5115d16aab742152b1fd1db5723e9b5e86e8a887e2e0b35f96fe41ee02,2024-11-21T01:27:37.487000 -CVE-2011-2117,0,1,c3f099e6411cba40b377871cbcf2d58b6d2380be18decad606861e68dee1384a,2024-11-21T01:27:37.603000 -CVE-2011-2118,0,1,39132b326d2e39828a1c2bdb1394bf5e2937c6b206c6ae1db1906c13975bba9c,2024-11-21T01:27:37.723000 -CVE-2011-2119,0,1,c0f5d6a86bac30a9cb62938694aeead53beee6ac25cb8e5c4577c36858853afd,2024-11-21T01:27:37.843000 -CVE-2011-2120,0,1,3f4f44ddc4a7841f9f22aca94e7a40180f2149f9f30f9b5ea8ade7241c77a22e,2024-11-21T01:27:37.967000 -CVE-2011-2121,0,1,ec1c5b4a83423f1f71c74869682001d23e4b8b78226c2f2b12199f5bd49e2702,2024-11-21T01:27:38.087000 -CVE-2011-2122,0,1,da8383e17efcd44fac4ec0ff79f134c9d3d0cbd7a302d2f59f34f725c90d0d82,2024-11-21T01:27:38.213000 -CVE-2011-2123,0,1,ca3a36cdca5bcf191386cf28c15db6d2499372579762233e24e7b6358ba5a2c7,2024-11-21T01:27:38.337000 -CVE-2011-2124,0,1,5aea34e6a625078edb51c3b527a1090eea1d25e1ac1ab2f274529109730af171,2024-11-21T01:27:38.457000 -CVE-2011-2125,0,1,6ff9fa4fd95ab23b49330ebf2ca964be1b2a0b3138b9bf8ee30fa79efc907ebb,2024-11-21T01:27:38.570000 -CVE-2011-2126,0,1,9bf87ace8a82e8dba735fd6998524e0a55db4ceb0c72f669901a835d23f1c489,2024-11-21T01:27:38.697000 -CVE-2011-2127,0,1,4fdda46ceeba6654fe2051462fa404ed9e0f8dcc4fe35275932e22d133eedb73,2024-11-21T01:27:38.817000 -CVE-2011-2128,0,1,9752da4241db22a5599bcf1e349d6d324a29de1f4f10ae1fdcab95bf239fccd4,2024-11-21T01:27:38.933000 +CVE-2011-2091,0,0,266ac78d35d10bf50517bb9a302b7903cbdda700efd0d445b44a33ce8ea2ac4b,2024-11-21T01:27:34.183000 +CVE-2011-2092,0,0,447f25a42f9827270e23ab73105a7afd9d00b38dd1c840d6cd4ea0e3a22fa969,2024-11-21T01:27:34.310000 +CVE-2011-2093,0,0,411c5c6ad759a3d3dbebc91ef28925b6a0d333bb6fe6af6003c0b5c56ed1aaf1,2024-11-21T01:27:34.427000 +CVE-2011-2094,0,0,91af9af2022b4849a5328f8d2802e53e9fe8a4bde7f2646faf12f856ae7d4732,2024-11-21T01:27:34.550000 +CVE-2011-2095,0,0,5c3d39a4a3ae16efd0549366beee5e9dd2fc8b54dfd9e8cecfe9f88a1ed9891f,2024-11-21T01:27:34.690000 +CVE-2011-2096,0,0,7cfa54f4d75d52bb6526bf77a3b1332ae518545162ba6ff7658cb23bf0df697f,2024-11-21T01:27:34.820000 +CVE-2011-2097,0,0,3a96de5aa70cb26b002aa0aaa36861f42329c7128e79e2520d76935387347597,2024-11-21T01:27:34.947000 +CVE-2011-2098,0,0,8a300ce3d22ce7e5c2e5bf8f044d687e16b0b9f501380949fcd856afb89ab773,2024-11-21T01:27:35.083000 +CVE-2011-2099,0,0,1571cead553b0f5e1ba09cc054df8c023abe9d70e43ab63d913b31e6185e9e76,2024-11-21T01:27:35.220000 +CVE-2011-2100,0,0,74af59b7505db629104fe640d3fce1d8cf93d3a9e3f966949da79d54a9d22282,2024-11-21T01:27:35.360000 +CVE-2011-2101,0,0,450c72817a391137e4a21f95bd9c7c04e319fc7fc9ef9e6b05b3b777e313131d,2024-11-21T01:27:35.500000 +CVE-2011-2102,0,0,359e5838b02a91d53281f968da1032e65326329c44c2f965323dbf6982e05444,2024-11-21T01:27:35.637000 +CVE-2011-2103,0,0,52728612a1a8a21a2293096c5ad6e6e0896f40f6083e29c072715716d4a49635,2024-11-21T01:27:35.757000 +CVE-2011-2104,0,0,4c9a49ac8d82f69ef0cece052cea53519c708b77d12890f85dc9e46a486a8167,2024-11-21T01:27:35.900000 +CVE-2011-2105,0,0,67c67b2bb9a4414c3a5e370f896d5031fcd3e646dcb5b54af5fbf45b03dfbae9,2024-11-21T01:27:36.023000 +CVE-2011-2106,0,0,da4db2c94207323b7af6989d66d35c9dd0cf83d41126efcabc4797c8449c48a5,2024-11-21T01:27:36.157000 +CVE-2011-2107,0,0,5038f14ff2d5a03fc16726acc43fc6e7c0e3ac0cf72c939618ee4c289172c65c,2024-11-21T01:27:36.293000 +CVE-2011-2108,0,0,c5215b980244874221706ef50edbe6f102bea2605873f4d04f0d717ec94187f5,2024-11-21T01:27:36.477000 +CVE-2011-2109,0,0,a7dd049c62d5135329cf7d1de1bb14ece974ccfe53011aa7a67c576de4d1796c,2024-11-21T01:27:36.600000 +CVE-2011-2110,0,0,22312d72f2c10c618aec9bcd4d3c7cc2649c2025626cc9a64ac0ee18303b59b9,2024-11-21T01:27:36.720000 +CVE-2011-2111,0,0,a24c1b4d3908a4aadcc3a7d98778c8d8491f8ef44bd8eb63681498e24d0d9be5,2024-11-21T01:27:36.857000 +CVE-2011-2112,0,0,ab329e21a95b09354a79c37b3f08bd9a5d142fda0bab10d6a56b9bbd5cc94657,2024-11-21T01:27:36.990000 +CVE-2011-2113,0,0,3cf7bbdc16e6a602342c928c2a24b6f7d6a46445091658651b4b5b883fc83879,2024-11-21T01:27:37.117000 +CVE-2011-2114,0,0,cec60f73878c15bb49cfd4d923f758e503a6622a4e0563d33c5d780f6b777d86,2024-11-21T01:27:37.247000 +CVE-2011-2115,0,0,8c6fffa6174dd2916bcc6210c610a10797bbd874f746da4554914719b3f9cef9,2024-11-21T01:27:37.370000 +CVE-2011-2116,0,0,ac02ba5115d16aab742152b1fd1db5723e9b5e86e8a887e2e0b35f96fe41ee02,2024-11-21T01:27:37.487000 +CVE-2011-2117,0,0,c3f099e6411cba40b377871cbcf2d58b6d2380be18decad606861e68dee1384a,2024-11-21T01:27:37.603000 +CVE-2011-2118,0,0,39132b326d2e39828a1c2bdb1394bf5e2937c6b206c6ae1db1906c13975bba9c,2024-11-21T01:27:37.723000 +CVE-2011-2119,0,0,c0f5d6a86bac30a9cb62938694aeead53beee6ac25cb8e5c4577c36858853afd,2024-11-21T01:27:37.843000 +CVE-2011-2120,0,0,3f4f44ddc4a7841f9f22aca94e7a40180f2149f9f30f9b5ea8ade7241c77a22e,2024-11-21T01:27:37.967000 +CVE-2011-2121,0,0,ec1c5b4a83423f1f71c74869682001d23e4b8b78226c2f2b12199f5bd49e2702,2024-11-21T01:27:38.087000 +CVE-2011-2122,0,0,da8383e17efcd44fac4ec0ff79f134c9d3d0cbd7a302d2f59f34f725c90d0d82,2024-11-21T01:27:38.213000 +CVE-2011-2123,0,0,ca3a36cdca5bcf191386cf28c15db6d2499372579762233e24e7b6358ba5a2c7,2024-11-21T01:27:38.337000 +CVE-2011-2124,0,0,5aea34e6a625078edb51c3b527a1090eea1d25e1ac1ab2f274529109730af171,2024-11-21T01:27:38.457000 +CVE-2011-2125,0,0,6ff9fa4fd95ab23b49330ebf2ca964be1b2a0b3138b9bf8ee30fa79efc907ebb,2024-11-21T01:27:38.570000 +CVE-2011-2126,0,0,9bf87ace8a82e8dba735fd6998524e0a55db4ceb0c72f669901a835d23f1c489,2024-11-21T01:27:38.697000 +CVE-2011-2127,0,0,4fdda46ceeba6654fe2051462fa404ed9e0f8dcc4fe35275932e22d133eedb73,2024-11-21T01:27:38.817000 +CVE-2011-2128,0,0,9752da4241db22a5599bcf1e349d6d324a29de1f4f10ae1fdcab95bf239fccd4,2024-11-21T01:27:38.933000 CVE-2011-2129,0,0,3be21116c5910e77a19f3505458fd077216eb4359d30d1b5f30a9f3467adbc1d,2023-11-07T02:07:20.840000 -CVE-2011-2130,0,1,b1b1d3742651b88c3620d41d12f8cced8754586a40430d2c5618dc2ccf3c49bb,2024-11-21T01:27:39.073000 -CVE-2011-2131,0,1,febe14e3b93d92003f44126330355d923cff01051ae22b4d85302e67492507d4,2024-11-21T01:27:39.217000 -CVE-2011-2132,0,1,6c3d4e14aec727dcb40cc91f71e45b11ae35b79ecba23cf5a9f06effb9b1c8a5,2024-11-21T01:27:39.327000 -CVE-2011-2133,0,1,2ab6310f8ea8eee4fd386589d3ee681860f123402cc2a421bf9cefa6e353ea34,2024-11-21T01:27:39.440000 -CVE-2011-2134,0,1,74c906618a25e153a1f15c52b70cb63ebc6be0984e9d4d582171bd3ea4bee9b8,2024-11-21T01:27:39.550000 -CVE-2011-2135,0,1,48a29765e586441b302a501fd78e43fdf30751328fcd4fb1f55b0da091d73448,2024-11-21T01:27:39.683000 -CVE-2011-2136,0,1,65cb01ac806c5959d7853a98677f2d0708fbe822af01eb7d40fa97291b637002,2024-11-21T01:27:39.823000 -CVE-2011-2137,0,1,8791d8209099d9b005cee66f6d932a924662fad1d823ec28b12fcedf29ff1cba,2024-11-21T01:27:39.983000 -CVE-2011-2138,0,1,043c1ab38a926d865493440af7eac15366243694e1b8843ca66c4c3545057b3f,2024-11-21T01:27:40.130000 -CVE-2011-2139,0,1,796643fa6db790b4dc0ae6f3fd051c9f5d9b97078682dbb2b7fb27588314f419,2024-11-21T01:27:40.270000 -CVE-2011-2140,0,1,99c34ee72b56525ca83c6f3dbc40c3d1b35ae8f7b93a7766aa993b7ae98ee14e,2024-11-21T01:27:40.420000 -CVE-2011-2141,0,1,1f48fb3d3142a97c18a62fb373b7c5abd6566f9fa6d95804c5fe066b81532b66,2024-11-21T01:27:40.563000 -CVE-2011-2142,0,1,3def989de8787d41b9a8bb547249a8822f1483256b9915c07db36b13ad4766e8,2024-11-21T01:27:40.717000 -CVE-2011-2143,0,1,f1bb80b970b65e75619de216c9627ff6d176c45452ef75db0f1835f293077811,2024-11-21T01:27:40.860000 -CVE-2011-2144,0,1,ab92b2b3b482ce823da7cd12188d0b5b297421ef6c6233a5ec0907d76c4a8468,2024-11-21T01:27:41 -CVE-2011-2145,0,1,6687fb0215307c6ea148132d4020f04620f711f4f419505ca8c2a154aa3ede78,2024-11-21T01:27:41.140000 -CVE-2011-2146,0,1,67acc8fcbb5946264e6e52e868a367a51bb8ec8ccb8753b5e882e82876107b22,2024-11-21T01:27:41.300000 -CVE-2011-2147,0,1,cc7fad96381d5980371bcdd22177242220a2cf0959c1d7986bcb19eb4e305d18,2024-11-21T01:27:41.460000 -CVE-2011-2148,0,1,68a21775690fbb0237d2357c4a586ac81dd2e3d3b5b01c5779d2cffc07ecb090,2024-11-21T01:27:41.640000 -CVE-2011-2149,0,1,fa062dca00febf2230a21b0f2a025d3810c863ce82ecc62dbef05fb1ccdfd295,2024-11-21T01:27:41.793000 -CVE-2011-2150,0,1,c9a291fb551c97440501bcbe4fd1a37f0c961294410ec8275ad0fd4186853968,2024-11-21T01:27:41.923000 -CVE-2011-2151,0,1,4166cefe211467fdcdb91cbdbe6c61e978cc79ad0436a299e1b57833489ff45c,2024-11-21T01:27:42.053000 -CVE-2011-2152,0,1,001312d09efdc741c01d307d64d3372f73a8750f4b64efe7ccfeeddb18f50c52,2024-11-21T01:27:42.183000 -CVE-2011-2153,0,1,17c23f8f6d243af9ace1f1b264ce84f166d1657e7868fe6477ca8ef07c84fe18,2024-11-21T01:27:42.317000 -CVE-2011-2154,0,1,607c297e0c2e8bee65e52cdd416c58d66533122ef36c047f4e2a84df17034ab9,2024-11-21T01:27:42.447000 -CVE-2011-2155,0,1,54175958c100ef26eddd3c6f2b3ee396f445a7b249bb6e5dd4f35b9bfe7dd5a7,2024-11-21T01:27:42.580000 -CVE-2011-2156,0,1,63a1800adbd700e96eec0622129b17a8b90497e19cb69a46bcaefff94e3de5d3,2024-11-21T01:27:42.717000 -CVE-2011-2157,0,1,5547ca5240b52564864022683f15d3a7c4ebb06a06fb83feba92256bfc6d6502,2024-11-21T01:27:42.853000 -CVE-2011-2158,0,1,d14e4f008f1d5716d3f7375fd3c1d581d0ae394ab9debf96c44e13be91e1991e,2024-11-21T01:27:42.990000 -CVE-2011-2159,0,1,d8286bdd5348956285cfbfe9a3dea201cd314ec0885a09b9818dad2409b7b77b,2024-11-21T01:27:43.120000 -CVE-2011-2160,0,1,d2b3a4db0bde25d3a91876dc8561769b76d8059695367a07dbd56b585dfba586,2024-11-21T01:27:43.253000 -CVE-2011-2161,0,1,3de973dd86aac6640921ae2071a873098f6a23a519e0e13cf4efa416db4aecc7,2024-11-21T01:27:43.387000 -CVE-2011-2162,0,1,82e33d757c630454c4e97fc2b23a9ce586a6e15f3964dd4b6ea3a0a7fb04c6c6,2024-11-21T01:27:43.517000 -CVE-2011-2163,0,1,791dab28a9ab8f6510328096eb1682018ab0800a810a1d19ac94c6bc4fe1450e,2024-11-21T01:27:43.653000 -CVE-2011-2164,0,1,97e7010eeb5509fa52626640673f353bdcceaf32e30c1961f92744a168d6fa63,2024-11-21T01:27:43.780000 -CVE-2011-2165,0,1,26b00cc08d13a0e3471f9938560a2ed1b8d7461ca1f6aa8b6233b0f891797a1a,2024-11-21T01:27:43.913000 -CVE-2011-2166,0,1,4d1032f6893b14c422aa1566e589e7fd9f1d8887dae678844674ca7e8f9d9f83,2024-11-21T01:27:44.050000 -CVE-2011-2167,0,1,05af7ef858e14732acd1e27b9bfb11d320284e6acd232592eb80536b93eea8c9,2024-11-21T01:27:44.190000 -CVE-2011-2168,0,1,157aae611fde51a9f8765c8834a6098c067634392f3ccdb0592519e0531f0b36,2024-11-21T01:27:44.320000 -CVE-2011-2169,0,1,4163146075432d10711f77c84c41442fc263b57d15709930026f3e99838d9222,2024-11-21T01:27:44.457000 -CVE-2011-2170,0,1,62da0cf11c3f81724ee1238bca0c8c038dbf9ed292b132b90ea45b861f53ca9c,2024-11-21T01:27:44.590000 -CVE-2011-2171,0,1,31d93ce79048030eb78ef29fbf14d3280c6f0e10da6d185d9d7bc426ab932dbc,2024-11-21T01:27:44.720000 -CVE-2011-2172,0,1,e695fd011c9de7c42bdfd5fb42264b0addf0f42b2d0881c4fbbd930ec8d75559,2024-11-21T01:27:44.867000 -CVE-2011-2173,0,1,5c1836a94ae3a1e7bd1889881c562989d0eb8c50bed2f17c90a3d2ed5145084d,2024-11-21T01:27:45.003000 -CVE-2011-2174,0,1,4cc00c5d2a421231a05a07dae0da2cad39fc3970267f7aa12d3f2c63289d73a0,2024-11-21T01:27:45.133000 -CVE-2011-2175,0,1,9073c0b0a4ef7e0e02e4744532e5f3c0f2def3c71a7d960013600d465a95b97a,2024-11-21T01:27:45.267000 -CVE-2011-2176,0,1,59c6fa28168badd93fcc02831a3a75649b152140710eba182ce57d3c968c4ae7,2024-11-21T01:27:45.400000 +CVE-2011-2130,0,0,b1b1d3742651b88c3620d41d12f8cced8754586a40430d2c5618dc2ccf3c49bb,2024-11-21T01:27:39.073000 +CVE-2011-2131,0,0,febe14e3b93d92003f44126330355d923cff01051ae22b4d85302e67492507d4,2024-11-21T01:27:39.217000 +CVE-2011-2132,0,0,6c3d4e14aec727dcb40cc91f71e45b11ae35b79ecba23cf5a9f06effb9b1c8a5,2024-11-21T01:27:39.327000 +CVE-2011-2133,0,0,2ab6310f8ea8eee4fd386589d3ee681860f123402cc2a421bf9cefa6e353ea34,2024-11-21T01:27:39.440000 +CVE-2011-2134,0,0,74c906618a25e153a1f15c52b70cb63ebc6be0984e9d4d582171bd3ea4bee9b8,2024-11-21T01:27:39.550000 +CVE-2011-2135,0,0,48a29765e586441b302a501fd78e43fdf30751328fcd4fb1f55b0da091d73448,2024-11-21T01:27:39.683000 +CVE-2011-2136,0,0,65cb01ac806c5959d7853a98677f2d0708fbe822af01eb7d40fa97291b637002,2024-11-21T01:27:39.823000 +CVE-2011-2137,0,0,8791d8209099d9b005cee66f6d932a924662fad1d823ec28b12fcedf29ff1cba,2024-11-21T01:27:39.983000 +CVE-2011-2138,0,0,043c1ab38a926d865493440af7eac15366243694e1b8843ca66c4c3545057b3f,2024-11-21T01:27:40.130000 +CVE-2011-2139,0,0,796643fa6db790b4dc0ae6f3fd051c9f5d9b97078682dbb2b7fb27588314f419,2024-11-21T01:27:40.270000 +CVE-2011-2140,0,0,99c34ee72b56525ca83c6f3dbc40c3d1b35ae8f7b93a7766aa993b7ae98ee14e,2024-11-21T01:27:40.420000 +CVE-2011-2141,0,0,1f48fb3d3142a97c18a62fb373b7c5abd6566f9fa6d95804c5fe066b81532b66,2024-11-21T01:27:40.563000 +CVE-2011-2142,0,0,3def989de8787d41b9a8bb547249a8822f1483256b9915c07db36b13ad4766e8,2024-11-21T01:27:40.717000 +CVE-2011-2143,0,0,f1bb80b970b65e75619de216c9627ff6d176c45452ef75db0f1835f293077811,2024-11-21T01:27:40.860000 +CVE-2011-2144,0,0,ab92b2b3b482ce823da7cd12188d0b5b297421ef6c6233a5ec0907d76c4a8468,2024-11-21T01:27:41 +CVE-2011-2145,0,0,6687fb0215307c6ea148132d4020f04620f711f4f419505ca8c2a154aa3ede78,2024-11-21T01:27:41.140000 +CVE-2011-2146,0,0,67acc8fcbb5946264e6e52e868a367a51bb8ec8ccb8753b5e882e82876107b22,2024-11-21T01:27:41.300000 +CVE-2011-2147,0,0,cc7fad96381d5980371bcdd22177242220a2cf0959c1d7986bcb19eb4e305d18,2024-11-21T01:27:41.460000 +CVE-2011-2148,0,0,68a21775690fbb0237d2357c4a586ac81dd2e3d3b5b01c5779d2cffc07ecb090,2024-11-21T01:27:41.640000 +CVE-2011-2149,0,0,fa062dca00febf2230a21b0f2a025d3810c863ce82ecc62dbef05fb1ccdfd295,2024-11-21T01:27:41.793000 +CVE-2011-2150,0,0,c9a291fb551c97440501bcbe4fd1a37f0c961294410ec8275ad0fd4186853968,2024-11-21T01:27:41.923000 +CVE-2011-2151,0,0,4166cefe211467fdcdb91cbdbe6c61e978cc79ad0436a299e1b57833489ff45c,2024-11-21T01:27:42.053000 +CVE-2011-2152,0,0,001312d09efdc741c01d307d64d3372f73a8750f4b64efe7ccfeeddb18f50c52,2024-11-21T01:27:42.183000 +CVE-2011-2153,0,0,17c23f8f6d243af9ace1f1b264ce84f166d1657e7868fe6477ca8ef07c84fe18,2024-11-21T01:27:42.317000 +CVE-2011-2154,0,0,607c297e0c2e8bee65e52cdd416c58d66533122ef36c047f4e2a84df17034ab9,2024-11-21T01:27:42.447000 +CVE-2011-2155,0,0,54175958c100ef26eddd3c6f2b3ee396f445a7b249bb6e5dd4f35b9bfe7dd5a7,2024-11-21T01:27:42.580000 +CVE-2011-2156,0,0,63a1800adbd700e96eec0622129b17a8b90497e19cb69a46bcaefff94e3de5d3,2024-11-21T01:27:42.717000 +CVE-2011-2157,0,0,5547ca5240b52564864022683f15d3a7c4ebb06a06fb83feba92256bfc6d6502,2024-11-21T01:27:42.853000 +CVE-2011-2158,0,0,d14e4f008f1d5716d3f7375fd3c1d581d0ae394ab9debf96c44e13be91e1991e,2024-11-21T01:27:42.990000 +CVE-2011-2159,0,0,d8286bdd5348956285cfbfe9a3dea201cd314ec0885a09b9818dad2409b7b77b,2024-11-21T01:27:43.120000 +CVE-2011-2160,0,0,d2b3a4db0bde25d3a91876dc8561769b76d8059695367a07dbd56b585dfba586,2024-11-21T01:27:43.253000 +CVE-2011-2161,0,0,3de973dd86aac6640921ae2071a873098f6a23a519e0e13cf4efa416db4aecc7,2024-11-21T01:27:43.387000 +CVE-2011-2162,0,0,82e33d757c630454c4e97fc2b23a9ce586a6e15f3964dd4b6ea3a0a7fb04c6c6,2024-11-21T01:27:43.517000 +CVE-2011-2163,0,0,791dab28a9ab8f6510328096eb1682018ab0800a810a1d19ac94c6bc4fe1450e,2024-11-21T01:27:43.653000 +CVE-2011-2164,0,0,97e7010eeb5509fa52626640673f353bdcceaf32e30c1961f92744a168d6fa63,2024-11-21T01:27:43.780000 +CVE-2011-2165,0,0,26b00cc08d13a0e3471f9938560a2ed1b8d7461ca1f6aa8b6233b0f891797a1a,2024-11-21T01:27:43.913000 +CVE-2011-2166,0,0,4d1032f6893b14c422aa1566e589e7fd9f1d8887dae678844674ca7e8f9d9f83,2024-11-21T01:27:44.050000 +CVE-2011-2167,0,0,05af7ef858e14732acd1e27b9bfb11d320284e6acd232592eb80536b93eea8c9,2024-11-21T01:27:44.190000 +CVE-2011-2168,0,0,157aae611fde51a9f8765c8834a6098c067634392f3ccdb0592519e0531f0b36,2024-11-21T01:27:44.320000 +CVE-2011-2169,0,0,4163146075432d10711f77c84c41442fc263b57d15709930026f3e99838d9222,2024-11-21T01:27:44.457000 +CVE-2011-2170,0,0,62da0cf11c3f81724ee1238bca0c8c038dbf9ed292b132b90ea45b861f53ca9c,2024-11-21T01:27:44.590000 +CVE-2011-2171,0,0,31d93ce79048030eb78ef29fbf14d3280c6f0e10da6d185d9d7bc426ab932dbc,2024-11-21T01:27:44.720000 +CVE-2011-2172,0,0,e695fd011c9de7c42bdfd5fb42264b0addf0f42b2d0881c4fbbd930ec8d75559,2024-11-21T01:27:44.867000 +CVE-2011-2173,0,0,5c1836a94ae3a1e7bd1889881c562989d0eb8c50bed2f17c90a3d2ed5145084d,2024-11-21T01:27:45.003000 +CVE-2011-2174,0,0,4cc00c5d2a421231a05a07dae0da2cad39fc3970267f7aa12d3f2c63289d73a0,2024-11-21T01:27:45.133000 +CVE-2011-2175,0,0,9073c0b0a4ef7e0e02e4744532e5f3c0f2def3c71a7d960013600d465a95b97a,2024-11-21T01:27:45.267000 +CVE-2011-2176,0,0,59c6fa28168badd93fcc02831a3a75649b152140710eba182ce57d3c968c4ae7,2024-11-21T01:27:45.400000 CVE-2011-2177,0,0,f287dd4ae985e9cb0de76a575a2c7d8a7901bfe4640373a76fd6720fd0ac5ea1,2022-02-07T16:16:05.783000 -CVE-2011-2178,0,1,c418b320ef1fa2fde976537f3ddd1f747decc228e24218713f8e64d626df8dee,2024-11-21T01:27:45.630000 -CVE-2011-2179,0,1,1f7de8e5f590a210fd12c1d68226a84222c397c6a07acd39ec0b1a2f42a4aa01,2024-11-21T01:27:45.740000 -CVE-2011-2180,0,1,5f064300ae636b10317ed8d65f1e77e629e5d6c27682cdcca18801b815e4660c,2024-11-21T01:27:45.857000 -CVE-2011-2181,0,1,e4cf3c4988023dbd76dfa753781d409fc441e0a306d02e20ce8e47b231986de5,2024-11-21T01:27:45.963000 +CVE-2011-2178,0,0,c418b320ef1fa2fde976537f3ddd1f747decc228e24218713f8e64d626df8dee,2024-11-21T01:27:45.630000 +CVE-2011-2179,0,0,1f7de8e5f590a210fd12c1d68226a84222c397c6a07acd39ec0b1a2f42a4aa01,2024-11-21T01:27:45.740000 +CVE-2011-2180,0,0,5f064300ae636b10317ed8d65f1e77e629e5d6c27682cdcca18801b815e4660c,2024-11-21T01:27:45.857000 +CVE-2011-2181,0,0,e4cf3c4988023dbd76dfa753781d409fc441e0a306d02e20ce8e47b231986de5,2024-11-21T01:27:45.963000 CVE-2011-2182,0,0,b5a055bf2cfa15d0ae2f77e550f213abd302c91969f4301219543b5b83bdbaf7,2023-11-07T02:07:21.637000 CVE-2011-2183,0,0,e8b3df7590af7ce55be424982c99d3796e1697b3d0ba636e6e424c9e14f79b4a,2023-02-13T01:19:35.923000 -CVE-2011-2184,0,1,d8b6b6b2ae2d25b0e9954b54cd8d7d4edfcdd01fc7857389013dfa9d55c2f083,2024-11-21T01:27:46.277000 -CVE-2011-2185,0,1,3d1dc1958e9b4dfd27a69e413951d00db7c8bbdede7d9701f8e0dd8b11486b57,2024-11-21T01:27:46.393000 +CVE-2011-2184,0,0,d8b6b6b2ae2d25b0e9954b54cd8d7d4edfcdd01fc7857389013dfa9d55c2f083,2024-11-21T01:27:46.277000 +CVE-2011-2185,0,0,3d1dc1958e9b4dfd27a69e413951d00db7c8bbdede7d9701f8e0dd8b11486b57,2024-11-21T01:27:46.393000 CVE-2011-2186,0,0,d14e2984047061e51f55f9de3053f22cbc8291bedf100dddd7faecff211730e0,2023-11-07T02:07:21.710000 CVE-2011-2187,0,0,1b2e247e4b5dfc4d1fb9f72786ff5d74c50d6da7d980449ef711de0554eb387d,2020-08-18T15:05:58.063000 -CVE-2011-2188,0,1,6c4414a430787c456bde2bf39090206e314e89f2c1520d5baf308724cd3d8379,2024-11-21T01:27:46.637000 -CVE-2011-2189,0,1,49e4ec5058fd4552ce69b6defd7f8a2144a4d1c9cf5c3cb2676d699440dbf632,2024-11-21T01:27:46.760000 -CVE-2011-2190,0,1,841929373a4b096b6ac306c960b9ef94cf230529ee841453170674e811e007cf,2024-11-21T01:27:46.907000 -CVE-2011-2191,0,1,31ef1414fa9ab0b581151f4ac206595b37baa0498c0d441a1923446ca9db5494,2024-11-21T01:27:47.030000 -CVE-2011-2192,0,1,dbb8de7f6edcbeb2eb63bb68c8491059fc6c3d8e06aad5fd63c422d7b6b25f75,2024-11-21T01:27:47.160000 -CVE-2011-2193,0,1,751becbae1ce7902b765f7636c574f3eb76623c094cf85370e0398c67a472d6b,2024-11-21T01:27:47.300000 -CVE-2011-2194,0,1,749843b7e8934676f6d68b55a25f08f95c7f381d7bd1964e1527cc1437aa217b,2024-11-21T01:27:47.423000 +CVE-2011-2188,0,0,6c4414a430787c456bde2bf39090206e314e89f2c1520d5baf308724cd3d8379,2024-11-21T01:27:46.637000 +CVE-2011-2189,0,0,49e4ec5058fd4552ce69b6defd7f8a2144a4d1c9cf5c3cb2676d699440dbf632,2024-11-21T01:27:46.760000 +CVE-2011-2190,0,0,841929373a4b096b6ac306c960b9ef94cf230529ee841453170674e811e007cf,2024-11-21T01:27:46.907000 +CVE-2011-2191,0,0,31ef1414fa9ab0b581151f4ac206595b37baa0498c0d441a1923446ca9db5494,2024-11-21T01:27:47.030000 +CVE-2011-2192,0,0,dbb8de7f6edcbeb2eb63bb68c8491059fc6c3d8e06aad5fd63c422d7b6b25f75,2024-11-21T01:27:47.160000 +CVE-2011-2193,0,0,751becbae1ce7902b765f7636c574f3eb76623c094cf85370e0398c67a472d6b,2024-11-21T01:27:47.300000 +CVE-2011-2194,0,0,749843b7e8934676f6d68b55a25f08f95c7f381d7bd1964e1527cc1437aa217b,2024-11-21T01:27:47.423000 CVE-2011-2195,0,0,59a410585d0668c3226cebaa6db74c5440c76f291c872cc6e9f5efe548792b99,2021-10-29T01:07:51.340000 -CVE-2011-2196,0,1,9be11f8f1bf3075fe494e71072d1b67c0365235e9d7dfff4db503c509bc9cc32,2024-11-21T01:27:47.660000 -CVE-2011-2197,0,1,520118962733ad978e3f1050ef125e967e0234c697f551b517b063aaec1e94c5,2024-11-21T01:27:47.783000 +CVE-2011-2196,0,0,9be11f8f1bf3075fe494e71072d1b67c0365235e9d7dfff4db503c509bc9cc32,2024-11-21T01:27:47.660000 +CVE-2011-2197,0,0,520118962733ad978e3f1050ef125e967e0234c697f551b517b063aaec1e94c5,2024-11-21T01:27:47.783000 CVE-2011-2198,0,0,2b39100d63af980ea77ac31a4eb332ed64ee7a80fb8ab3b978c7e44ee2d3f3f8,2018-10-30T16:27:33.653000 CVE-2011-2199,0,0,6ffc36e52ec5a5bd1158e226b3f7b271fb9a9f9010ef167a445267df4836ab83,2023-02-13T04:30:59.597000 -CVE-2011-2200,0,1,5952018c311252df7667ed825bd33d3aee99701419d7b0ee1835cb38c3f36134,2024-11-21T01:27:48.183000 -CVE-2011-2201,0,1,fbaca4aafe6631d09c4d871c5bf1acefe270ea713b48cca78749f743c93ae24c,2024-11-21T01:27:48.320000 -CVE-2011-2202,0,1,d98f6d0df9fe43d5b1e2821b87eb8713e71e81c6c1003964232a91fec6d351c0,2024-11-21T01:27:48.457000 -CVE-2011-2203,0,1,98a09d665f2cfc8dde4dafe437d1d39ad621f06d55097ce4a2647a42e31fd1b5,2024-11-21T01:27:48.600000 -CVE-2011-2204,0,1,3b6059ee1bdb1e078dfc21458741e5425b54f1fd25c6b5724d6861e082681e61,2024-11-21T01:27:48.713000 -CVE-2011-2205,0,1,0fda7184a23d44180c63435a609b1b957098bf8223b0d964463878e9ae379c5b,2024-11-21T01:27:48.860000 -CVE-2011-2206,0,1,135703bfa3ab19715dd8080fe33ba05b5c865b45ae8e9876c092f1e5a8d5b42c,2024-11-21T01:27:48.980000 +CVE-2011-2200,0,0,5952018c311252df7667ed825bd33d3aee99701419d7b0ee1835cb38c3f36134,2024-11-21T01:27:48.183000 +CVE-2011-2201,0,0,fbaca4aafe6631d09c4d871c5bf1acefe270ea713b48cca78749f743c93ae24c,2024-11-21T01:27:48.320000 +CVE-2011-2202,0,0,d98f6d0df9fe43d5b1e2821b87eb8713e71e81c6c1003964232a91fec6d351c0,2024-11-21T01:27:48.457000 +CVE-2011-2203,0,0,98a09d665f2cfc8dde4dafe437d1d39ad621f06d55097ce4a2647a42e31fd1b5,2024-11-21T01:27:48.600000 +CVE-2011-2204,0,0,3b6059ee1bdb1e078dfc21458741e5425b54f1fd25c6b5724d6861e082681e61,2024-11-21T01:27:48.713000 +CVE-2011-2205,0,0,0fda7184a23d44180c63435a609b1b957098bf8223b0d964463878e9ae379c5b,2024-11-21T01:27:48.860000 +CVE-2011-2206,0,0,135703bfa3ab19715dd8080fe33ba05b5c865b45ae8e9876c092f1e5a8d5b42c,2024-11-21T01:27:48.980000 CVE-2011-2207,0,0,65179430dcb8b02d7eabcd21054aebe45f196b5e71742fd9ea600602aff81d0a,2019-12-13T18:04:55.623000 CVE-2011-2208,0,0,5b3c01338107f1dd17da40eab4a1b7cdc41f52110600815d3b35b4f48d549986,2023-02-13T04:31:00.023000 CVE-2011-2209,0,0,677c8c925e62c32c789313b8ec0d9b5b9b63e5c2b1b7880065ab76a5a4348561,2023-02-13T04:31:00.553000 CVE-2011-2210,0,0,c8749732a2f7d9974ab0575770bb4e51dfb4718acd19cf7d3939e05b12c3cefd,2023-02-13T04:31:00.947000 CVE-2011-2211,0,0,b61af90e64c1e90d622b49d126f449f20239231b2b6a0c2b709882314d1138f3,2023-02-13T04:31:01.370000 CVE-2011-2212,0,0,1460768f4af255d78170a1199af381a05b59851b77b02b357797ef891a95e509,2023-02-13T01:19:44.577000 -CVE-2011-2213,0,1,c7c1f332f507380bf13e5b7dfbad7d873b78703fa8f4db1f278f0489a559c07b,2024-11-21T01:27:49.763000 -CVE-2011-2214,0,1,e3cb8b4dd1d803ad5df09f9621234d02edd7b8e2d1a9fdcec3752ce85922d85a,2024-11-21T01:27:49.883000 -CVE-2011-2215,0,1,74e3844a934a720bde4f480b993af999280c930a50b8e23e5c72a34d105f3bf8,2024-11-21T01:27:50.023000 -CVE-2011-2216,0,1,5291813b0a8c8f727a80e11e7510dd217e4d27a2fe2f36eb88eafc60d0b237ec,2024-11-21T01:27:50.163000 -CVE-2011-2217,0,1,489fea8f6333d5515d175d5cf139919231693e1f191549d3079ea3528a4a8c03,2024-11-21T01:27:50.313000 -CVE-2011-2218,0,1,a0142b781e5df8d3a3f841fc91c36eab0c7ab31d1bc5ba826bccfa952355f819,2024-11-21T01:27:50.457000 -CVE-2011-2219,0,1,3e1fe000d684bb96959da1c8cb5f700fb018341cf991339581ceaf73b9228a87,2024-11-21T01:27:50.597000 -CVE-2011-2220,0,1,f5d949b0ed8ca9713633b1d00b43f6807d699e2d4e62b498106914f1b49ff45e,2024-11-21T01:27:50.733000 -CVE-2011-2221,0,1,6ac6e4c921d1b8f35e3f7cd7f02908531f4b6670d023f082652a4d69f6a87eb5,2024-11-21T01:27:50.873000 -CVE-2011-2222,0,1,19d8a1937215201f8f13afbf67db9e1302e6796b4a3c00a51cb59ce451302e14,2024-11-21T01:27:51.010000 -CVE-2011-2223,0,1,0b41e81a6c928c9740431762e62fc24b42d15f238be5b0a0e77b4bfefcc811a8,2024-11-21T01:27:51.147000 -CVE-2011-2224,0,1,bc91ae24753e8e1f27c6dee644f1b6d5a4263f26b7d694bfdd26fdc7c8c61436,2024-11-21T01:27:51.290000 -CVE-2011-2225,0,1,d7cc5023f8b84ef7292982abef2ad37859b4be767a4276ff3ba907e9e1f20170,2024-11-21T01:27:51.427000 -CVE-2011-2226,0,1,3a807a1935c2555ae5b09646ba52f157bb3a7e2c40184b40f8dff4d0472f1a27,2024-11-21T01:27:51.563000 -CVE-2011-2227,0,1,f3d499968cb839582ec82e5b1bdc4afcb415bc48ff52324984dd206eb70544ca,2024-11-21T01:27:51.700000 +CVE-2011-2213,0,0,c7c1f332f507380bf13e5b7dfbad7d873b78703fa8f4db1f278f0489a559c07b,2024-11-21T01:27:49.763000 +CVE-2011-2214,0,0,e3cb8b4dd1d803ad5df09f9621234d02edd7b8e2d1a9fdcec3752ce85922d85a,2024-11-21T01:27:49.883000 +CVE-2011-2215,0,0,74e3844a934a720bde4f480b993af999280c930a50b8e23e5c72a34d105f3bf8,2024-11-21T01:27:50.023000 +CVE-2011-2216,0,0,5291813b0a8c8f727a80e11e7510dd217e4d27a2fe2f36eb88eafc60d0b237ec,2024-11-21T01:27:50.163000 +CVE-2011-2217,0,0,489fea8f6333d5515d175d5cf139919231693e1f191549d3079ea3528a4a8c03,2024-11-21T01:27:50.313000 +CVE-2011-2218,0,0,a0142b781e5df8d3a3f841fc91c36eab0c7ab31d1bc5ba826bccfa952355f819,2024-11-21T01:27:50.457000 +CVE-2011-2219,0,0,3e1fe000d684bb96959da1c8cb5f700fb018341cf991339581ceaf73b9228a87,2024-11-21T01:27:50.597000 +CVE-2011-2220,0,0,f5d949b0ed8ca9713633b1d00b43f6807d699e2d4e62b498106914f1b49ff45e,2024-11-21T01:27:50.733000 +CVE-2011-2221,0,0,6ac6e4c921d1b8f35e3f7cd7f02908531f4b6670d023f082652a4d69f6a87eb5,2024-11-21T01:27:50.873000 +CVE-2011-2222,0,0,19d8a1937215201f8f13afbf67db9e1302e6796b4a3c00a51cb59ce451302e14,2024-11-21T01:27:51.010000 +CVE-2011-2223,0,0,0b41e81a6c928c9740431762e62fc24b42d15f238be5b0a0e77b4bfefcc811a8,2024-11-21T01:27:51.147000 +CVE-2011-2224,0,0,bc91ae24753e8e1f27c6dee644f1b6d5a4263f26b7d694bfdd26fdc7c8c61436,2024-11-21T01:27:51.290000 +CVE-2011-2225,0,0,d7cc5023f8b84ef7292982abef2ad37859b4be767a4276ff3ba907e9e1f20170,2024-11-21T01:27:51.427000 +CVE-2011-2226,0,0,3a807a1935c2555ae5b09646ba52f157bb3a7e2c40184b40f8dff4d0472f1a27,2024-11-21T01:27:51.563000 +CVE-2011-2227,0,0,f3d499968cb839582ec82e5b1bdc4afcb415bc48ff52324984dd206eb70544ca,2024-11-21T01:27:51.700000 CVE-2011-2228,0,0,89b3deba75cbf3f1f3475139f245ba12a3754b8d0c31663e3ddf4b3b782cb14e,2023-11-07T02:07:22.600000 CVE-2011-2229,0,0,6baf009cdde028fb24e396c674a92fc599f0aa2f56f9b7cdcdcf52ed97a13a77,2023-11-07T02:07:22.830000 -CVE-2011-2230,0,1,e95c3cba2aa169514c0e893db057e5517af291651b63e73a74a07677d8204433,2024-11-21T01:27:51.917000 -CVE-2011-2231,0,1,9e8b70103a199e64975b0eb4313e0799021c36072357a9e8f5356779e91f572b,2024-11-21T01:27:52.030000 -CVE-2011-2232,0,1,71dd2f7d31787bee230b448a1da70592372c984bb5995c4d7ddb956534987c8f,2024-11-21T01:27:52.133000 +CVE-2011-2230,0,0,e95c3cba2aa169514c0e893db057e5517af291651b63e73a74a07677d8204433,2024-11-21T01:27:51.917000 +CVE-2011-2231,0,0,9e8b70103a199e64975b0eb4313e0799021c36072357a9e8f5356779e91f572b,2024-11-21T01:27:52.030000 +CVE-2011-2232,0,0,71dd2f7d31787bee230b448a1da70592372c984bb5995c4d7ddb956534987c8f,2024-11-21T01:27:52.133000 CVE-2011-2233,0,0,0fafd5c3ed0ac83b0c415c3b0db5e630a6798a2f78869df3acb9d293828a1ded,2023-11-07T02:07:23.177000 CVE-2011-2234,0,0,e425a2291c61fc607f0c04bc9a6cd49694e190a78d794c932ad58414cd66e70a,2023-11-07T02:07:23.413000 CVE-2011-2235,0,0,2135e6cb2a70d7db954a138e828d594b3f1669af7fed10e9148a9c31cb3dc1de,2023-11-07T02:07:23.643000 CVE-2011-2236,0,0,4a343729b1fe13422f7599b8cb9ba569fca4ad387d362712521647859555582c,2023-11-07T02:07:23.890000 -CVE-2011-2237,0,1,441894f2fd854e330ffd38ae242fd7fac948694d38af06252eedd13ab89b6ba7,2024-11-21T01:27:52.297000 -CVE-2011-2238,0,1,1f01c2fb670df8a1c92fdbcb63fc5618fcd48c779ac79856a076b2a9a111683d,2024-11-21T01:27:52.397000 -CVE-2011-2239,0,1,7de4c4fdd668eda4b153c14cd2eb50794a750a4ccb2c489e0f65c773fb0fa200,2024-11-21T01:27:52.503000 -CVE-2011-2240,0,1,903203fd383e0bd9edd5336eb6dd9a882ee3b3f578ad98368e6f3a1480443756,2024-11-21T01:27:52.613000 -CVE-2011-2241,0,1,15866f6ddfb56e54c5e65663822442b8edb56bd619a5da4c1d68d96f0caac2c6,2024-11-21T01:27:52.723000 -CVE-2011-2242,0,1,97b4884a9a17c47659b371712d4992ef9218e08c8603aeb9d8a3993e28b94634,2024-11-21T01:27:52.830000 -CVE-2011-2243,0,1,d2a565f3d40167e665458d8207d03c8912f5c40047bcbee561b74bdbe66e0b50,2024-11-21T01:27:52.940000 -CVE-2011-2244,0,1,25e5acb6343a4de7181fb1ed8e5d3e4419a5cb52edf1878056c936c13944f2b4,2024-11-21T01:27:53.047000 -CVE-2011-2245,0,1,df7e3723413c606fcad5d1ddaf827cdbd143a1bbeb8bd690095744dcf580a4a9,2024-11-21T01:27:53.150000 -CVE-2011-2246,0,1,4e921e743593c72f3ff61662c2bead02c607e0e64e836a34dce2473f5f5d6782,2024-11-21T01:27:53.260000 +CVE-2011-2237,0,0,441894f2fd854e330ffd38ae242fd7fac948694d38af06252eedd13ab89b6ba7,2024-11-21T01:27:52.297000 +CVE-2011-2238,0,0,1f01c2fb670df8a1c92fdbcb63fc5618fcd48c779ac79856a076b2a9a111683d,2024-11-21T01:27:52.397000 +CVE-2011-2239,0,0,7de4c4fdd668eda4b153c14cd2eb50794a750a4ccb2c489e0f65c773fb0fa200,2024-11-21T01:27:52.503000 +CVE-2011-2240,0,0,903203fd383e0bd9edd5336eb6dd9a882ee3b3f578ad98368e6f3a1480443756,2024-11-21T01:27:52.613000 +CVE-2011-2241,0,0,15866f6ddfb56e54c5e65663822442b8edb56bd619a5da4c1d68d96f0caac2c6,2024-11-21T01:27:52.723000 +CVE-2011-2242,0,0,97b4884a9a17c47659b371712d4992ef9218e08c8603aeb9d8a3993e28b94634,2024-11-21T01:27:52.830000 +CVE-2011-2243,0,0,d2a565f3d40167e665458d8207d03c8912f5c40047bcbee561b74bdbe66e0b50,2024-11-21T01:27:52.940000 +CVE-2011-2244,0,0,25e5acb6343a4de7181fb1ed8e5d3e4419a5cb52edf1878056c936c13944f2b4,2024-11-21T01:27:53.047000 +CVE-2011-2245,0,0,df7e3723413c606fcad5d1ddaf827cdbd143a1bbeb8bd690095744dcf580a4a9,2024-11-21T01:27:53.150000 +CVE-2011-2246,0,0,4e921e743593c72f3ff61662c2bead02c607e0e64e836a34dce2473f5f5d6782,2024-11-21T01:27:53.260000 CVE-2011-2247,0,0,c76c6ef83865e8ddedc503315cad73af5eab25f253fcf1d22c75111cd1574734,2023-11-07T02:07:24.200000 -CVE-2011-2248,0,1,5d34d7e9b8366e30a08382d0f65a97da2fdbe253856da60fef54c97cd985554c,2024-11-21T01:27:53.387000 -CVE-2011-2249,0,1,418443f95ab15623f3e5dd4bb77820f568269820186994212def995f4bfaa57d,2024-11-21T01:27:53.490000 -CVE-2011-2250,0,1,31a54cdcb93b58607fd91636794919f1115901b9e6b8dc4676e5a9790a3af359,2024-11-21T01:27:53.593000 -CVE-2011-2251,0,1,d1566a58afb293e7aeb69beeab880c8b74d715f558a51b5aef2d9a3c9b2614a4,2024-11-21T01:27:53.700000 -CVE-2011-2252,0,1,bc01fd14536cc9138e854b42ace80898631213167a0cb0248f23d47ec2aab72e,2024-11-21T01:27:53.807000 -CVE-2011-2253,0,1,4a48ab3446240d8aab80b547681a381757ebb989c5fbc90793a2740f7ea14567,2024-11-21T01:27:53.910000 +CVE-2011-2248,0,0,5d34d7e9b8366e30a08382d0f65a97da2fdbe253856da60fef54c97cd985554c,2024-11-21T01:27:53.387000 +CVE-2011-2249,0,0,418443f95ab15623f3e5dd4bb77820f568269820186994212def995f4bfaa57d,2024-11-21T01:27:53.490000 +CVE-2011-2250,0,0,31a54cdcb93b58607fd91636794919f1115901b9e6b8dc4676e5a9790a3af359,2024-11-21T01:27:53.593000 +CVE-2011-2251,0,0,d1566a58afb293e7aeb69beeab880c8b74d715f558a51b5aef2d9a3c9b2614a4,2024-11-21T01:27:53.700000 +CVE-2011-2252,0,0,bc01fd14536cc9138e854b42ace80898631213167a0cb0248f23d47ec2aab72e,2024-11-21T01:27:53.807000 +CVE-2011-2253,0,0,4a48ab3446240d8aab80b547681a381757ebb989c5fbc90793a2740f7ea14567,2024-11-21T01:27:53.910000 CVE-2011-2254,0,0,714d40d1f555779aa9726f74f51fc25827c33dfa54b84c28dafdcb7db1674f17,2023-11-07T02:07:24.470000 -CVE-2011-2255,0,1,0ea5cd76222dacf4ad64c820787440d3db4d74730812b368d94bfb17b23164de,2024-11-21T01:27:54.030000 +CVE-2011-2255,0,0,0ea5cd76222dacf4ad64c820787440d3db4d74730812b368d94bfb17b23164de,2024-11-21T01:27:54.030000 CVE-2011-2256,0,0,b2b40d6456f58d334988f78cad5b67831734e2f592ba5c086d33d73bc588cc64,2023-11-07T02:07:24.697000 -CVE-2011-2257,0,1,826b3c2cdeb71959a0edee56ebbab21f91721b65e1648d45f6791e55095fe586,2024-11-21T01:27:54.143000 -CVE-2011-2258,0,1,dc0389bca93ff7fe315e7915761af4891b99c1a109d76999ce59e73175438952,2024-11-21T01:27:54.250000 -CVE-2011-2259,0,1,c695ff8cc16b01e181af5db3ee9fce0fa2a0c2e4e87562c7a4c4f44d97816064,2024-11-21T01:27:54.363000 -CVE-2011-2260,0,1,42291db434fdda2df465c45f9295154ff83135dbf4a9c34c1a1beb580be4f9ed,2024-11-21T01:27:54.467000 -CVE-2011-2261,0,1,c177b0009868bb06535a48d3511ed333c74b0424b1973eaa60dca01afefedd7a,2024-11-21T01:27:54.570000 -CVE-2011-2262,0,1,5a57bfb8c82ecdf71bf0172ccfbaf32d8524657190b01eeabdaeba23c11d8aaa,2024-11-21T01:27:54.677000 -CVE-2011-2263,0,1,eef98f4962476dafa48a13a27433ff53edb50bb72971e064cf9e59da823c2452,2024-11-21T01:27:54.820000 -CVE-2011-2264,0,1,f481c009cfe8093dd21f59c0fa5c3c9ace0979398fde0fa8d275d48cff6379f8,2024-11-21T01:27:54.937000 +CVE-2011-2257,0,0,826b3c2cdeb71959a0edee56ebbab21f91721b65e1648d45f6791e55095fe586,2024-11-21T01:27:54.143000 +CVE-2011-2258,0,0,dc0389bca93ff7fe315e7915761af4891b99c1a109d76999ce59e73175438952,2024-11-21T01:27:54.250000 +CVE-2011-2259,0,0,c695ff8cc16b01e181af5db3ee9fce0fa2a0c2e4e87562c7a4c4f44d97816064,2024-11-21T01:27:54.363000 +CVE-2011-2260,0,0,42291db434fdda2df465c45f9295154ff83135dbf4a9c34c1a1beb580be4f9ed,2024-11-21T01:27:54.467000 +CVE-2011-2261,0,0,c177b0009868bb06535a48d3511ed333c74b0424b1973eaa60dca01afefedd7a,2024-11-21T01:27:54.570000 +CVE-2011-2262,0,0,5a57bfb8c82ecdf71bf0172ccfbaf32d8524657190b01eeabdaeba23c11d8aaa,2024-11-21T01:27:54.677000 +CVE-2011-2263,0,0,eef98f4962476dafa48a13a27433ff53edb50bb72971e064cf9e59da823c2452,2024-11-21T01:27:54.820000 +CVE-2011-2264,0,0,f481c009cfe8093dd21f59c0fa5c3c9ace0979398fde0fa8d275d48cff6379f8,2024-11-21T01:27:54.937000 CVE-2011-2265,0,0,d74f3f201edead46751f0209a504dd754010c313b53bc31ae2dc2684055e1f10,2023-11-07T02:07:25.147000 CVE-2011-2266,0,0,af978e965810b7c333bb03af42cc374bde83df5d99bc79666bb2e11a44270acb,2023-11-07T02:07:25.590000 -CVE-2011-2267,0,1,d49b02fe3ba923028817494b75416a56340ff294e526f35862bfb6ad0d010ddd,2024-11-21T01:27:55.097000 +CVE-2011-2267,0,0,d49b02fe3ba923028817494b75416a56340ff294e526f35862bfb6ad0d010ddd,2024-11-21T01:27:55.097000 CVE-2011-2268,0,0,3335a6544432a669631611f0a89f901bc8b57f775e6dfaa16cfa7728121a5a28,2023-11-07T02:07:26.040000 CVE-2011-2269,0,0,81daf72d695a3ffd0d68170196e2e2f9a842a6f9f697c284187841b216163ec8,2023-11-07T02:07:26.437000 CVE-2011-2270,0,0,d291a7511f24e562c4a43b1ab11a50f1d62e792ad59605819ed35567db99fa52,2023-11-07T02:07:26.783000 -CVE-2011-2271,0,1,bec24a81e562de05409dd2c0b56b92f2278772342ac8be8d1528efc54d274fe5,2024-11-21T01:27:55.247000 -CVE-2011-2272,0,1,39082a9cd653ea1c344b25f0b23519fedb76eec502a01acb160b5911a7ecba70,2024-11-21T01:27:55.353000 -CVE-2011-2273,0,1,d83b7c256b9f37296b843c34a7583b2f63a370d76a1c193dbbcd5ca328c5dd86,2024-11-21T01:27:55.473000 -CVE-2011-2274,0,1,917492c9a9980a33816ce7d50d429b3403d6e71c229f468cf918cd5c3265d095,2024-11-21T01:27:55.583000 -CVE-2011-2275,0,1,c53f8bd6199b3b7ea8bf29069b442f197f1684c5b29cfadcc9f3d0c168a31e99,2024-11-21T01:27:55.703000 +CVE-2011-2271,0,0,bec24a81e562de05409dd2c0b56b92f2278772342ac8be8d1528efc54d274fe5,2024-11-21T01:27:55.247000 +CVE-2011-2272,0,0,39082a9cd653ea1c344b25f0b23519fedb76eec502a01acb160b5911a7ecba70,2024-11-21T01:27:55.353000 +CVE-2011-2273,0,0,d83b7c256b9f37296b843c34a7583b2f63a370d76a1c193dbbcd5ca328c5dd86,2024-11-21T01:27:55.473000 +CVE-2011-2274,0,0,917492c9a9980a33816ce7d50d429b3403d6e71c229f468cf918cd5c3265d095,2024-11-21T01:27:55.583000 +CVE-2011-2275,0,0,c53f8bd6199b3b7ea8bf29069b442f197f1684c5b29cfadcc9f3d0c168a31e99,2024-11-21T01:27:55.703000 CVE-2011-2276,0,0,0e8cae810534a01789f6065210832f668347d1a4c25d49d6fdd3f21683a86318,2023-11-07T02:07:27.200000 -CVE-2011-2277,0,1,1a0511f19eac5bf2d54c9e3c68ceff26e0e908af122024fc44a971a63ae95b4d,2024-11-21T01:27:55.840000 -CVE-2011-2278,0,1,9e8530274675121ccca1d405191f33fe270a30c659652e1e0b912d27b6c587ef,2024-11-21T01:27:55.953000 -CVE-2011-2279,0,1,3adb0c24f7f8f20989e52d5df687ea1a8423ee792b0d331a31d49a463f6e30a9,2024-11-21T01:27:56.073000 -CVE-2011-2280,0,1,348fd954ad53b55df6e5a3b20fe670437036bad592e8733d68dde36572312c5d,2024-11-21T01:27:56.190000 -CVE-2011-2281,0,1,4a927af46ed1fec7c5a0756c095411da955a64ae0c0d407b34475df79495eeef,2024-11-21T01:27:56.310000 -CVE-2011-2282,0,1,6ec420ed05cc585de72a2aa9582c47f2b322fd075e1cbe0920dfa19f1009057b,2024-11-21T01:27:56.427000 -CVE-2011-2283,0,1,3a4e16a3f40f977d8357beca221460f5b4d6d73104932e47ad26d36b526f374a,2024-11-21T01:27:56.537000 -CVE-2011-2284,0,1,49e1d5392bd45f78521d11fac70ae975612f4c1ba6a4be6a804bd43b60768dee,2024-11-21T01:27:56.653000 -CVE-2011-2285,0,1,8069f6f7fb24b1f88d41520bbbf2a7523c83640a16c9d9b704a5cf3bf3989bc0,2024-11-21T01:27:56.770000 -CVE-2011-2286,0,1,55a6ac21aad1c3fe2bb8abcd7751669f73eb5669c83d12a331de579b04a558ad,2024-11-21T01:27:56.890000 -CVE-2011-2287,0,1,a274c6efb286b3d8f6552a7d6d3b97e12fe5215be8e549210f10d6832c1b4115,2024-11-21T01:27:57.033000 -CVE-2011-2288,0,1,d8d819927576ffb93edd37b522cd90f8d124f279e4b11833c3cc63153ee5ec91,2024-11-21T01:27:57.170000 -CVE-2011-2289,0,1,089f45a29de6a8460086b0d9226e9bdfcc97272826bb7fde3f5f5988b5222294,2024-11-21T01:27:57.287000 -CVE-2011-2290,0,1,6af58a1539e575322ac1c7bcf8f4fa8c38197a672d2097f2e32faa70d4698f45,2024-11-21T01:27:57.390000 -CVE-2011-2291,0,1,4071c29aecefa422701e8bbd83cb0b361cf7780697ff208bdf8227317a5b8625,2024-11-21T01:27:57.493000 -CVE-2011-2292,0,1,81b05e26112cffdc794e5873e7bd112025a952553395f2e9b0af18694a3a60da,2024-11-21T01:27:57.593000 -CVE-2011-2293,0,1,5aa394cb21b9b79119a3b987cf6eea4f333a23fdeae72f51a3e8c35af52941fa,2024-11-21T01:27:57.700000 -CVE-2011-2294,0,1,8df0410dfcfc244bd5ab2adf945b2e37bf0a82aa68c70ba383fa5cbeee9ccd64,2024-11-21T01:27:57.807000 -CVE-2011-2295,0,1,b5b7b5f2c7decaf97a433ba564f47c8a8779b55e961f958fcccdce35a189686c,2024-11-21T01:27:57.913000 -CVE-2011-2296,0,1,1f3d3a479d62eea2bbe0ecd9ac12bf329126dd0c4472c5518fdbd70e123d3683,2024-11-21T01:27:58.020000 -CVE-2011-2297,0,1,5498eb586f6cf444ff6af5633720a676d705b5ae534298bb52c626c09bfb8a36,2024-11-21T01:27:58.127000 -CVE-2011-2298,0,1,7ce1a8d90085cb607a7591a6f0a1c6267830793f82770f20dc57c398f1874c9e,2024-11-21T01:27:58.230000 -CVE-2011-2299,0,1,054e0f9d322428f2d5232280f76d17bae8af21b63f4f1386c7d64b36cec9b05b,2024-11-21T01:27:58.337000 -CVE-2011-2300,0,1,6a71140f737021f178235bc81b680a4baede6b227e6d10f3da64630bad31cd23,2024-11-21T01:27:58.440000 -CVE-2011-2301,0,1,1538c53c904b8c569ca736d0263feebaf426644033ec7fd0ef2ed68abf4a6cba,2024-11-21T01:27:58.553000 -CVE-2011-2302,0,1,d61af70546ff4c3b9507d626e05f80a77be50f694c1ce2b95b340bc847e88607,2024-11-21T01:27:58.657000 -CVE-2011-2303,0,1,0a763e3ef87ef6363a66d7916349d9656df88563873c98ff973da3790ca73f60,2024-11-21T01:27:58.770000 -CVE-2011-2304,0,1,406ad8117fd58ce16d4d1c6be4fbaa692ce44bc2a232c731f7484fe92db03e41,2024-11-21T01:27:58.870000 -CVE-2011-2305,0,1,d861edca301e9d54b08863bad0755fd9f4b09b24f5c5611c963716b6f57c88af,2024-11-21T01:27:58.967000 -CVE-2011-2306,0,1,04e9d9aafc852500b0eed81036ce219d7c5d5df2e8f6b35e5ee99ad0634f5f2f,2024-11-21T01:27:59.100000 -CVE-2011-2307,0,1,b18958c854435d8a3d5d08d3f201c80f53f98f94d2656cf2b55f5847c0ac73ac,2024-11-21T01:27:59.203000 -CVE-2011-2308,0,1,b0d02540c1f1ca093d00f3020f7160fa2f7b0ed75be1341a5056763d79b42100,2024-11-21T01:27:59.313000 -CVE-2011-2309,0,1,dab3c2aa71f1994bae7cf964124db3dd37d1b063f06d43c27c8ec8be87f40b9c,2024-11-21T01:27:59.420000 -CVE-2011-2310,0,1,4785d478aebd313a30b2f0e5ab3cb4fb4864ed87296b905c64a6ae1329370c93,2024-11-21T01:27:59.537000 -CVE-2011-2311,0,1,2299755c3cbfcb42e4be671763e73cb173d559bc0658be6d9b3f0529ca319939,2024-11-21T01:27:59.643000 -CVE-2011-2312,0,1,f67edd7b0c68ed0d09d967b1e9b0e61c04709695dbd7df3a87fb34c5f1d290f3,2024-11-21T01:27:59.747000 -CVE-2011-2313,0,1,adea12e4f63ddae71317973088a194d6dbeab8f7bef9259431e50aff144f2e5e,2024-11-21T01:27:59.857000 -CVE-2011-2314,0,1,80f9d205b7a321629feb6cbcd49725cbda642cb869243a3e52503945f007d479,2024-11-21T01:28:00.037000 -CVE-2011-2315,0,1,03669a99e4c7eecf8973c8e8946d7b25e83ba03223a68322866d370d5c87afeb,2024-11-21T01:28:00.737000 -CVE-2011-2316,0,1,ab60c7ded7d05e7265df47888aeee59e8079d998393b8aeb0d57a463a47cc516,2024-11-21T01:28:00.880000 -CVE-2011-2317,0,1,bd953395f39d5371719ad7f1811345aeeae8de0cf5bed08aee44101b4001d8f9,2024-11-21T01:28:01.183000 -CVE-2011-2318,0,1,eb6247a344407e8f6f434170087f3aeb0902b444af6d252cfb66cb3cc7f7137c,2024-11-21T01:28:01.553000 -CVE-2011-2319,0,1,f9b20b18d9678813f4fa131d53e7d8163fe4be911885fbfcac0a152df0f473b8,2024-11-21T01:28:01.670000 -CVE-2011-2320,0,1,dcf5d3ae487f8683f4fcb959e8dadafa4fa132727f3a96db26fa88c381f5f140,2024-11-21T01:28:01.810000 -CVE-2011-2321,0,1,de0559b8eda737e40297e5829d78eefab57677c16fd1e3fac1d03f298e4e463e,2024-11-21T01:28:02.040000 -CVE-2011-2322,0,1,7dcb0ae0847fe2a56e5b21150f53824039eadbd4bbde2d260dea5721bf6d5515,2024-11-21T01:28:02.187000 -CVE-2011-2323,0,1,ad5b0de037a0f9257d37d91b6ef115fc1025a3b7292518d8f91250d8c67e40da,2024-11-21T01:28:02.310000 -CVE-2011-2324,0,1,522e9902c5b271b52d62d5d5deed1189c243a372c7a9aee5e973ca86af80377a,2024-11-21T01:28:02.440000 -CVE-2011-2325,0,1,3a5bd7138886d42feb35d6a39c31b0cce2678c68f95088f450db10d831b856b6,2024-11-21T01:28:02.560000 -CVE-2011-2326,0,1,15cc2af22af04b201dbdaa5a811246570b5282abc9efda2adacb2541103aa477,2024-11-21T01:28:02.693000 -CVE-2011-2327,0,1,68fedd32e47cd5a34f4d3a390ed535db066d84b92f12f9ab61b4e4a6ab4a8fb4,2024-11-21T01:28:02.813000 -CVE-2011-2328,0,1,ab8335078ece9a74067e7dfb975d86f2a4fce7269805bce0fb61b7f354a1007e,2024-11-21T01:28:02.937000 -CVE-2011-2329,0,1,ce6a8b7ed0be1a6aebcffa7093018d04dba285429a38f98acfbddcfb1beec1e2,2024-11-21T01:28:03.087000 -CVE-2011-2330,0,1,2d56cd457e09222f04c943b6ab7ffc17a0abc3e7e934882202a71567474e27c8,2024-11-21T01:28:03.230000 -CVE-2011-2331,0,1,1281aa46b1fa2ec24687e09b9238630098e92f218dd1cfa4aecba0aea98459e3,2024-11-21T01:28:03.380000 -CVE-2011-2332,0,1,e53feaae31d65b784c6398702d568d40805de2c14e28ac9b70217a29ba778637,2024-11-21T01:28:03.530000 +CVE-2011-2277,0,0,1a0511f19eac5bf2d54c9e3c68ceff26e0e908af122024fc44a971a63ae95b4d,2024-11-21T01:27:55.840000 +CVE-2011-2278,0,0,9e8530274675121ccca1d405191f33fe270a30c659652e1e0b912d27b6c587ef,2024-11-21T01:27:55.953000 +CVE-2011-2279,0,0,3adb0c24f7f8f20989e52d5df687ea1a8423ee792b0d331a31d49a463f6e30a9,2024-11-21T01:27:56.073000 +CVE-2011-2280,0,0,348fd954ad53b55df6e5a3b20fe670437036bad592e8733d68dde36572312c5d,2024-11-21T01:27:56.190000 +CVE-2011-2281,0,0,4a927af46ed1fec7c5a0756c095411da955a64ae0c0d407b34475df79495eeef,2024-11-21T01:27:56.310000 +CVE-2011-2282,0,0,6ec420ed05cc585de72a2aa9582c47f2b322fd075e1cbe0920dfa19f1009057b,2024-11-21T01:27:56.427000 +CVE-2011-2283,0,0,3a4e16a3f40f977d8357beca221460f5b4d6d73104932e47ad26d36b526f374a,2024-11-21T01:27:56.537000 +CVE-2011-2284,0,0,49e1d5392bd45f78521d11fac70ae975612f4c1ba6a4be6a804bd43b60768dee,2024-11-21T01:27:56.653000 +CVE-2011-2285,0,0,8069f6f7fb24b1f88d41520bbbf2a7523c83640a16c9d9b704a5cf3bf3989bc0,2024-11-21T01:27:56.770000 +CVE-2011-2286,0,0,55a6ac21aad1c3fe2bb8abcd7751669f73eb5669c83d12a331de579b04a558ad,2024-11-21T01:27:56.890000 +CVE-2011-2287,0,0,a274c6efb286b3d8f6552a7d6d3b97e12fe5215be8e549210f10d6832c1b4115,2024-11-21T01:27:57.033000 +CVE-2011-2288,0,0,d8d819927576ffb93edd37b522cd90f8d124f279e4b11833c3cc63153ee5ec91,2024-11-21T01:27:57.170000 +CVE-2011-2289,0,0,089f45a29de6a8460086b0d9226e9bdfcc97272826bb7fde3f5f5988b5222294,2024-11-21T01:27:57.287000 +CVE-2011-2290,0,0,6af58a1539e575322ac1c7bcf8f4fa8c38197a672d2097f2e32faa70d4698f45,2024-11-21T01:27:57.390000 +CVE-2011-2291,0,0,4071c29aecefa422701e8bbd83cb0b361cf7780697ff208bdf8227317a5b8625,2024-11-21T01:27:57.493000 +CVE-2011-2292,0,0,81b05e26112cffdc794e5873e7bd112025a952553395f2e9b0af18694a3a60da,2024-11-21T01:27:57.593000 +CVE-2011-2293,0,0,5aa394cb21b9b79119a3b987cf6eea4f333a23fdeae72f51a3e8c35af52941fa,2024-11-21T01:27:57.700000 +CVE-2011-2294,0,0,8df0410dfcfc244bd5ab2adf945b2e37bf0a82aa68c70ba383fa5cbeee9ccd64,2024-11-21T01:27:57.807000 +CVE-2011-2295,0,0,b5b7b5f2c7decaf97a433ba564f47c8a8779b55e961f958fcccdce35a189686c,2024-11-21T01:27:57.913000 +CVE-2011-2296,0,0,1f3d3a479d62eea2bbe0ecd9ac12bf329126dd0c4472c5518fdbd70e123d3683,2024-11-21T01:27:58.020000 +CVE-2011-2297,0,0,5498eb586f6cf444ff6af5633720a676d705b5ae534298bb52c626c09bfb8a36,2024-11-21T01:27:58.127000 +CVE-2011-2298,0,0,7ce1a8d90085cb607a7591a6f0a1c6267830793f82770f20dc57c398f1874c9e,2024-11-21T01:27:58.230000 +CVE-2011-2299,0,0,054e0f9d322428f2d5232280f76d17bae8af21b63f4f1386c7d64b36cec9b05b,2024-11-21T01:27:58.337000 +CVE-2011-2300,0,0,6a71140f737021f178235bc81b680a4baede6b227e6d10f3da64630bad31cd23,2024-11-21T01:27:58.440000 +CVE-2011-2301,0,0,1538c53c904b8c569ca736d0263feebaf426644033ec7fd0ef2ed68abf4a6cba,2024-11-21T01:27:58.553000 +CVE-2011-2302,0,0,d61af70546ff4c3b9507d626e05f80a77be50f694c1ce2b95b340bc847e88607,2024-11-21T01:27:58.657000 +CVE-2011-2303,0,0,0a763e3ef87ef6363a66d7916349d9656df88563873c98ff973da3790ca73f60,2024-11-21T01:27:58.770000 +CVE-2011-2304,0,0,406ad8117fd58ce16d4d1c6be4fbaa692ce44bc2a232c731f7484fe92db03e41,2024-11-21T01:27:58.870000 +CVE-2011-2305,0,0,d861edca301e9d54b08863bad0755fd9f4b09b24f5c5611c963716b6f57c88af,2024-11-21T01:27:58.967000 +CVE-2011-2306,0,0,04e9d9aafc852500b0eed81036ce219d7c5d5df2e8f6b35e5ee99ad0634f5f2f,2024-11-21T01:27:59.100000 +CVE-2011-2307,0,0,b18958c854435d8a3d5d08d3f201c80f53f98f94d2656cf2b55f5847c0ac73ac,2024-11-21T01:27:59.203000 +CVE-2011-2308,0,0,b0d02540c1f1ca093d00f3020f7160fa2f7b0ed75be1341a5056763d79b42100,2024-11-21T01:27:59.313000 +CVE-2011-2309,0,0,dab3c2aa71f1994bae7cf964124db3dd37d1b063f06d43c27c8ec8be87f40b9c,2024-11-21T01:27:59.420000 +CVE-2011-2310,0,0,4785d478aebd313a30b2f0e5ab3cb4fb4864ed87296b905c64a6ae1329370c93,2024-11-21T01:27:59.537000 +CVE-2011-2311,0,0,2299755c3cbfcb42e4be671763e73cb173d559bc0658be6d9b3f0529ca319939,2024-11-21T01:27:59.643000 +CVE-2011-2312,0,0,f67edd7b0c68ed0d09d967b1e9b0e61c04709695dbd7df3a87fb34c5f1d290f3,2024-11-21T01:27:59.747000 +CVE-2011-2313,0,0,adea12e4f63ddae71317973088a194d6dbeab8f7bef9259431e50aff144f2e5e,2024-11-21T01:27:59.857000 +CVE-2011-2314,0,0,80f9d205b7a321629feb6cbcd49725cbda642cb869243a3e52503945f007d479,2024-11-21T01:28:00.037000 +CVE-2011-2315,0,0,03669a99e4c7eecf8973c8e8946d7b25e83ba03223a68322866d370d5c87afeb,2024-11-21T01:28:00.737000 +CVE-2011-2316,0,0,ab60c7ded7d05e7265df47888aeee59e8079d998393b8aeb0d57a463a47cc516,2024-11-21T01:28:00.880000 +CVE-2011-2317,0,0,bd953395f39d5371719ad7f1811345aeeae8de0cf5bed08aee44101b4001d8f9,2024-11-21T01:28:01.183000 +CVE-2011-2318,0,0,eb6247a344407e8f6f434170087f3aeb0902b444af6d252cfb66cb3cc7f7137c,2024-11-21T01:28:01.553000 +CVE-2011-2319,0,0,f9b20b18d9678813f4fa131d53e7d8163fe4be911885fbfcac0a152df0f473b8,2024-11-21T01:28:01.670000 +CVE-2011-2320,0,0,dcf5d3ae487f8683f4fcb959e8dadafa4fa132727f3a96db26fa88c381f5f140,2024-11-21T01:28:01.810000 +CVE-2011-2321,0,0,de0559b8eda737e40297e5829d78eefab57677c16fd1e3fac1d03f298e4e463e,2024-11-21T01:28:02.040000 +CVE-2011-2322,0,0,7dcb0ae0847fe2a56e5b21150f53824039eadbd4bbde2d260dea5721bf6d5515,2024-11-21T01:28:02.187000 +CVE-2011-2323,0,0,ad5b0de037a0f9257d37d91b6ef115fc1025a3b7292518d8f91250d8c67e40da,2024-11-21T01:28:02.310000 +CVE-2011-2324,0,0,522e9902c5b271b52d62d5d5deed1189c243a372c7a9aee5e973ca86af80377a,2024-11-21T01:28:02.440000 +CVE-2011-2325,0,0,3a5bd7138886d42feb35d6a39c31b0cce2678c68f95088f450db10d831b856b6,2024-11-21T01:28:02.560000 +CVE-2011-2326,0,0,15cc2af22af04b201dbdaa5a811246570b5282abc9efda2adacb2541103aa477,2024-11-21T01:28:02.693000 +CVE-2011-2327,0,0,68fedd32e47cd5a34f4d3a390ed535db066d84b92f12f9ab61b4e4a6ab4a8fb4,2024-11-21T01:28:02.813000 +CVE-2011-2328,0,0,ab8335078ece9a74067e7dfb975d86f2a4fce7269805bce0fb61b7f354a1007e,2024-11-21T01:28:02.937000 +CVE-2011-2329,0,0,ce6a8b7ed0be1a6aebcffa7093018d04dba285429a38f98acfbddcfb1beec1e2,2024-11-21T01:28:03.087000 +CVE-2011-2330,0,0,2d56cd457e09222f04c943b6ab7ffc17a0abc3e7e934882202a71567474e27c8,2024-11-21T01:28:03.230000 +CVE-2011-2331,0,0,1281aa46b1fa2ec24687e09b9238630098e92f218dd1cfa4aecba0aea98459e3,2024-11-21T01:28:03.380000 +CVE-2011-2332,0,0,e53feaae31d65b784c6398702d568d40805de2c14e28ac9b70217a29ba778637,2024-11-21T01:28:03.530000 CVE-2011-2334,0,0,1dd6a1df992729ee974566db3686d7e399fad841d196005452872068176a62bb,2023-11-07T02:07:28.630000 CVE-2011-2335,0,0,5a4c70e6f746accf950e875b25b4fc0d116d854d90624a9cbf060fefe78ed471,2023-11-07T02:07:29.180000 CVE-2011-2336,0,0,546e6fddf4995a787262c9e05347b13dc576cb5c370a9a2187a8c42ee04d221d,2023-11-07T02:07:29.580000 CVE-2011-2337,0,0,d23cf38bbc9548812b3cfe778746224edcf050fdd4e32e766c9162cdbc1bf086,2023-11-07T02:07:30.090000 -CVE-2011-2338,0,1,11815dc8f889fd08faa1a9ea9fcc18a5e4a0c9f985fe177ae9b23f5c476e0cb1,2024-11-21T01:28:04.120000 -CVE-2011-2339,0,1,5c522cb9ad3776185583632cfb0159a1eb77cb8fd9f67641f87e19c1037361a2,2024-11-21T01:28:04.253000 -CVE-2011-2341,0,1,ea6c2daea4fc00ea4fed31743267c752199fc00d0cfec3365449134eb9dfe4b0,2024-11-21T01:28:04.387000 -CVE-2011-2342,0,1,d86c6c42468c265c2fd010b9958a981a36b6ebdfe8a34bd3cd930e195cd6ae8f,2024-11-21T01:28:04.520000 +CVE-2011-2338,0,0,11815dc8f889fd08faa1a9ea9fcc18a5e4a0c9f985fe177ae9b23f5c476e0cb1,2024-11-21T01:28:04.120000 +CVE-2011-2339,0,0,5c522cb9ad3776185583632cfb0159a1eb77cb8fd9f67641f87e19c1037361a2,2024-11-21T01:28:04.253000 +CVE-2011-2341,0,0,ea6c2daea4fc00ea4fed31743267c752199fc00d0cfec3365449134eb9dfe4b0,2024-11-21T01:28:04.387000 +CVE-2011-2342,0,0,d86c6c42468c265c2fd010b9958a981a36b6ebdfe8a34bd3cd930e195cd6ae8f,2024-11-21T01:28:04.520000 CVE-2011-2343,0,0,b9873c3ff0cf0a2ce437d1f10c20ff1809425a441b7d9f92ac153a9cbbadd5d7,2020-02-19T18:13:30.317000 -CVE-2011-2344,0,1,d966ac5d4fb4b0aaad26c6b8c05bde3582b585bd71f12f6e0b1924f215ca9ed8,2024-11-21T01:28:04.750000 -CVE-2011-2345,0,1,9bd8c2604668d31a7bb408e5e5359b100193e4d5f6c31ad8ac6852966ae9a1e9,2024-11-21T01:28:04.860000 -CVE-2011-2346,0,1,c93023aa4e9c209a56206ede28e707ae015bfd890466ff05802e398e2fcf1f4b,2024-11-21T01:28:04.973000 -CVE-2011-2347,0,1,8939f08d012895f645d7baa7ac21186e71540ffc5a34c67efcfec56938ed992e,2024-11-21T01:28:05.083000 -CVE-2011-2348,0,1,a87cc806a6c91ba016fbbf5c5c19d4653172b0ec116fa33bc539ab0d5a83e78f,2024-11-21T01:28:05.193000 -CVE-2011-2349,0,1,6223062da82747305a1cff631684cc055a365dc84c534902978cfe2e3518e7a5,2024-11-21T01:28:05.307000 -CVE-2011-2350,0,1,f178d691c018bd6b587ba70547d1654bb9099ca14dcfe5a55229c1615f8abc1e,2024-11-21T01:28:05.420000 -CVE-2011-2351,0,1,920cbfd4eccb9b4694bed2bd68685c46681cf45018547654b9e82e4d77a0e9c8,2024-11-21T01:28:05.537000 -CVE-2011-2352,0,1,b991f1cd640ddd481c75880479b2ab99429152e458aa5665a458e7b9d8ddcef7,2024-11-21T01:28:05.657000 +CVE-2011-2344,0,0,d966ac5d4fb4b0aaad26c6b8c05bde3582b585bd71f12f6e0b1924f215ca9ed8,2024-11-21T01:28:04.750000 +CVE-2011-2345,0,0,9bd8c2604668d31a7bb408e5e5359b100193e4d5f6c31ad8ac6852966ae9a1e9,2024-11-21T01:28:04.860000 +CVE-2011-2346,0,0,c93023aa4e9c209a56206ede28e707ae015bfd890466ff05802e398e2fcf1f4b,2024-11-21T01:28:04.973000 +CVE-2011-2347,0,0,8939f08d012895f645d7baa7ac21186e71540ffc5a34c67efcfec56938ed992e,2024-11-21T01:28:05.083000 +CVE-2011-2348,0,0,a87cc806a6c91ba016fbbf5c5c19d4653172b0ec116fa33bc539ab0d5a83e78f,2024-11-21T01:28:05.193000 +CVE-2011-2349,0,0,6223062da82747305a1cff631684cc055a365dc84c534902978cfe2e3518e7a5,2024-11-21T01:28:05.307000 +CVE-2011-2350,0,0,f178d691c018bd6b587ba70547d1654bb9099ca14dcfe5a55229c1615f8abc1e,2024-11-21T01:28:05.420000 +CVE-2011-2351,0,0,920cbfd4eccb9b4694bed2bd68685c46681cf45018547654b9e82e4d77a0e9c8,2024-11-21T01:28:05.537000 +CVE-2011-2352,0,0,b991f1cd640ddd481c75880479b2ab99429152e458aa5665a458e7b9d8ddcef7,2024-11-21T01:28:05.657000 CVE-2011-2353,0,0,f8c552dbd61a94c60fb9cf84a9390a040386082ff66a6596037b12edc4012ad4,2023-11-07T02:07:36.990000 -CVE-2011-2354,0,1,99685c7621f0a5a6355a2ba707771225e6fd24fab526581bf4d3886ade31c71b,2024-11-21T01:28:05.920000 -CVE-2011-2356,0,1,4e72af668fc50526f38ac8925de3b925e4c620c0ad4599682ffae314b24aba29,2024-11-21T01:28:06.070000 -CVE-2011-2357,0,1,5e1b766505f3ad9fb88bdecc8a035c7d601cfdb045e43020765e57492853a429,2024-11-21T01:28:06.207000 -CVE-2011-2358,0,1,f06725c9a08ebe447d8a72cd59ebcbf326a913b93a7e567656e137a546227a50,2024-11-21T01:28:06.347000 -CVE-2011-2359,0,1,b887d6ca1ed7814693345610c4b1ef6a6af31e105934dc6edece114029dacf7f,2024-11-21T01:28:06.463000 -CVE-2011-2360,0,1,6c99e678f669f88324d610d93696dacc5d7aa231b5096112708115dbc29b1d9a,2024-11-21T01:28:06.583000 -CVE-2011-2361,0,1,95a43305f0f315799d82384ff05f16935e69ea1ce4f2a3ab8a82898978f26a1d,2024-11-21T01:28:06.697000 -CVE-2011-2362,0,1,3e2bea0b766e82f5bfbd0a669b2b37145f762adf3c79bd8cd9b07a822613926f,2024-11-21T01:28:06.803000 -CVE-2011-2363,0,1,05d386eb68a449ebd24685acc7fde5d05d335bb73612377976a38a100a1482a0,2024-11-21T01:28:07 -CVE-2011-2364,0,1,ef49e3c3850fed8e3807b4c94a6ff4887514b913471f2135e8654eb87c40beb1,2024-11-21T01:28:07.243000 -CVE-2011-2365,0,1,f23d1b2a25c67ee644206aaa201f58fd04f3918979da0fae5f7fe2079b648a12,2024-11-21T01:28:07.480000 -CVE-2011-2366,0,1,63d98203e16d573422b1e3d8c70011f3871e2067e928d72c008de7da3dd870f6,2024-11-21T01:28:07.667000 -CVE-2011-2367,0,1,7383f4eeda66b5237a795ed37e6faa292da7f572d1147edf1ea1594825bd8208,2024-11-21T01:28:07.883000 -CVE-2011-2368,0,1,c6946b8761f56de62b310bc81bbb2f216d40e164f4b26b9579a16cada3e6ff92,2024-11-21T01:28:08.037000 -CVE-2011-2369,0,1,4587d0f37d3b738199adb53df1df8553a9a801cfb45bbee491dda91252ba10df,2024-11-21T01:28:08.180000 -CVE-2011-2370,0,1,631e534cb93b9763f9bec0d59e564b227ca42821029025b88503b758515817ae,2024-11-21T01:28:08.330000 -CVE-2011-2371,0,1,1ea1b9096a94ba4585a50e8f3b72094a9816529f7a2121c29ced231b2c5fc097,2024-11-21T01:28:08.503000 -CVE-2011-2372,0,1,efc17001dc32843b70e65ab09e5a7d4e16a2e6968535b1dab859dfbe659eb737,2024-11-21T01:28:08.693000 -CVE-2011-2373,0,1,f9c04ce3774cbcbd0a18fe5eaae41e4a05bf017a7c6ed51e670760aa167b05ad,2024-11-21T01:28:08.880000 -CVE-2011-2374,0,1,30ddf1adf3fa4719b5ff1339b0bed1c425138b8e1cf54d3b95b105082a9269de,2024-11-21T01:28:09.063000 -CVE-2011-2375,0,1,8b7d7879c4f9fad60cbc8c70801a4c2fb4a3f7edabad3ca4d2c373838bc185da,2024-11-21T01:28:09.263000 -CVE-2011-2376,0,1,98c7c8086bf71c01a92e8b8a63cbc4b1db01dbabc8da12d46bd328391eb17a74,2024-11-21T01:28:09.457000 -CVE-2011-2377,0,1,dfeafc8b22d901de15505d001a0b206eede25f358cf6ae17c3ba4b6ce21299ee,2024-11-21T01:28:09.637000 -CVE-2011-2378,0,1,e0aebf59972903ec941a6ba98aa186b7f3909647b1ce0ebd6c448312a22a0c59,2024-11-21T01:28:09.820000 -CVE-2011-2379,0,1,3c7c191cccd1f39ba81c4371aca11f772d6b8531e2008c760524eef281561d8a,2024-11-21T01:28:10.010000 -CVE-2011-2380,0,1,713e8c3094b266e06b48e6cce680be6ce7a495fc774fcb180eaeb85da6702406,2024-11-21T01:28:10.200000 -CVE-2011-2381,0,1,608f9ad7f4fb61f43647fa30d751ada8587869afbef4375f00d30008a45aa556,2024-11-21T01:28:10.370000 -CVE-2011-2382,0,1,59db3209551c8ba93d0416192a3c833f789463386687145c0547bf06b326b722,2024-11-21T01:28:10.543000 -CVE-2011-2383,0,1,d93815bfe5f2c494e1ef017fe138b9238874bd305b20abcd6b629b2f2203c382,2024-11-21T01:28:10.710000 -CVE-2011-2385,0,1,becd9ee9f31d6592119adb3b8b11650b73ac45f4f69fb486261487f07cde6404,2024-11-21T01:28:10.863000 -CVE-2011-2386,0,1,e456e6e5f0e3c54e5d53e1fd0d5e16092b4f519e3db6936d929ac98ae805fe4f,2024-11-21T01:28:11 +CVE-2011-2354,0,0,99685c7621f0a5a6355a2ba707771225e6fd24fab526581bf4d3886ade31c71b,2024-11-21T01:28:05.920000 +CVE-2011-2356,0,0,4e72af668fc50526f38ac8925de3b925e4c620c0ad4599682ffae314b24aba29,2024-11-21T01:28:06.070000 +CVE-2011-2357,0,0,5e1b766505f3ad9fb88bdecc8a035c7d601cfdb045e43020765e57492853a429,2024-11-21T01:28:06.207000 +CVE-2011-2358,0,0,f06725c9a08ebe447d8a72cd59ebcbf326a913b93a7e567656e137a546227a50,2024-11-21T01:28:06.347000 +CVE-2011-2359,0,0,b887d6ca1ed7814693345610c4b1ef6a6af31e105934dc6edece114029dacf7f,2024-11-21T01:28:06.463000 +CVE-2011-2360,0,0,6c99e678f669f88324d610d93696dacc5d7aa231b5096112708115dbc29b1d9a,2024-11-21T01:28:06.583000 +CVE-2011-2361,0,0,95a43305f0f315799d82384ff05f16935e69ea1ce4f2a3ab8a82898978f26a1d,2024-11-21T01:28:06.697000 +CVE-2011-2362,0,0,3e2bea0b766e82f5bfbd0a669b2b37145f762adf3c79bd8cd9b07a822613926f,2024-11-21T01:28:06.803000 +CVE-2011-2363,0,0,05d386eb68a449ebd24685acc7fde5d05d335bb73612377976a38a100a1482a0,2024-11-21T01:28:07 +CVE-2011-2364,0,0,ef49e3c3850fed8e3807b4c94a6ff4887514b913471f2135e8654eb87c40beb1,2024-11-21T01:28:07.243000 +CVE-2011-2365,0,0,f23d1b2a25c67ee644206aaa201f58fd04f3918979da0fae5f7fe2079b648a12,2024-11-21T01:28:07.480000 +CVE-2011-2366,0,0,63d98203e16d573422b1e3d8c70011f3871e2067e928d72c008de7da3dd870f6,2024-11-21T01:28:07.667000 +CVE-2011-2367,0,0,7383f4eeda66b5237a795ed37e6faa292da7f572d1147edf1ea1594825bd8208,2024-11-21T01:28:07.883000 +CVE-2011-2368,0,0,c6946b8761f56de62b310bc81bbb2f216d40e164f4b26b9579a16cada3e6ff92,2024-11-21T01:28:08.037000 +CVE-2011-2369,0,0,4587d0f37d3b738199adb53df1df8553a9a801cfb45bbee491dda91252ba10df,2024-11-21T01:28:08.180000 +CVE-2011-2370,0,0,631e534cb93b9763f9bec0d59e564b227ca42821029025b88503b758515817ae,2024-11-21T01:28:08.330000 +CVE-2011-2371,0,0,1ea1b9096a94ba4585a50e8f3b72094a9816529f7a2121c29ced231b2c5fc097,2024-11-21T01:28:08.503000 +CVE-2011-2372,0,0,efc17001dc32843b70e65ab09e5a7d4e16a2e6968535b1dab859dfbe659eb737,2024-11-21T01:28:08.693000 +CVE-2011-2373,0,0,f9c04ce3774cbcbd0a18fe5eaae41e4a05bf017a7c6ed51e670760aa167b05ad,2024-11-21T01:28:08.880000 +CVE-2011-2374,0,0,30ddf1adf3fa4719b5ff1339b0bed1c425138b8e1cf54d3b95b105082a9269de,2024-11-21T01:28:09.063000 +CVE-2011-2375,0,0,8b7d7879c4f9fad60cbc8c70801a4c2fb4a3f7edabad3ca4d2c373838bc185da,2024-11-21T01:28:09.263000 +CVE-2011-2376,0,0,98c7c8086bf71c01a92e8b8a63cbc4b1db01dbabc8da12d46bd328391eb17a74,2024-11-21T01:28:09.457000 +CVE-2011-2377,0,0,dfeafc8b22d901de15505d001a0b206eede25f358cf6ae17c3ba4b6ce21299ee,2024-11-21T01:28:09.637000 +CVE-2011-2378,0,0,e0aebf59972903ec941a6ba98aa186b7f3909647b1ce0ebd6c448312a22a0c59,2024-11-21T01:28:09.820000 +CVE-2011-2379,0,0,3c7c191cccd1f39ba81c4371aca11f772d6b8531e2008c760524eef281561d8a,2024-11-21T01:28:10.010000 +CVE-2011-2380,0,0,713e8c3094b266e06b48e6cce680be6ce7a495fc774fcb180eaeb85da6702406,2024-11-21T01:28:10.200000 +CVE-2011-2381,0,0,608f9ad7f4fb61f43647fa30d751ada8587869afbef4375f00d30008a45aa556,2024-11-21T01:28:10.370000 +CVE-2011-2382,0,0,59db3209551c8ba93d0416192a3c833f789463386687145c0547bf06b326b722,2024-11-21T01:28:10.543000 +CVE-2011-2383,0,0,d93815bfe5f2c494e1ef017fe138b9238874bd305b20abcd6b629b2f2203c382,2024-11-21T01:28:10.710000 +CVE-2011-2385,0,0,becd9ee9f31d6592119adb3b8b11650b73ac45f4f69fb486261487f07cde6404,2024-11-21T01:28:10.863000 +CVE-2011-2386,0,0,e456e6e5f0e3c54e5d53e1fd0d5e16092b4f519e3db6936d929ac98ae805fe4f,2024-11-21T01:28:11 CVE-2011-2391,0,0,55c2ae1d019843280e0eed16fa801458ac8e1170eadec71e52622888e91b7db6,2017-08-29T01:29:23.940000 -CVE-2011-2393,0,1,52e1287f806910720734f4d20d0afe844c9de90016c93bc3caf568bc16a5338b,2024-11-21T01:28:11.347000 -CVE-2011-2395,0,1,2126923acbfc89c4c25051de2745f2a242139074f2f7f80e17f45a2a9f778dce,2024-11-21T01:28:11.497000 -CVE-2011-2397,0,1,e73653b9c725f2aedf14c94935e99f88ced50ef048c681cf8e0f8d5fa3f1e048,2024-11-21T01:28:11.780000 -CVE-2011-2398,0,1,443eb537066dd01820683d36aa9ac7db3462730943b895bc145f19e370716b94,2024-11-21T01:28:11.927000 -CVE-2011-2399,0,1,0585c667d96fb3167ab2948aad4ef81eaca5b9f82dd60714126c7e87c78cb6f4,2024-11-21T01:28:12.053000 -CVE-2011-2400,0,1,9361b5e4f3b662c8d93c3445573a8a1778dc5cfd82a63faf72b9b6e16d634a99,2024-11-21T01:28:12.170000 -CVE-2011-2401,0,1,db3caafff5bc22ef33608b21342319ecc81eab59aad4907e4e4708f97911ae36,2024-11-21T01:28:12.280000 -CVE-2011-2402,0,1,184ee9840958a295c0830cd3a3f1c9250354bec8c6d99f6cbedea5d570ff4f7e,2024-11-21T01:28:12.387000 -CVE-2011-2403,0,1,5bdecd4d87763118963e26f80437ed2a1a286128cbfea9371b97846a83ac69af,2024-11-21T01:28:12.497000 -CVE-2011-2404,0,1,315e5dbe0c31109f0767e5cfc6c01a9e9f2e4e5373d17533a4db0b181a476ab5,2024-11-21T01:28:12.647000 -CVE-2011-2405,0,1,e7a487c08d16fb12fe1564838e5701453bfafde8b97d99576b47eb1b3d8b743d,2024-11-21T01:28:12.790000 -CVE-2011-2406,0,1,e1d5388ee6de531254defeb06a0ea6f5ab52da0a6ce7d2a458ea33dbb31f013f,2024-11-21T01:28:12.907000 -CVE-2011-2407,0,1,30d2723c7bd7d747cefb0d3b3d75e835fc26aab9ddd0538ab894e70351f9df86,2024-11-21T01:28:13.020000 -CVE-2011-2408,0,1,53d7a36fb1a6cab069e2a00c46780df36d8589bbc6c8892a602be8bd96d499dd,2024-11-21T01:28:13.130000 -CVE-2011-2409,0,1,8d720fe33c007def1e019e8cfd39f2e40609701cb12477b95c8e518cbf2e3f06,2024-11-21T01:28:13.237000 -CVE-2011-2410,0,1,c6b2ea4b16889928491c1bc0816763fac829582f21ce0616cc50b6458ef7f1ca,2024-11-21T01:28:13.340000 -CVE-2011-2411,0,1,bab3cf2b90bb7b8e2211c63d03831333c88c19127d69485876b0983f1750f009,2024-11-21T01:28:13.437000 -CVE-2011-2412,0,1,46323ccf7ad75ba193291a7f1a5b1f6835f9f8ea82747bd072d4783efb61c926,2024-11-21T01:28:13.550000 -CVE-2011-2414,0,1,bb1eba010aa519fa6a28d2fecbb57173f1593daf7e095ddc4d29402c84d11aed,2024-11-21T01:28:13.653000 -CVE-2011-2415,0,1,9f41b7e48d34a6b853999f9c17cc640fc7111893bd1c5023a0d315c9592f783c,2024-11-21T01:28:13.783000 -CVE-2011-2416,0,1,6f3351488ce18e7945482a724e040a1d88781e041b449c841c5be19296d27f03,2024-11-21T01:28:13.923000 -CVE-2011-2417,0,1,00fe511f84895762cfb7f7d06610736aabf5614d3164a95aa2ea39fef2440983,2024-11-21T01:28:14.070000 +CVE-2011-2393,0,0,52e1287f806910720734f4d20d0afe844c9de90016c93bc3caf568bc16a5338b,2024-11-21T01:28:11.347000 +CVE-2011-2395,0,0,2126923acbfc89c4c25051de2745f2a242139074f2f7f80e17f45a2a9f778dce,2024-11-21T01:28:11.497000 +CVE-2011-2397,0,0,e73653b9c725f2aedf14c94935e99f88ced50ef048c681cf8e0f8d5fa3f1e048,2024-11-21T01:28:11.780000 +CVE-2011-2398,0,0,443eb537066dd01820683d36aa9ac7db3462730943b895bc145f19e370716b94,2024-11-21T01:28:11.927000 +CVE-2011-2399,0,0,0585c667d96fb3167ab2948aad4ef81eaca5b9f82dd60714126c7e87c78cb6f4,2024-11-21T01:28:12.053000 +CVE-2011-2400,0,0,9361b5e4f3b662c8d93c3445573a8a1778dc5cfd82a63faf72b9b6e16d634a99,2024-11-21T01:28:12.170000 +CVE-2011-2401,0,0,db3caafff5bc22ef33608b21342319ecc81eab59aad4907e4e4708f97911ae36,2024-11-21T01:28:12.280000 +CVE-2011-2402,0,0,184ee9840958a295c0830cd3a3f1c9250354bec8c6d99f6cbedea5d570ff4f7e,2024-11-21T01:28:12.387000 +CVE-2011-2403,0,0,5bdecd4d87763118963e26f80437ed2a1a286128cbfea9371b97846a83ac69af,2024-11-21T01:28:12.497000 +CVE-2011-2404,0,0,315e5dbe0c31109f0767e5cfc6c01a9e9f2e4e5373d17533a4db0b181a476ab5,2024-11-21T01:28:12.647000 +CVE-2011-2405,0,0,e7a487c08d16fb12fe1564838e5701453bfafde8b97d99576b47eb1b3d8b743d,2024-11-21T01:28:12.790000 +CVE-2011-2406,0,0,e1d5388ee6de531254defeb06a0ea6f5ab52da0a6ce7d2a458ea33dbb31f013f,2024-11-21T01:28:12.907000 +CVE-2011-2407,0,0,30d2723c7bd7d747cefb0d3b3d75e835fc26aab9ddd0538ab894e70351f9df86,2024-11-21T01:28:13.020000 +CVE-2011-2408,0,0,53d7a36fb1a6cab069e2a00c46780df36d8589bbc6c8892a602be8bd96d499dd,2024-11-21T01:28:13.130000 +CVE-2011-2409,0,0,8d720fe33c007def1e019e8cfd39f2e40609701cb12477b95c8e518cbf2e3f06,2024-11-21T01:28:13.237000 +CVE-2011-2410,0,0,c6b2ea4b16889928491c1bc0816763fac829582f21ce0616cc50b6458ef7f1ca,2024-11-21T01:28:13.340000 +CVE-2011-2411,0,0,bab3cf2b90bb7b8e2211c63d03831333c88c19127d69485876b0983f1750f009,2024-11-21T01:28:13.437000 +CVE-2011-2412,0,0,46323ccf7ad75ba193291a7f1a5b1f6835f9f8ea82747bd072d4783efb61c926,2024-11-21T01:28:13.550000 +CVE-2011-2414,0,0,bb1eba010aa519fa6a28d2fecbb57173f1593daf7e095ddc4d29402c84d11aed,2024-11-21T01:28:13.653000 +CVE-2011-2415,0,0,9f41b7e48d34a6b853999f9c17cc640fc7111893bd1c5023a0d315c9592f783c,2024-11-21T01:28:13.783000 +CVE-2011-2416,0,0,6f3351488ce18e7945482a724e040a1d88781e041b449c841c5be19296d27f03,2024-11-21T01:28:13.923000 +CVE-2011-2417,0,0,00fe511f84895762cfb7f7d06610736aabf5614d3164a95aa2ea39fef2440983,2024-11-21T01:28:14.070000 CVE-2011-2418,0,0,369a6e9754445aab4619467f74762f7a036591f076b764628ef79d6f9f71e8e5,2023-11-07T02:07:41.040000 -CVE-2011-2419,0,1,a0bbded29a9e316a35fa4f93b63d8c5e486c94afda7ab2f5eff92a26abf5aa5b,2024-11-21T01:28:14.223000 -CVE-2011-2420,0,1,e4e47208aba313d318bb3470efda6af16afb98ad4591a5d204e103edde073e36,2024-11-21T01:28:14.330000 -CVE-2011-2421,0,1,3baa5fde3a1290456dfbb5c9d36f2c6606a3f14972904038a0fb0f060093f8c4,2024-11-21T01:28:14.437000 -CVE-2011-2422,0,1,b2218108bbfaeca96b8b8b8c2a349d7b942d6f3db3e2bc211ef8d82d2c7f32dd,2024-11-21T01:28:14.543000 -CVE-2011-2423,0,1,c240123c2ace906f9226511403fe20425a74e341bbac49ec1a89890bda2dd882,2024-11-21T01:28:14.657000 -CVE-2011-2424,0,1,3d8e4766e5a746d3787f42b076723a715fad8c436f1b547ab48b069e480f4c51,2024-11-21T01:28:14.783000 -CVE-2011-2425,0,1,74d60af0958e05bba78a1eae51b731a162056263cf75f73c811f3187223dd3c4,2024-11-21T01:28:14.927000 -CVE-2011-2426,0,1,f1c54fe75402a77f43649de57eb9fb701763d4627733d8b1cb5fce690579324d,2024-11-21T01:28:15.073000 -CVE-2011-2427,0,1,27047d57c3b6b9d549dd89eb561e6913d38da8139747c1d1e6f33a2e83a1d957,2024-11-21T01:28:15.220000 -CVE-2011-2428,0,1,841d0e16a7225c9c0d37e375b1b14f31517c2895487ea0f1ac831af58a56fc77,2024-11-21T01:28:15.353000 -CVE-2011-2429,0,1,b317df651106cd56c589fc7c3bbb3a18cd5b7a51a1c80551aa842850a84e54e0,2024-11-21T01:28:15.490000 -CVE-2011-2430,0,1,8f6b84b0adb0c7e7ad6606209cc156bddce347c345309ec9e547aab2fc0e44ea,2024-11-21T01:28:15.637000 -CVE-2011-2431,0,1,4e6cf5f73e6d7071c649973f9686fcea41e3a13cf84fe7014bd56f1ec8775a90,2024-11-21T01:28:15.780000 -CVE-2011-2432,0,1,95bd10ff9af8ac5052cafdb567297076bab2e347eb5bd2a5b6903bb1cdfe3ad5,2024-11-21T01:28:15.923000 -CVE-2011-2433,0,1,05ce10835e3b846f13fc026e898212990bec1b1ce8b6ef632e9be0360dec2bcf,2024-11-21T01:28:16.053000 -CVE-2011-2434,0,1,4cf23ae724c5d38fa249e6ca05043f48cc388d0d35b13c4b41e2d18ab6b43206,2024-11-21T01:28:16.190000 -CVE-2011-2435,0,1,b47e3c9d0bb26ff31d38afd709805170ddae1a11155cb4960f53aa6dc2466913,2024-11-21T01:28:16.330000 -CVE-2011-2436,0,1,d97104131da6a825c4518e265311d9925ecf1d5ff52aba57d821193e137267fa,2024-11-21T01:28:16.480000 -CVE-2011-2437,0,1,7198ed8a516512dab63ba0375232c3942e7e7d163e97f6285d0e14b1a9e7c2f1,2024-11-21T01:28:16.620000 -CVE-2011-2438,0,1,fe62e4c290fcdafba17167e2143f7757a101131085762160af6c7ed66c2918ca,2024-11-21T01:28:16.753000 -CVE-2011-2439,0,1,bf1a42250a8a1d26b703d62e7d62992d8b1c264c88032218cdc6218676bc7528,2024-11-21T01:28:16.883000 -CVE-2011-2440,0,1,8565a8f52209aad05068528b7e9ee4cf391b1d5ce1df8425e80694d3b7bcc4d4,2024-11-21T01:28:17.010000 -CVE-2011-2441,0,1,9c6b5bb69be6437ceba5166dddd6ae7651e17f687e2da1c10b1c89c0351335a3,2024-11-21T01:28:17.160000 -CVE-2011-2442,0,1,7567c6452059146b8a111f3dcbb4fe27167cc5e718907a578e650ad184bdb421,2024-11-21T01:28:17.290000 -CVE-2011-2443,0,1,16fa10ab5bf68e5be2afc015bf1a7a327349a64ceb8be5ae75db7d0bc66110ef,2024-11-21T01:28:17.430000 -CVE-2011-2444,0,1,76de0064a10e09f6c0d27e50b458f625a1fe10bb0d026f417be4a67e0ff28435,2024-11-21T01:28:17.557000 -CVE-2011-2445,0,1,cdc554479b2e9361dae31531885e116458a95dfdabc85f87f704cb983d223e32,2024-11-21T01:28:17.693000 -CVE-2011-2446,0,1,751be6a6e49e36566f26c6b19a2ed751180470795370cc325e481bcdc8ed1656,2024-11-21T01:28:17.850000 -CVE-2011-2447,0,1,526befb2ec33d1015735547df06281396407aeba2eebb6b8c94bd314dbb7080d,2024-11-21T01:28:18.020000 -CVE-2011-2448,0,1,d322fe76adb41acf848d8861ba80209fb2585848eff2b8a1c07c0a2c81587681,2024-11-21T01:28:18.140000 -CVE-2011-2449,0,1,7a42c65473c28e629583280ea82d18d06da67b68efd259d4591c604eb01a46b4,2024-11-21T01:28:18.267000 -CVE-2011-2450,0,1,bf2841e354262360219bd0e15619c36b428d2261763f46cf722791ccd5f851cf,2024-11-21T01:28:18.390000 -CVE-2011-2451,0,1,5f6a4c2294efdb18e4892ccddc5aa5d2f7ebac9d9010f17b7c3ab33d938e09f9,2024-11-21T01:28:18.520000 -CVE-2011-2452,0,1,7558744a2d34fce1ed9ff233488abd045fda29aba944c13c443766c0a39d3d69,2024-11-21T01:28:18.653000 -CVE-2011-2453,0,1,30125cfe5b2cac669f0103bbb599325cae50d3584a2468d9418e9fcb7304a6b3,2024-11-21T01:28:18.787000 -CVE-2011-2454,0,1,df8a3bb9dd92254dace74bdc216c24da6de770b1ed316e7d462b3f718bff1e7e,2024-11-21T01:28:18.910000 -CVE-2011-2455,0,1,380055f3ffab04a1fd53f7ea3847faba4f164fe196b69c055a6f7f9ddcd044c3,2024-11-21T01:28:19.040000 -CVE-2011-2456,0,1,f0bac248b0be057698cbc20ec1f231ea6fbbabb101b3b334768e37fdb732d439,2024-11-21T01:28:19.163000 -CVE-2011-2457,0,1,77707540ba467cd52867ac5f75aa7eea575369216e3c89d04b1298166c81f6ba,2024-11-21T01:28:19.293000 -CVE-2011-2458,0,1,20f15abec9658aabf775f8a6691b29ca859eed9d60f0288861a3c396b8e86c4b,2024-11-21T01:28:19.433000 -CVE-2011-2459,0,1,24a2c7a1786db602b2a168a2d273e2cc0ae795abe1edf35e791fda949f8133f2,2024-11-21T01:28:19.557000 -CVE-2011-2460,0,1,f767c46c123242038b3d57d7be33be5bb530ce5c21d0a99083371fb06ddd84d0,2024-11-21T01:28:19.687000 -CVE-2011-2461,0,1,963ba1988c2da6bdd411a2b5cc1ee0015399aed83ed7df602521b0d6e25ae78f,2024-11-21T01:28:19.817000 -CVE-2011-2462,0,1,a783fe478f6e0a5ac44df8251f12f6e3f19e510c767cef829e4e9bc5db68467e,2024-11-21T01:28:19.950000 -CVE-2011-2463,0,1,0f77a2e3c4122b7509092eb5335c72843973f9b30ba44b656bd016be01257ad1,2024-11-21T01:28:20.073000 -CVE-2011-2464,0,1,53226ec7e35403a480ae61ebbe494eda3a84a7b9974afb50cde6d93f4ac35493,2024-11-21T01:28:20.183000 -CVE-2011-2465,0,1,e322c731840952349fe2603a68cb3007baf1245e298ea799f9a75f1a16fec147,2024-11-21T01:28:20.380000 -CVE-2011-2467,0,1,b434c350fe42093fe1a0915be9d79d0329cecf4e754d6677379b7c4bbac11998,2024-11-21T01:28:20.537000 -CVE-2011-2468,0,1,1fa58bd23b5a9da4160cc56b3a71f02fb65b20337c4fa7a7375682064152463b,2024-11-21T01:28:20.690000 -CVE-2011-2470,0,1,72a87cb218c87b2235bea6cc983b9d181aa4eca4a8d6d79cde7de6529724cf91,2024-11-21T01:28:20.833000 -CVE-2011-2471,0,1,1b9049f5c4dc80590b553686dc47cc8797d999aacea3f42b196c4f8c60de6ed7,2024-11-21T01:28:20.983000 -CVE-2011-2472,0,1,98ff5aab379501b40b6a0c657a556e1cf1620ce54c345451b018374ef01f554e,2024-11-21T01:28:21.160000 -CVE-2011-2473,0,1,147db502d47a2c317ac104bb6c595013ad22ca0dc77b9a49456b90989d4bf8fd,2024-11-21T01:28:21.327000 -CVE-2011-2474,0,1,6c5eb43cc07104523f781d5ff7dec6647a1b38f8753251fbf86c6a2adcc3ea33,2024-11-21T01:28:21.490000 -CVE-2011-2475,0,1,efe65a2506eca3e6a9f47ba96ab74ce600d45aed04dadac7e8a7d2ae4a9622db,2024-11-21T01:28:21.620000 -CVE-2011-2476,0,1,30a5da7f6fa11e1568d7a939370cd2dbc3725d211e0abb9156e6e7d85c4ce2e8,2024-11-21T01:28:21.770000 -CVE-2011-2477,0,1,dff692496713865e47e2bc144bde7852b36116c74683658deebe3d64450852ef,2024-11-21T01:28:21.923000 +CVE-2011-2419,0,0,a0bbded29a9e316a35fa4f93b63d8c5e486c94afda7ab2f5eff92a26abf5aa5b,2024-11-21T01:28:14.223000 +CVE-2011-2420,0,0,e4e47208aba313d318bb3470efda6af16afb98ad4591a5d204e103edde073e36,2024-11-21T01:28:14.330000 +CVE-2011-2421,0,0,3baa5fde3a1290456dfbb5c9d36f2c6606a3f14972904038a0fb0f060093f8c4,2024-11-21T01:28:14.437000 +CVE-2011-2422,0,0,b2218108bbfaeca96b8b8b8c2a349d7b942d6f3db3e2bc211ef8d82d2c7f32dd,2024-11-21T01:28:14.543000 +CVE-2011-2423,0,0,c240123c2ace906f9226511403fe20425a74e341bbac49ec1a89890bda2dd882,2024-11-21T01:28:14.657000 +CVE-2011-2424,0,0,3d8e4766e5a746d3787f42b076723a715fad8c436f1b547ab48b069e480f4c51,2024-11-21T01:28:14.783000 +CVE-2011-2425,0,0,74d60af0958e05bba78a1eae51b731a162056263cf75f73c811f3187223dd3c4,2024-11-21T01:28:14.927000 +CVE-2011-2426,0,0,f1c54fe75402a77f43649de57eb9fb701763d4627733d8b1cb5fce690579324d,2024-11-21T01:28:15.073000 +CVE-2011-2427,0,0,27047d57c3b6b9d549dd89eb561e6913d38da8139747c1d1e6f33a2e83a1d957,2024-11-21T01:28:15.220000 +CVE-2011-2428,0,0,841d0e16a7225c9c0d37e375b1b14f31517c2895487ea0f1ac831af58a56fc77,2024-11-21T01:28:15.353000 +CVE-2011-2429,0,0,b317df651106cd56c589fc7c3bbb3a18cd5b7a51a1c80551aa842850a84e54e0,2024-11-21T01:28:15.490000 +CVE-2011-2430,0,0,8f6b84b0adb0c7e7ad6606209cc156bddce347c345309ec9e547aab2fc0e44ea,2024-11-21T01:28:15.637000 +CVE-2011-2431,0,0,4e6cf5f73e6d7071c649973f9686fcea41e3a13cf84fe7014bd56f1ec8775a90,2024-11-21T01:28:15.780000 +CVE-2011-2432,0,0,95bd10ff9af8ac5052cafdb567297076bab2e347eb5bd2a5b6903bb1cdfe3ad5,2024-11-21T01:28:15.923000 +CVE-2011-2433,0,0,05ce10835e3b846f13fc026e898212990bec1b1ce8b6ef632e9be0360dec2bcf,2024-11-21T01:28:16.053000 +CVE-2011-2434,0,0,4cf23ae724c5d38fa249e6ca05043f48cc388d0d35b13c4b41e2d18ab6b43206,2024-11-21T01:28:16.190000 +CVE-2011-2435,0,0,b47e3c9d0bb26ff31d38afd709805170ddae1a11155cb4960f53aa6dc2466913,2024-11-21T01:28:16.330000 +CVE-2011-2436,0,0,d97104131da6a825c4518e265311d9925ecf1d5ff52aba57d821193e137267fa,2024-11-21T01:28:16.480000 +CVE-2011-2437,0,0,7198ed8a516512dab63ba0375232c3942e7e7d163e97f6285d0e14b1a9e7c2f1,2024-11-21T01:28:16.620000 +CVE-2011-2438,0,0,fe62e4c290fcdafba17167e2143f7757a101131085762160af6c7ed66c2918ca,2024-11-21T01:28:16.753000 +CVE-2011-2439,0,0,bf1a42250a8a1d26b703d62e7d62992d8b1c264c88032218cdc6218676bc7528,2024-11-21T01:28:16.883000 +CVE-2011-2440,0,0,8565a8f52209aad05068528b7e9ee4cf391b1d5ce1df8425e80694d3b7bcc4d4,2024-11-21T01:28:17.010000 +CVE-2011-2441,0,0,9c6b5bb69be6437ceba5166dddd6ae7651e17f687e2da1c10b1c89c0351335a3,2024-11-21T01:28:17.160000 +CVE-2011-2442,0,0,7567c6452059146b8a111f3dcbb4fe27167cc5e718907a578e650ad184bdb421,2024-11-21T01:28:17.290000 +CVE-2011-2443,0,0,16fa10ab5bf68e5be2afc015bf1a7a327349a64ceb8be5ae75db7d0bc66110ef,2024-11-21T01:28:17.430000 +CVE-2011-2444,0,0,76de0064a10e09f6c0d27e50b458f625a1fe10bb0d026f417be4a67e0ff28435,2024-11-21T01:28:17.557000 +CVE-2011-2445,0,0,cdc554479b2e9361dae31531885e116458a95dfdabc85f87f704cb983d223e32,2024-11-21T01:28:17.693000 +CVE-2011-2446,0,0,751be6a6e49e36566f26c6b19a2ed751180470795370cc325e481bcdc8ed1656,2024-11-21T01:28:17.850000 +CVE-2011-2447,0,0,526befb2ec33d1015735547df06281396407aeba2eebb6b8c94bd314dbb7080d,2024-11-21T01:28:18.020000 +CVE-2011-2448,0,0,d322fe76adb41acf848d8861ba80209fb2585848eff2b8a1c07c0a2c81587681,2024-11-21T01:28:18.140000 +CVE-2011-2449,0,0,7a42c65473c28e629583280ea82d18d06da67b68efd259d4591c604eb01a46b4,2024-11-21T01:28:18.267000 +CVE-2011-2450,0,0,bf2841e354262360219bd0e15619c36b428d2261763f46cf722791ccd5f851cf,2024-11-21T01:28:18.390000 +CVE-2011-2451,0,0,5f6a4c2294efdb18e4892ccddc5aa5d2f7ebac9d9010f17b7c3ab33d938e09f9,2024-11-21T01:28:18.520000 +CVE-2011-2452,0,0,7558744a2d34fce1ed9ff233488abd045fda29aba944c13c443766c0a39d3d69,2024-11-21T01:28:18.653000 +CVE-2011-2453,0,0,30125cfe5b2cac669f0103bbb599325cae50d3584a2468d9418e9fcb7304a6b3,2024-11-21T01:28:18.787000 +CVE-2011-2454,0,0,df8a3bb9dd92254dace74bdc216c24da6de770b1ed316e7d462b3f718bff1e7e,2024-11-21T01:28:18.910000 +CVE-2011-2455,0,0,380055f3ffab04a1fd53f7ea3847faba4f164fe196b69c055a6f7f9ddcd044c3,2024-11-21T01:28:19.040000 +CVE-2011-2456,0,0,f0bac248b0be057698cbc20ec1f231ea6fbbabb101b3b334768e37fdb732d439,2024-11-21T01:28:19.163000 +CVE-2011-2457,0,0,77707540ba467cd52867ac5f75aa7eea575369216e3c89d04b1298166c81f6ba,2024-11-21T01:28:19.293000 +CVE-2011-2458,0,0,20f15abec9658aabf775f8a6691b29ca859eed9d60f0288861a3c396b8e86c4b,2024-11-21T01:28:19.433000 +CVE-2011-2459,0,0,24a2c7a1786db602b2a168a2d273e2cc0ae795abe1edf35e791fda949f8133f2,2024-11-21T01:28:19.557000 +CVE-2011-2460,0,0,f767c46c123242038b3d57d7be33be5bb530ce5c21d0a99083371fb06ddd84d0,2024-11-21T01:28:19.687000 +CVE-2011-2461,0,0,963ba1988c2da6bdd411a2b5cc1ee0015399aed83ed7df602521b0d6e25ae78f,2024-11-21T01:28:19.817000 +CVE-2011-2462,0,0,a783fe478f6e0a5ac44df8251f12f6e3f19e510c767cef829e4e9bc5db68467e,2024-11-21T01:28:19.950000 +CVE-2011-2463,0,0,0f77a2e3c4122b7509092eb5335c72843973f9b30ba44b656bd016be01257ad1,2024-11-21T01:28:20.073000 +CVE-2011-2464,0,0,53226ec7e35403a480ae61ebbe494eda3a84a7b9974afb50cde6d93f4ac35493,2024-11-21T01:28:20.183000 +CVE-2011-2465,0,0,e322c731840952349fe2603a68cb3007baf1245e298ea799f9a75f1a16fec147,2024-11-21T01:28:20.380000 +CVE-2011-2467,0,0,b434c350fe42093fe1a0915be9d79d0329cecf4e754d6677379b7c4bbac11998,2024-11-21T01:28:20.537000 +CVE-2011-2468,0,0,1fa58bd23b5a9da4160cc56b3a71f02fb65b20337c4fa7a7375682064152463b,2024-11-21T01:28:20.690000 +CVE-2011-2470,0,0,72a87cb218c87b2235bea6cc983b9d181aa4eca4a8d6d79cde7de6529724cf91,2024-11-21T01:28:20.833000 +CVE-2011-2471,0,0,1b9049f5c4dc80590b553686dc47cc8797d999aacea3f42b196c4f8c60de6ed7,2024-11-21T01:28:20.983000 +CVE-2011-2472,0,0,98ff5aab379501b40b6a0c657a556e1cf1620ce54c345451b018374ef01f554e,2024-11-21T01:28:21.160000 +CVE-2011-2473,0,0,147db502d47a2c317ac104bb6c595013ad22ca0dc77b9a49456b90989d4bf8fd,2024-11-21T01:28:21.327000 +CVE-2011-2474,0,0,6c5eb43cc07104523f781d5ff7dec6647a1b38f8753251fbf86c6a2adcc3ea33,2024-11-21T01:28:21.490000 +CVE-2011-2475,0,0,efe65a2506eca3e6a9f47ba96ab74ce600d45aed04dadac7e8a7d2ae4a9622db,2024-11-21T01:28:21.620000 +CVE-2011-2476,0,0,30a5da7f6fa11e1568d7a939370cd2dbc3725d211e0abb9156e6e7d85c4ce2e8,2024-11-21T01:28:21.770000 +CVE-2011-2477,0,0,dff692496713865e47e2bc144bde7852b36116c74683658deebe3d64450852ef,2024-11-21T01:28:21.923000 CVE-2011-2478,0,0,18c2d09a59964e1098b5c7835207e95fb38a8ea2c0b6934e41f8a5c61d32bea8,2012-04-18T04:00:00 CVE-2011-2479,0,0,81c9bdbf61c6c6ffe242ce9c7c952b2a3fb1ad960ecd51f4bae1b438b9b845cd,2023-02-13T04:31:05.227000 CVE-2011-2480,0,0,d20e0005c718e6e5ce37f181eb00d0b11da01b376590cd22fe4f47f9ee593122,2019-12-10T18:31:42.187000 -CVE-2011-2481,0,1,e05ea04a82f3f3bc37420c541d51226b110533a6fd51e351e4677d5e21907c65,2024-11-21T01:28:22.430000 +CVE-2011-2481,0,0,e05ea04a82f3f3bc37420c541d51226b110533a6fd51e351e4677d5e21907c65,2024-11-21T01:28:22.430000 CVE-2011-2482,0,0,1537682eb4aec3b2789fab43423136b3daaaf4aabc8c10e58ad508f469defae9,2023-02-13T01:19:46.610000 -CVE-2011-2483,0,1,b33606aab272833521924aa4910ef3ca030be547b79961287c3ad6a53837b4f3,2024-11-21T01:28:22.650000 -CVE-2011-2484,0,1,86c02abb7134e5102ad30e21bb08d63281878d723d41f3e737b1d4a381868d8f,2024-11-21T01:28:22.793000 +CVE-2011-2483,0,0,b33606aab272833521924aa4910ef3ca030be547b79961287c3ad6a53837b4f3,2024-11-21T01:28:22.650000 +CVE-2011-2484,0,0,86c02abb7134e5102ad30e21bb08d63281878d723d41f3e737b1d4a381868d8f,2024-11-21T01:28:22.793000 CVE-2011-2485,0,0,05d4a35eb9ee38bded362effb3466d72a4416c0d94bc8da3f7d08be06b89fa52,2012-07-03T16:40:29.677000 CVE-2011-2486,0,0,87fc16332fdfa04bde77862057ecee77bcf883693eb1177880d0b4d876a5fa95,2013-09-01T06:24:51.890000 CVE-2011-2487,0,0,1779984cd12adef49ed7299792886da44df536bb98efaaba422880519e6e4fba,2023-02-13T01:19:48.670000 -CVE-2011-2488,0,1,0c866812cb7b5c5aa1ab48d6937c98761eab1c453b005dd3687de97027bfae66,2024-11-21T01:28:23.307000 -CVE-2011-2489,0,1,1823af97475b4278c0451030968bc8d67cc66df6c8fb7af6bb0c7f96c9323f6b,2024-11-21T01:28:23.417000 -CVE-2011-2490,0,1,b1cf4a95eb2cfade73e14e12994c90a9fbef3575c98c170dd7b7b8008e7ca50c,2024-11-21T01:28:23.530000 +CVE-2011-2488,0,0,0c866812cb7b5c5aa1ab48d6937c98761eab1c453b005dd3687de97027bfae66,2024-11-21T01:28:23.307000 +CVE-2011-2489,0,0,1823af97475b4278c0451030968bc8d67cc66df6c8fb7af6bb0c7f96c9323f6b,2024-11-21T01:28:23.417000 +CVE-2011-2490,0,0,b1cf4a95eb2cfade73e14e12994c90a9fbef3575c98c170dd7b7b8008e7ca50c,2024-11-21T01:28:23.530000 CVE-2011-2491,0,0,fb78669d9fe07cbd879d76263e4ee6dc82a5541dfdf186edfe88609f0116356d,2023-02-13T04:31:05.793000 -CVE-2011-2492,0,1,c16572878b5dbaba11f00d347e26419b947e722c972a0f76be68ca307d5351a8,2024-11-21T01:28:23.757000 +CVE-2011-2492,0,0,c16572878b5dbaba11f00d347e26419b947e722c972a0f76be68ca307d5351a8,2024-11-21T01:28:23.757000 CVE-2011-2493,0,0,56fd1f5b3da4f3534bb459cae79437340332436b55964ed15a9ec8604274b961,2023-02-13T01:19:54.173000 CVE-2011-2494,0,0,f602d4dc779c8f41cdef42c7910cb42b80c62bd1587a41533344caca7fbeb6d5,2023-02-13T00:18:02.510000 CVE-2011-2495,0,0,dc3ad702287447480ea88a260bf560202890e55c2142cf35ebfbf6942fd420f8,2023-02-13T00:18:23.983000 CVE-2011-2496,0,0,57270daddcdd07c713396c7d9489620cf2970dd6b97f68049d1d4ffc8ecb8a7c,2023-02-13T01:19:54.693000 -CVE-2011-2497,0,1,8211c62d40caf1aec6a05403ca757681f3bad1deac2aead7ed5af5075496a87c,2024-11-21T01:28:24.323000 +CVE-2011-2497,0,0,8211c62d40caf1aec6a05403ca757681f3bad1deac2aead7ed5af5075496a87c,2024-11-21T01:28:24.323000 CVE-2011-2498,0,0,9f5260f95be63f510f1c9dd636ed8abbf9f58d4803d8b1926c145cbdae3af82b,2020-02-25T15:53:45.977000 CVE-2011-2499,0,0,6a12dee28ed2b7baedd7ef199c4f7905cf0e8e930b2184bf437e614132cf558c,2020-02-24T21:46:42.270000 CVE-2011-2500,0,0,213a83f563038e95f4a4173fa2f74777eb955a239fe99336726226beeb16366f,2014-03-06T04:30:41.567000 -CVE-2011-2501,0,1,cce517bcd4f3172fac05ea2dda11eb144b07c99eb9bea88453f9d6e945d9067e,2024-11-21T01:28:24.767000 +CVE-2011-2501,0,0,cce517bcd4f3172fac05ea2dda11eb144b07c99eb9bea88453f9d6e945d9067e,2024-11-21T01:28:24.767000 CVE-2011-2502,0,0,c43da980b94bb743ec062ea836a533e0852c69abe228caeacf1a1d9e29a6ab4d,2023-11-07T02:07:42.190000 CVE-2011-2503,0,0,c9cc9c5a8bdf22b9bffd98ec2312a76c4a3ffa505dc26d627eaa66088ddb1089,2023-11-07T02:07:42.280000 CVE-2011-2504,0,0,7fe7050e39108d63f5aa85ebe4ccf6cf7275542492eab9b84c71ae2e00f46885,2023-02-13T00:18:50.897000 -CVE-2011-2505,0,1,6fc80428831533a38e963317837b8ef11074ecd6f48acc677e125299111e4d00,2024-11-21T01:28:25.250000 -CVE-2011-2506,0,1,2e393682be337bb7d761df71d94ffa9a524bb23c565f98b261c74ca41dca9d05,2024-11-21T01:28:25.397000 -CVE-2011-2507,0,1,e581c7c95e2504fb543a2dbeba83bdfbe7b48bad14f850017dbb36439d4972cc,2024-11-21T01:28:25.547000 -CVE-2011-2508,0,1,f3d37f53d60c686446ab6ac2228b8bd79f632635a54ae438d62ae52283945445,2024-11-21T01:28:25.690000 -CVE-2011-2509,0,1,0b269fabfe278e36a9cb1d5248c95e5bf598337c18c416b5f9e8f489041182f2,2024-11-21T01:28:25.820000 -CVE-2011-2510,0,1,6c837ac99b40e357df310bf9cfd7c535d69a2da99a27195e5f0687ca6942d0bd,2024-11-21T01:28:25.947000 -CVE-2011-2511,0,1,0740ca0553ee04dd6bd307b81be48e2956598066b33d9162a27891f5d047b406,2024-11-21T01:28:26.073000 +CVE-2011-2505,0,0,6fc80428831533a38e963317837b8ef11074ecd6f48acc677e125299111e4d00,2024-11-21T01:28:25.250000 +CVE-2011-2506,0,0,2e393682be337bb7d761df71d94ffa9a524bb23c565f98b261c74ca41dca9d05,2024-11-21T01:28:25.397000 +CVE-2011-2507,0,0,e581c7c95e2504fb543a2dbeba83bdfbe7b48bad14f850017dbb36439d4972cc,2024-11-21T01:28:25.547000 +CVE-2011-2508,0,0,f3d37f53d60c686446ab6ac2228b8bd79f632635a54ae438d62ae52283945445,2024-11-21T01:28:25.690000 +CVE-2011-2509,0,0,0b269fabfe278e36a9cb1d5248c95e5bf598337c18c416b5f9e8f489041182f2,2024-11-21T01:28:25.820000 +CVE-2011-2510,0,0,6c837ac99b40e357df310bf9cfd7c535d69a2da99a27195e5f0687ca6942d0bd,2024-11-21T01:28:25.947000 +CVE-2011-2511,0,0,0740ca0553ee04dd6bd307b81be48e2956598066b33d9162a27891f5d047b406,2024-11-21T01:28:26.073000 CVE-2011-2512,0,0,611cccd3fe968b02f24f852c53fb6ec01b18d6354c4c2e4381950bfe051ed0fc,2023-02-13T01:19:55.947000 CVE-2011-2513,0,0,009b3ce47a01de21384cb147a285c591bf5b9c58a37a9254f81450e3c2e9fc1b,2014-06-25T18:09:28.433000 CVE-2011-2514,0,0,d6ea96c72053cdaa30cc9e9628f21cab22d26d7c6daad5bd6ad42d0c0774b009,2014-06-25T18:10:18.637000 CVE-2011-2515,0,0,6e7f36c07e2fc26a856dca1e9b7fe81995993bb0c31bca8e9790ee0a97c9b807,2020-08-18T15:05:57.813000 -CVE-2011-2516,0,1,d31867f5c51b772a3e2cd38e91c6db9302e22693c7ce20be30c2d8f593dbf3d7,2024-11-21T01:28:26.680000 +CVE-2011-2516,0,0,d31867f5c51b772a3e2cd38e91c6db9302e22693c7ce20be30c2d8f593dbf3d7,2024-11-21T01:28:26.680000 CVE-2011-2517,0,0,944d65b9a3f08ed78fe5194f27aa51277cff190cd4bc23f19429c9fea3861383,2023-02-13T01:20:00.140000 CVE-2011-2518,0,0,1364c2d4f26eae7eda9e5237d6b2b00a2da9867c1f19b28d2d0d8b4c6aee8e17,2023-02-13T04:31:06.953000 CVE-2011-2519,0,0,4ded70eacfbf6c6303fd104018764cb31671755664500440e5e10e5cf38c79f5,2020-12-08T15:25:29.097000 -CVE-2011-2520,0,1,b92af6486eec9c402edd63bcc3880d00be82242bfcac6788b4d2cf4dbb6abbcb,2024-11-21T01:28:27.153000 +CVE-2011-2520,0,0,b92af6486eec9c402edd63bcc3880d00be82242bfcac6788b4d2cf4dbb6abbcb,2024-11-21T01:28:27.153000 CVE-2011-2521,0,0,2b7d268624e4d90cdf8ba15452da4adb269f7653c11f0dcf7c7317f924f53b8d,2023-02-13T04:31:08.237000 -CVE-2011-2522,0,1,6839bbb22d5b8cc67807c92a26988b4d803b5f8eebcdcd89d468f6d35cbf0e2d,2024-11-21T01:28:27.390000 +CVE-2011-2522,0,0,6839bbb22d5b8cc67807c92a26988b4d803b5f8eebcdcd89d468f6d35cbf0e2d,2024-11-21T01:28:27.390000 CVE-2011-2523,0,0,55a2ecc0e79bd6578c64b6c9219087455702f73bf7bd825fa06ea1447a6faf49,2021-04-12T19:15:13.113000 -CVE-2011-2524,0,1,81d30a6069f2f9954662eeb343beb0984add7f065cd87374bf1600a116ef53ec,2024-11-21T01:28:27.667000 -CVE-2011-2525,0,1,61f866163509d43fe92439466eeae5b1b485d9902ae4092d9edd6832608babeb,2024-11-21T01:28:27.797000 -CVE-2011-2526,0,1,f11c90165f4bded0a5dc65f1bb1314c9ac5eb1ffc4393e50deabab0ff33eaf8a,2024-11-21T01:28:27.920000 +CVE-2011-2524,0,0,81d30a6069f2f9954662eeb343beb0984add7f065cd87374bf1600a116ef53ec,2024-11-21T01:28:27.667000 +CVE-2011-2525,0,0,61f866163509d43fe92439466eeae5b1b485d9902ae4092d9edd6832608babeb,2024-11-21T01:28:27.797000 +CVE-2011-2526,0,0,f11c90165f4bded0a5dc65f1bb1314c9ac5eb1ffc4393e50deabab0ff33eaf8a,2024-11-21T01:28:27.920000 CVE-2011-2527,0,0,7e0cdd2aee71e2cb9c8d3a94ccb929a58b3cef937a164cd7fa9ece6b21966f84,2020-11-02T14:39:17.710000 -CVE-2011-2528,0,1,e3f61608efba13ac40a2df8cfddec3daa4dc0120d04772c3bf07813a2292fe9a,2024-11-21T01:28:28.233000 -CVE-2011-2529,0,1,88ab97e2b72ce894e8fb23bab4acc027bc3987ad8359f1ef704e3b0f8e938303,2024-11-21T01:28:28.417000 -CVE-2011-2530,0,1,e5fe204d45c77024a6b73cf2bf241184ca050641f05ee9bb19e3afb834868b12,2024-11-21T01:28:28.607000 -CVE-2011-2531,0,1,ea9a335a8dfc427171b6b34438d6bfe9ceac517d3bcacd6dffb66b83463bff71,2024-11-21T01:28:28.753000 -CVE-2011-2532,0,1,292f1eba849aae00fdfd281ec2170c3735d0c0e4e7524964171a52ea50cc5ff1,2024-11-21T01:28:28.890000 -CVE-2011-2533,0,1,dd8f2b564d0c5048c624344739b7e2602179a971a5af6ad6c3e301f0f086c15f,2024-11-21T01:28:29.030000 -CVE-2011-2534,0,1,06200581f2e60884039f74f116433942b0cd8d682888f102b5d25351de6f04aa,2024-11-21T01:28:29.173000 -CVE-2011-2535,0,1,c16926c14940d4d890b21377aa60b65dbf835501223806436496d28a275eb3ec,2024-11-21T01:28:29.320000 -CVE-2011-2536,0,1,1eb6f92149dc6c74b0822538ee4945c40fd8185d5fafcfd7061c33b2da367e4c,2024-11-21T01:28:29.493000 +CVE-2011-2528,0,0,e3f61608efba13ac40a2df8cfddec3daa4dc0120d04772c3bf07813a2292fe9a,2024-11-21T01:28:28.233000 +CVE-2011-2529,0,0,88ab97e2b72ce894e8fb23bab4acc027bc3987ad8359f1ef704e3b0f8e938303,2024-11-21T01:28:28.417000 +CVE-2011-2530,0,0,e5fe204d45c77024a6b73cf2bf241184ca050641f05ee9bb19e3afb834868b12,2024-11-21T01:28:28.607000 +CVE-2011-2531,0,0,ea9a335a8dfc427171b6b34438d6bfe9ceac517d3bcacd6dffb66b83463bff71,2024-11-21T01:28:28.753000 +CVE-2011-2532,0,0,292f1eba849aae00fdfd281ec2170c3735d0c0e4e7524964171a52ea50cc5ff1,2024-11-21T01:28:28.890000 +CVE-2011-2533,0,0,dd8f2b564d0c5048c624344739b7e2602179a971a5af6ad6c3e301f0f086c15f,2024-11-21T01:28:29.030000 +CVE-2011-2534,0,0,06200581f2e60884039f74f116433942b0cd8d682888f102b5d25351de6f04aa,2024-11-21T01:28:29.173000 +CVE-2011-2535,0,0,c16926c14940d4d890b21377aa60b65dbf835501223806436496d28a275eb3ec,2024-11-21T01:28:29.320000 +CVE-2011-2536,0,0,1eb6f92149dc6c74b0822538ee4945c40fd8185d5fafcfd7061c33b2da367e4c,2024-11-21T01:28:29.493000 CVE-2011-2538,0,0,be780000c5b64d7a78668976c952291f6b689bc66aa6872c27abce4989613906,2019-11-01T18:17:00.120000 -CVE-2011-2543,0,1,66a0400e5abf9542dbe5d2faffc1178ce933203fb2f8f0ca707c78449431898c,2024-11-21T01:28:29.757000 -CVE-2011-2544,0,1,1d3b258621453cfd30ea3a7ad6909fe6c903351fcffa5a1dedbcaa674871e987,2024-11-21T01:28:29.873000 +CVE-2011-2543,0,0,66a0400e5abf9542dbe5d2faffc1178ce933203fb2f8f0ca707c78449431898c,2024-11-21T01:28:29.757000 +CVE-2011-2544,0,0,1d3b258621453cfd30ea3a7ad6909fe6c903351fcffa5a1dedbcaa674871e987,2024-11-21T01:28:29.873000 CVE-2011-2545,0,0,69d2508cadde21e3a0e87d6302b19703869aedca37b79534ece4a7042be36cec,2012-06-14T04:00:00 -CVE-2011-2546,0,1,ee1dc00890bee5ff8d03ca2362e9c741bd0d0e6cb20b59501ebcfe5a275561cb,2024-11-21T01:28:30.090000 -CVE-2011-2547,0,1,e777b5d47fa8069790307078b73f23cef0d4dcd0decd7bedbafca8ab0f39a56e,2024-11-21T01:28:30.200000 -CVE-2011-2549,0,1,7fd678c5a7faf31ba64f18506c15bb5f32ff799af7d591ea5fa4631defd6e719,2024-11-21T01:28:30.317000 -CVE-2011-2555,0,1,b476610ce444ee1c9dd4cccc41dba64593db2aeb0e768903f0963e9787965aa9,2024-11-21T01:28:30.437000 -CVE-2011-2560,0,1,ffe9dad6fe568ade76905e5cb6a32a8b2b1eb01924763b0c9bff5a17a603c989,2024-11-21T01:28:30.540000 -CVE-2011-2561,0,1,64e8278e0f6125b90aae1bf1206daefc74248796382b0fd4d5ebc9a782381376,2024-11-21T01:28:30.667000 -CVE-2011-2562,0,1,a7bc416ed667796b1c638f0796f36fa3c8246f22f87ddee0fa557317be28d7bb,2024-11-21T01:28:30.817000 -CVE-2011-2563,0,1,1297094bf4fea2fff18dd9cfe7438bd487ad871356afb0cada9f644bb4c16845,2024-11-21T01:28:30.933000 -CVE-2011-2564,0,1,200673a0558b1fe189d52099980deeba3c0b0dba30b4523c1af9e13397bc23ef,2024-11-21T01:28:31.043000 -CVE-2011-2569,0,1,bf2473fd18aa57e89fce68f5099317b176d017212fd4e3b85eeaacb7dda73241,2024-11-21T01:28:31.170000 -CVE-2011-2577,0,1,5caf20062bc054f85d2441bee69cab0707fb8768d757a66e9d9617721c761a80,2024-11-21T01:28:31.283000 +CVE-2011-2546,0,0,ee1dc00890bee5ff8d03ca2362e9c741bd0d0e6cb20b59501ebcfe5a275561cb,2024-11-21T01:28:30.090000 +CVE-2011-2547,0,0,e777b5d47fa8069790307078b73f23cef0d4dcd0decd7bedbafca8ab0f39a56e,2024-11-21T01:28:30.200000 +CVE-2011-2549,0,0,7fd678c5a7faf31ba64f18506c15bb5f32ff799af7d591ea5fa4631defd6e719,2024-11-21T01:28:30.317000 +CVE-2011-2555,0,0,b476610ce444ee1c9dd4cccc41dba64593db2aeb0e768903f0963e9787965aa9,2024-11-21T01:28:30.437000 +CVE-2011-2560,0,0,ffe9dad6fe568ade76905e5cb6a32a8b2b1eb01924763b0c9bff5a17a603c989,2024-11-21T01:28:30.540000 +CVE-2011-2561,0,0,64e8278e0f6125b90aae1bf1206daefc74248796382b0fd4d5ebc9a782381376,2024-11-21T01:28:30.667000 +CVE-2011-2562,0,0,a7bc416ed667796b1c638f0796f36fa3c8246f22f87ddee0fa557317be28d7bb,2024-11-21T01:28:30.817000 +CVE-2011-2563,0,0,1297094bf4fea2fff18dd9cfe7438bd487ad871356afb0cada9f644bb4c16845,2024-11-21T01:28:30.933000 +CVE-2011-2564,0,0,200673a0558b1fe189d52099980deeba3c0b0dba30b4523c1af9e13397bc23ef,2024-11-21T01:28:31.043000 +CVE-2011-2569,0,0,bf2473fd18aa57e89fce68f5099317b176d017212fd4e3b85eeaacb7dda73241,2024-11-21T01:28:31.170000 +CVE-2011-2577,0,0,5caf20062bc054f85d2441bee69cab0707fb8768d757a66e9d9617721c761a80,2024-11-21T01:28:31.283000 CVE-2011-2578,0,0,64e77273d340f6a6d3ad68afef2175cf432ff76b4bbaa9ddb8ed14b06e3ca4bb,2017-12-14T02:29:00.247000 -CVE-2011-2581,0,1,d73a2723765f74b8525677f7fdcbbd733197f019a68edb8f576244eff2c236a6,2024-11-21T01:28:31.550000 +CVE-2011-2581,0,0,d73a2723765f74b8525677f7fdcbbd733197f019a68edb8f576244eff2c236a6,2024-11-21T01:28:31.550000 CVE-2011-2583,0,0,353b46ee26a53ec9a34be0c38854367e394e1acbcf751067ce7ccc430b8d0a3b,2017-12-14T02:29:00.307000 -CVE-2011-2584,0,1,a587a8edff19760c2552720870d2cdd46493d20bd4a3060cc60dba6687e3a9f7,2024-11-21T01:28:31.787000 -CVE-2011-2585,0,1,18ad9a1bf10adcf4e9898ea587f3b9a74375053902f6eef29c879a55cc2bb32a,2024-11-21T01:28:31.900000 +CVE-2011-2584,0,0,a587a8edff19760c2552720870d2cdd46493d20bd4a3060cc60dba6687e3a9f7,2024-11-21T01:28:31.787000 +CVE-2011-2585,0,0,18ad9a1bf10adcf4e9898ea587f3b9a74375053902f6eef29c879a55cc2bb32a,2024-11-21T01:28:31.900000 CVE-2011-2586,0,0,5f70a0f0c4bd4059e49f857ee0f673760a40f186229550738903ad745bddb876,2012-10-30T03:54:33.830000 -CVE-2011-2587,0,1,3007a86cf5b9babc8f6ce0aac8d03aa78e6bc7512dc1d70fe4c62f1304af30b0,2024-11-21T01:28:32.107000 -CVE-2011-2588,0,1,9c6cf6b47f4105ee4ba917b6ac165d473e55dfa3933f46826915263bd7bb75a8,2024-11-21T01:28:32.240000 -CVE-2011-2589,0,1,963a8694523af0bf587887049142533d7eb6fb7ebb34857642261be92cf9b525,2024-11-21T01:28:32.373000 -CVE-2011-2590,0,1,f06f471226d4302cde23dfa9ab64daf9e746ebc2de592e6dab229e5be8b21432,2024-11-21T01:28:32.493000 -CVE-2011-2591,0,1,e06d072aa27e0ebfc099a92ee079c4fcf27c0f48296cdbff3774783b15030b1b,2024-11-21T01:28:32.617000 +CVE-2011-2587,0,0,3007a86cf5b9babc8f6ce0aac8d03aa78e6bc7512dc1d70fe4c62f1304af30b0,2024-11-21T01:28:32.107000 +CVE-2011-2588,0,0,9c6cf6b47f4105ee4ba917b6ac165d473e55dfa3933f46826915263bd7bb75a8,2024-11-21T01:28:32.240000 +CVE-2011-2589,0,0,963a8694523af0bf587887049142533d7eb6fb7ebb34857642261be92cf9b525,2024-11-21T01:28:32.373000 +CVE-2011-2590,0,0,f06f471226d4302cde23dfa9ab64daf9e746ebc2de592e6dab229e5be8b21432,2024-11-21T01:28:32.493000 +CVE-2011-2591,0,0,e06d072aa27e0ebfc099a92ee079c4fcf27c0f48296cdbff3774783b15030b1b,2024-11-21T01:28:32.617000 CVE-2011-2592,0,0,9138c0feba938ec4d2201de0758d99abb26295f7705691ce520a06111bae0201,2017-08-29T01:29:27.957000 CVE-2011-2593,0,0,a0d6ff8245fd81a0213d9558c3bfa7b656e2dd68969fe5c78f14cf8565be059a,2017-08-29T01:29:28.050000 -CVE-2011-2594,0,1,d31cf846368336f681aed4e14b6c81ce216fb528253664e614850e2a352b30d6,2024-11-21T01:28:32.963000 -CVE-2011-2595,0,1,bcbf9dac74024828bf065c434ebe4e42ababd03a8dab6840ba0e56f46ee3016f,2024-11-21T01:28:33.050000 -CVE-2011-2597,0,1,d30a4d36492e261fe7e93133d7c4f33c6c2840bf6d471647aa95eedf38c76b1a,2024-11-21T01:28:33.153000 -CVE-2011-2598,0,1,e3dbe085ed054c9357c1e9cef9efe05fbc557760ecbf45d873e2386d37eefb62,2024-11-21T01:28:33.340000 -CVE-2011-2599,0,1,3cb26a920ab27593c2c5dcc6376b222cfa3a0cb11e50256927ad94868c52a00f,2024-11-21T01:28:33.503000 -CVE-2011-2600,0,1,9fc2ca1cf838b15258ca39fe2f2f6bdd9cfc2d5d47aaaaa4f10967a55c617983,2024-11-21T01:28:33.690000 -CVE-2011-2601,0,1,40a02d65fa5154aaa5dd1237197bd1563b54fd0876aff1fcfc929a6aedb4eb1c,2024-11-21T01:28:33.837000 -CVE-2011-2602,0,1,1d436da783bfc3e7f7e20d78fc8593632d9a78a5208ae0c47556898c4b6ae3be,2024-11-21T01:28:34.003000 -CVE-2011-2603,0,1,05c238bf4eae78d393e44f4f2492b286cd0cf680f5c49ba2352299c89167a928,2024-11-21T01:28:34.183000 -CVE-2011-2604,0,1,2c9cb9c711e552fb6d75c0a496b1fad2139ca732772a5408aee1fd9d0a777d7e,2024-11-21T01:28:34.363000 -CVE-2011-2605,0,1,41e9d3e4b2cdb065cb846acfcef2c19d06d2fadb6135bc4c732e757e1f5eba5f,2024-11-21T01:28:34.507000 -CVE-2011-2606,0,1,3de013b86a4368db003da1e71f0fcb0a97f07940756b54663e0f5712cc243bb0,2024-11-21T01:28:34.683000 -CVE-2011-2607,0,1,cea6a0449e96ffd6c244b7fa5e3005fc6efc2c784e4db772ee82fabef42c9a8c,2024-11-21T01:28:34.823000 -CVE-2011-2608,0,1,c30892a63b4d32d35ac479ffd0eebb57c26ccc8685ed88c0d675677a32e306f5,2024-11-21T01:28:34.967000 -CVE-2011-2609,0,1,3c9caa83034a7fee0deb81504b9fb0c51d231973073b44d1bc57d2629db5b688,2024-11-21T01:28:35.103000 -CVE-2011-2610,0,1,31cda7f9c196bdd9f1ef37b60bebc46d6d3ba2eb126d9c42725b8fb1400d2d8a,2024-11-21T01:28:35.267000 -CVE-2011-2611,0,1,5a53aa909ce4c1927bd46be6e4d11cfe83efe4297cacfdae367393a9d1f9e78d,2024-11-21T01:28:35.420000 -CVE-2011-2612,0,1,d397978a1215616263366a31493998ea292f1d58a2dc0dbcb5f112db954c434f,2024-11-21T01:28:35.570000 -CVE-2011-2613,0,1,180cb9ba6d5b986f2b1e874607c78f0fcab1c232247598ef2a4b524ad8bb5865,2024-11-21T01:28:35.720000 -CVE-2011-2614,0,1,7e7aa7798800a7f6b15eeb372978f41fb13ec367ce1cfff0c1cad8ddab1ff11d,2024-11-21T01:28:35.873000 -CVE-2011-2615,0,1,090440ea4499f6d763f111d0cbb4368866756f19d0b39236a1ea2449c329bd2d,2024-11-21T01:28:36.017000 -CVE-2011-2616,0,1,cbae0e616c982169e0476861d59b42b7d7718633edaa6a84b702b6f1b90f34df,2024-11-21T01:28:36.173000 -CVE-2011-2617,0,1,e4563edc3153c76cb683cf850fb5917cd29bdab1307f6b15055f2850fa3d6e76,2024-11-21T01:28:36.327000 -CVE-2011-2618,0,1,f284a980df94ae33fb6dfeab3cfd4eac40572640446dabb6d243745a8548a2ed,2024-11-21T01:28:36.537000 -CVE-2011-2619,0,1,cc268470595a51a7bbb350e73f67d780c1548b721be8b410d63923773224637b,2024-11-21T01:28:36.693000 -CVE-2011-2620,0,1,29467c300919d432e3d7935872d81853342835696a71feba0d563ea5ddca5ca8,2024-11-21T01:28:36.850000 -CVE-2011-2621,0,1,25eac78c4f6f2685a2cf3832d1c3c2aeda5efd36ea35db543cfa6e1488c8a289,2024-11-21T01:28:37.007000 -CVE-2011-2622,0,1,ca975f5269f0ed689d8d1004a1e6e7be4d0ad33efa1867ce1b81e0a7eadda83a,2024-11-21T01:28:37.150000 -CVE-2011-2623,0,1,bccf15ee4ea644692da7b72ad7a01750db230889cdcbd8bef3866638a8583d18,2024-11-21T01:28:37.290000 -CVE-2011-2624,0,1,99f85fb2a925443df724f092e8be29d50c2700a27efae5831af1cb91c2ea2a7d,2024-11-21T01:28:37.437000 -CVE-2011-2625,0,1,0402deee42bad2826179021c7cbba9540b03d8661b57ecc8fc412e753b12a62d,2024-11-21T01:28:37.580000 -CVE-2011-2626,0,1,54c8a71ca3784b4046e0400fefdf9539e7e489cdf8569d295cdb596e60be8756,2024-11-21T01:28:37.740000 -CVE-2011-2627,0,1,bfcc35879d69c958172149ee53b1592ab71985e69a1270db4dab2f2abe6e3608,2024-11-21T01:28:37.890000 -CVE-2011-2628,0,1,ff3e726e66d6835cffaef2310ec39fce695133d38eaebee1883f74d12c069e63,2024-11-21T01:28:38.037000 -CVE-2011-2629,0,1,008fa151dbedd0e287052e6559062445f7272a890bd9f427fa8d40abab9ad975,2024-11-21T01:28:38.187000 -CVE-2011-2630,0,1,b3a0df6a3141b542bc89fd121973ee74e6c5220a77e791e91a9b0752318319f3,2024-11-21T01:28:38.340000 -CVE-2011-2631,0,1,81301654352696af1dba53778abfa5039324e8f442814a1c7ea6b9036d7a2157,2024-11-21T01:28:38.483000 -CVE-2011-2632,0,1,6fe288f489db5f63afce43c78b76e7b5f927e75ff5011f3a0c306fdab342acf5,2024-11-21T01:28:38.633000 -CVE-2011-2633,0,1,4c6b26ccac039d5395afa5341ea7904a4e15d25dfddf270256651dd9a8be403b,2024-11-21T01:28:38.820000 -CVE-2011-2634,0,1,53dff0e5e9d2059a91ed3c3b8adf2d9a5835cfef3a2fd3dfac42d5294fb01518,2024-11-21T01:28:38.980000 -CVE-2011-2635,0,1,a0dec62d7b24f8695681e5241a65e0a7236823aaaf161eed08f2bd6a6f99bb11,2024-11-21T01:28:39.140000 -CVE-2011-2636,0,1,0adbbc26029ca1c9d5e7a1954a88c239ed2ea621492a6cdbdc22beb3be92eaec,2024-11-21T01:28:39.290000 -CVE-2011-2637,0,1,306be22bff05e1419c189a7df0101c004eb02803c2e8bddb508ea50785f8ae5a,2024-11-21T01:28:39.433000 -CVE-2011-2638,0,1,0902f418b7c14f589e5f94824545bb00ef3ec7ba4bb08ec6062d1e067d62e98d,2024-11-21T01:28:39.583000 -CVE-2011-2639,0,1,579169005185aa59929c4979ca50c77f73c9a9736fc3a4af52ccef173b02b6f8,2024-11-21T01:28:39.733000 -CVE-2011-2640,0,1,bde53b6a9cbe81edf67d7c763370577ba178349582e5ece3810e30f57b93639f,2024-11-21T01:28:39.877000 -CVE-2011-2641,0,1,0825aa5674a57885aa041dd056cf625825fcf37e46d488b8fbfcef32a63c1bc3,2024-11-21T01:28:40.040000 -CVE-2011-2642,0,1,2a90efe04403bfa5d88391c26c79c1ce2f6f9cffd41eb4a1071427d5df17e7f2,2024-11-21T01:28:40.170000 -CVE-2011-2643,0,1,cacf9460c90b73f6f33812ef46c30b8e2cbd900470481f9fe71a77fe70a26d94,2024-11-21T01:28:40.327000 -CVE-2011-2644,0,1,ac4ff3bbfc1139771084256e313ccc3b7b548f10a1c0b1270efc8ce2741f2d4e,2024-11-21T01:28:40.477000 -CVE-2011-2645,0,1,a988c926e8830d10158442e63567c3c798448d2c9e88d28cea277ed5bbcceb00,2024-11-21T01:28:40.607000 -CVE-2011-2646,0,1,cef23692cd774f077d6a8b7c4d030305010ce9de3de8fc81895b28de8065b0a6,2024-11-21T01:28:40.737000 -CVE-2011-2647,0,1,4f2c29ef8c3ef1a24a7b9e3e7209d13c557cc8ab7b74473434871827aaccdbc9,2024-11-21T01:28:40.863000 -CVE-2011-2648,0,1,ed267f0db3ca7d0a4b413f6a66f271c2ec0961277ae7fe153322e029c551c33f,2024-11-21T01:28:40.987000 -CVE-2011-2649,0,1,4fa67f19c055886d85786a3ab639c06e26e2261a95902a1558c05bb4b65a672c,2024-11-21T01:28:41.120000 -CVE-2011-2650,0,1,3a117ee323c5d28a520bb558c78ca016c4a789acbe10d4378554820747d53a82,2024-11-21T01:28:41.253000 -CVE-2011-2651,0,1,ad7615d07dbf59a81ad575cf75255ce18964ea66097bea177f5261d7198a95b0,2024-11-21T01:28:41.383000 -CVE-2011-2652,0,1,723d78f617fd8c6dfe6b7d0ac0aa3a8eea36177c75947578dad6ce57790940fb,2024-11-21T01:28:41.520000 -CVE-2011-2653,0,1,aefeac307b34564ad2d24671d1b696005a99ccbd5d1f7a2e8448c7527239a2c2,2024-11-21T01:28:41.653000 -CVE-2011-2654,0,1,7ee16e967fe2100a4f4003454ff6d882d355458a2a2797914c3fe3f06854c2ff,2024-11-21T01:28:41.773000 -CVE-2011-2655,0,1,3e014270929afec845ed9e602eee498e9cb4e9583533faa764e03054d6820476,2024-11-21T01:28:41.913000 -CVE-2011-2656,0,1,9763689fc9ab84a091194001107b674098f61b8c5768b52ce911410e109f3e19,2024-11-21T01:28:42.047000 +CVE-2011-2594,0,0,d31cf846368336f681aed4e14b6c81ce216fb528253664e614850e2a352b30d6,2024-11-21T01:28:32.963000 +CVE-2011-2595,0,0,bcbf9dac74024828bf065c434ebe4e42ababd03a8dab6840ba0e56f46ee3016f,2024-11-21T01:28:33.050000 +CVE-2011-2597,0,0,d30a4d36492e261fe7e93133d7c4f33c6c2840bf6d471647aa95eedf38c76b1a,2024-11-21T01:28:33.153000 +CVE-2011-2598,0,0,e3dbe085ed054c9357c1e9cef9efe05fbc557760ecbf45d873e2386d37eefb62,2024-11-21T01:28:33.340000 +CVE-2011-2599,0,0,3cb26a920ab27593c2c5dcc6376b222cfa3a0cb11e50256927ad94868c52a00f,2024-11-21T01:28:33.503000 +CVE-2011-2600,0,0,9fc2ca1cf838b15258ca39fe2f2f6bdd9cfc2d5d47aaaaa4f10967a55c617983,2024-11-21T01:28:33.690000 +CVE-2011-2601,0,0,40a02d65fa5154aaa5dd1237197bd1563b54fd0876aff1fcfc929a6aedb4eb1c,2024-11-21T01:28:33.837000 +CVE-2011-2602,0,0,1d436da783bfc3e7f7e20d78fc8593632d9a78a5208ae0c47556898c4b6ae3be,2024-11-21T01:28:34.003000 +CVE-2011-2603,0,0,05c238bf4eae78d393e44f4f2492b286cd0cf680f5c49ba2352299c89167a928,2024-11-21T01:28:34.183000 +CVE-2011-2604,0,0,2c9cb9c711e552fb6d75c0a496b1fad2139ca732772a5408aee1fd9d0a777d7e,2024-11-21T01:28:34.363000 +CVE-2011-2605,0,0,41e9d3e4b2cdb065cb846acfcef2c19d06d2fadb6135bc4c732e757e1f5eba5f,2024-11-21T01:28:34.507000 +CVE-2011-2606,0,0,3de013b86a4368db003da1e71f0fcb0a97f07940756b54663e0f5712cc243bb0,2024-11-21T01:28:34.683000 +CVE-2011-2607,0,0,cea6a0449e96ffd6c244b7fa5e3005fc6efc2c784e4db772ee82fabef42c9a8c,2024-11-21T01:28:34.823000 +CVE-2011-2608,0,0,c30892a63b4d32d35ac479ffd0eebb57c26ccc8685ed88c0d675677a32e306f5,2024-11-21T01:28:34.967000 +CVE-2011-2609,0,0,3c9caa83034a7fee0deb81504b9fb0c51d231973073b44d1bc57d2629db5b688,2024-11-21T01:28:35.103000 +CVE-2011-2610,0,0,31cda7f9c196bdd9f1ef37b60bebc46d6d3ba2eb126d9c42725b8fb1400d2d8a,2024-11-21T01:28:35.267000 +CVE-2011-2611,0,0,5a53aa909ce4c1927bd46be6e4d11cfe83efe4297cacfdae367393a9d1f9e78d,2024-11-21T01:28:35.420000 +CVE-2011-2612,0,0,d397978a1215616263366a31493998ea292f1d58a2dc0dbcb5f112db954c434f,2024-11-21T01:28:35.570000 +CVE-2011-2613,0,0,180cb9ba6d5b986f2b1e874607c78f0fcab1c232247598ef2a4b524ad8bb5865,2024-11-21T01:28:35.720000 +CVE-2011-2614,0,0,7e7aa7798800a7f6b15eeb372978f41fb13ec367ce1cfff0c1cad8ddab1ff11d,2024-11-21T01:28:35.873000 +CVE-2011-2615,0,0,090440ea4499f6d763f111d0cbb4368866756f19d0b39236a1ea2449c329bd2d,2024-11-21T01:28:36.017000 +CVE-2011-2616,0,0,cbae0e616c982169e0476861d59b42b7d7718633edaa6a84b702b6f1b90f34df,2024-11-21T01:28:36.173000 +CVE-2011-2617,0,0,e4563edc3153c76cb683cf850fb5917cd29bdab1307f6b15055f2850fa3d6e76,2024-11-21T01:28:36.327000 +CVE-2011-2618,0,0,f284a980df94ae33fb6dfeab3cfd4eac40572640446dabb6d243745a8548a2ed,2024-11-21T01:28:36.537000 +CVE-2011-2619,0,0,cc268470595a51a7bbb350e73f67d780c1548b721be8b410d63923773224637b,2024-11-21T01:28:36.693000 +CVE-2011-2620,0,0,29467c300919d432e3d7935872d81853342835696a71feba0d563ea5ddca5ca8,2024-11-21T01:28:36.850000 +CVE-2011-2621,0,0,25eac78c4f6f2685a2cf3832d1c3c2aeda5efd36ea35db543cfa6e1488c8a289,2024-11-21T01:28:37.007000 +CVE-2011-2622,0,0,ca975f5269f0ed689d8d1004a1e6e7be4d0ad33efa1867ce1b81e0a7eadda83a,2024-11-21T01:28:37.150000 +CVE-2011-2623,0,0,bccf15ee4ea644692da7b72ad7a01750db230889cdcbd8bef3866638a8583d18,2024-11-21T01:28:37.290000 +CVE-2011-2624,0,0,99f85fb2a925443df724f092e8be29d50c2700a27efae5831af1cb91c2ea2a7d,2024-11-21T01:28:37.437000 +CVE-2011-2625,0,0,0402deee42bad2826179021c7cbba9540b03d8661b57ecc8fc412e753b12a62d,2024-11-21T01:28:37.580000 +CVE-2011-2626,0,0,54c8a71ca3784b4046e0400fefdf9539e7e489cdf8569d295cdb596e60be8756,2024-11-21T01:28:37.740000 +CVE-2011-2627,0,0,bfcc35879d69c958172149ee53b1592ab71985e69a1270db4dab2f2abe6e3608,2024-11-21T01:28:37.890000 +CVE-2011-2628,0,0,ff3e726e66d6835cffaef2310ec39fce695133d38eaebee1883f74d12c069e63,2024-11-21T01:28:38.037000 +CVE-2011-2629,0,0,008fa151dbedd0e287052e6559062445f7272a890bd9f427fa8d40abab9ad975,2024-11-21T01:28:38.187000 +CVE-2011-2630,0,0,b3a0df6a3141b542bc89fd121973ee74e6c5220a77e791e91a9b0752318319f3,2024-11-21T01:28:38.340000 +CVE-2011-2631,0,0,81301654352696af1dba53778abfa5039324e8f442814a1c7ea6b9036d7a2157,2024-11-21T01:28:38.483000 +CVE-2011-2632,0,0,6fe288f489db5f63afce43c78b76e7b5f927e75ff5011f3a0c306fdab342acf5,2024-11-21T01:28:38.633000 +CVE-2011-2633,0,0,4c6b26ccac039d5395afa5341ea7904a4e15d25dfddf270256651dd9a8be403b,2024-11-21T01:28:38.820000 +CVE-2011-2634,0,0,53dff0e5e9d2059a91ed3c3b8adf2d9a5835cfef3a2fd3dfac42d5294fb01518,2024-11-21T01:28:38.980000 +CVE-2011-2635,0,0,a0dec62d7b24f8695681e5241a65e0a7236823aaaf161eed08f2bd6a6f99bb11,2024-11-21T01:28:39.140000 +CVE-2011-2636,0,0,0adbbc26029ca1c9d5e7a1954a88c239ed2ea621492a6cdbdc22beb3be92eaec,2024-11-21T01:28:39.290000 +CVE-2011-2637,0,0,306be22bff05e1419c189a7df0101c004eb02803c2e8bddb508ea50785f8ae5a,2024-11-21T01:28:39.433000 +CVE-2011-2638,0,0,0902f418b7c14f589e5f94824545bb00ef3ec7ba4bb08ec6062d1e067d62e98d,2024-11-21T01:28:39.583000 +CVE-2011-2639,0,0,579169005185aa59929c4979ca50c77f73c9a9736fc3a4af52ccef173b02b6f8,2024-11-21T01:28:39.733000 +CVE-2011-2640,0,0,bde53b6a9cbe81edf67d7c763370577ba178349582e5ece3810e30f57b93639f,2024-11-21T01:28:39.877000 +CVE-2011-2641,0,0,0825aa5674a57885aa041dd056cf625825fcf37e46d488b8fbfcef32a63c1bc3,2024-11-21T01:28:40.040000 +CVE-2011-2642,0,0,2a90efe04403bfa5d88391c26c79c1ce2f6f9cffd41eb4a1071427d5df17e7f2,2024-11-21T01:28:40.170000 +CVE-2011-2643,0,0,cacf9460c90b73f6f33812ef46c30b8e2cbd900470481f9fe71a77fe70a26d94,2024-11-21T01:28:40.327000 +CVE-2011-2644,0,0,ac4ff3bbfc1139771084256e313ccc3b7b548f10a1c0b1270efc8ce2741f2d4e,2024-11-21T01:28:40.477000 +CVE-2011-2645,0,0,a988c926e8830d10158442e63567c3c798448d2c9e88d28cea277ed5bbcceb00,2024-11-21T01:28:40.607000 +CVE-2011-2646,0,0,cef23692cd774f077d6a8b7c4d030305010ce9de3de8fc81895b28de8065b0a6,2024-11-21T01:28:40.737000 +CVE-2011-2647,0,0,4f2c29ef8c3ef1a24a7b9e3e7209d13c557cc8ab7b74473434871827aaccdbc9,2024-11-21T01:28:40.863000 +CVE-2011-2648,0,0,ed267f0db3ca7d0a4b413f6a66f271c2ec0961277ae7fe153322e029c551c33f,2024-11-21T01:28:40.987000 +CVE-2011-2649,0,0,4fa67f19c055886d85786a3ab639c06e26e2261a95902a1558c05bb4b65a672c,2024-11-21T01:28:41.120000 +CVE-2011-2650,0,0,3a117ee323c5d28a520bb558c78ca016c4a789acbe10d4378554820747d53a82,2024-11-21T01:28:41.253000 +CVE-2011-2651,0,0,ad7615d07dbf59a81ad575cf75255ce18964ea66097bea177f5261d7198a95b0,2024-11-21T01:28:41.383000 +CVE-2011-2652,0,0,723d78f617fd8c6dfe6b7d0ac0aa3a8eea36177c75947578dad6ce57790940fb,2024-11-21T01:28:41.520000 +CVE-2011-2653,0,0,aefeac307b34564ad2d24671d1b696005a99ccbd5d1f7a2e8448c7527239a2c2,2024-11-21T01:28:41.653000 +CVE-2011-2654,0,0,7ee16e967fe2100a4f4003454ff6d882d355458a2a2797914c3fe3f06854c2ff,2024-11-21T01:28:41.773000 +CVE-2011-2655,0,0,3e014270929afec845ed9e602eee498e9cb4e9583533faa764e03054d6820476,2024-11-21T01:28:41.913000 +CVE-2011-2656,0,0,9763689fc9ab84a091194001107b674098f61b8c5768b52ce911410e109f3e19,2024-11-21T01:28:42.047000 CVE-2011-2657,0,0,5a8231cb58d20ef98f4435d808296967a4f450c26f4317131106f5cab55e7798,2012-07-27T04:00:00 CVE-2011-2658,0,0,936cd2e5213dae27eac2bb0e73a4aab184de685d7126a7a5be6818d69b2649cf,2012-07-27T13:33:24.027000 -CVE-2011-2660,0,1,5dc633d48ff0ddd1681aa7cfb91ddf498639b34fef72850e05cdb83e46448f09,2024-11-21T01:28:42.457000 -CVE-2011-2661,0,1,67c1609e8e9aa421c98f3b5fac73627d4adc1f9db8dfeeb572a94399cee61816,2024-11-21T01:28:42.593000 -CVE-2011-2662,0,1,8755a6d189457133e1e968feaae891f0449da523de69a4940b9faf4833605159,2024-11-21T01:28:42.723000 -CVE-2011-2663,0,1,8d283610db06b2aa2c7c14147338a5a86e093a3a1eae4ce9cfa915ba2065cdff,2024-11-21T01:28:42.860000 -CVE-2011-2664,0,1,9039931f4d06369f44e6c678be01a72780252a78da43196d146cc5b9d9dfee0c,2024-11-21T01:28:42.990000 -CVE-2011-2665,0,1,3d2a76bd85091c04f940783b5b11136dede946bfc68dc08d1f32ed4525c8b866,2024-11-21T01:28:43.127000 -CVE-2011-2666,0,1,74fe230b28097e0335b4e002d45b71acae333447ec39a92b16440c13e875c0cb,2024-11-21T01:28:43.267000 -CVE-2011-2667,0,1,2a7cfbb019f4e8f68704fc23eea0eb9c93f6619a7fdfd36ef459fabc5ee5dadb,2024-11-21T01:28:43.423000 +CVE-2011-2660,0,0,5dc633d48ff0ddd1681aa7cfb91ddf498639b34fef72850e05cdb83e46448f09,2024-11-21T01:28:42.457000 +CVE-2011-2661,0,0,67c1609e8e9aa421c98f3b5fac73627d4adc1f9db8dfeeb572a94399cee61816,2024-11-21T01:28:42.593000 +CVE-2011-2662,0,0,8755a6d189457133e1e968feaae891f0449da523de69a4940b9faf4833605159,2024-11-21T01:28:42.723000 +CVE-2011-2663,0,0,8d283610db06b2aa2c7c14147338a5a86e093a3a1eae4ce9cfa915ba2065cdff,2024-11-21T01:28:42.860000 +CVE-2011-2664,0,0,9039931f4d06369f44e6c678be01a72780252a78da43196d146cc5b9d9dfee0c,2024-11-21T01:28:42.990000 +CVE-2011-2665,0,0,3d2a76bd85091c04f940783b5b11136dede946bfc68dc08d1f32ed4525c8b866,2024-11-21T01:28:43.127000 +CVE-2011-2666,0,0,74fe230b28097e0335b4e002d45b71acae333447ec39a92b16440c13e875c0cb,2024-11-21T01:28:43.267000 +CVE-2011-2667,0,0,2a7cfbb019f4e8f68704fc23eea0eb9c93f6619a7fdfd36ef459fabc5ee5dadb,2024-11-21T01:28:43.423000 CVE-2011-2668,0,0,1cac3b68561c48037770f5d0fd453c68f4a62ef5f5c772f78a17fc77dc814636,2020-01-23T22:26:55.137000 CVE-2011-2669,0,0,2b82647a4df83ef9c26b233296d04d1e415baabafe64fe9033f905e99fbcd2a3,2020-01-23T22:23:01.807000 CVE-2011-2670,0,0,7597cca273813ca09a7c650d54f87c4a6c1d992675de1e6090b5bc85b9d598f9,2020-01-14T15:35:28.780000 -CVE-2011-2671,0,1,0f88b967b9cf1b53b41e3c8a34c0ef8481c020e072da80614ddac02aa6ee9af6,2024-11-21T01:28:43.907000 -CVE-2011-2672,0,1,14b98e532fdb4e2ff28fe599333f3a2d48b932dca20c8bbc32ca7b93b6d58e68,2024-11-21T01:28:44.040000 -CVE-2011-2673,0,1,d65694c5023ba9d3d44ef05e8389db23526bee1a819b358e304633fd6848e5bb,2024-11-21T01:28:44.187000 -CVE-2011-2674,0,1,949796766b006cfbcc209abfac5f2f756eeee0ec4f8a6ba5cd4f74abdd3bd15e,2024-11-21T01:28:44.300000 -CVE-2011-2675,0,1,a3013641be142094c7a70aba5c03b86803594eac653a5fe43599b4b0c7d1e1e2,2024-11-21T01:28:44.410000 -CVE-2011-2676,0,1,2b4a331298ce3860ff7db90716a9f6a4015b93d90fb385fcb39b6daef125bf4d,2024-11-21T01:28:44.517000 -CVE-2011-2677,0,1,ac0f45cfc8f8972d2836c9cf78ceaf21ff912bb8916247ea3eb0310f98a0b1a5,2024-11-21T01:28:44.627000 -CVE-2011-2678,0,1,f111e2134fb8de5de14d350a00cc6e5bac16bf4ff05c191a6bb170d1e7e493e6,2024-11-21T01:28:44.727000 -CVE-2011-2679,0,1,13eeae37da586f0c8d4b2d146333acaeea4645242be33f4177b5c19ac2cb4cac,2024-11-21T01:28:44.867000 -CVE-2011-2680,0,1,c876e68c284144232fad1e890d2a20f52ef975652271cd98d422548aeaffab53,2024-11-21T01:28:45 -CVE-2011-2681,0,1,ba373c3e1e0b600b56b684d4819482736b2f2a24bff2bf8476675c02e7c1eb87,2024-11-21T01:28:45.130000 -CVE-2011-2682,0,1,1327bb276444318b63f959e6f951e1c73d7e7396036fc97a61523f187286f94c,2024-11-21T01:28:45.260000 +CVE-2011-2671,0,0,0f88b967b9cf1b53b41e3c8a34c0ef8481c020e072da80614ddac02aa6ee9af6,2024-11-21T01:28:43.907000 +CVE-2011-2672,0,0,14b98e532fdb4e2ff28fe599333f3a2d48b932dca20c8bbc32ca7b93b6d58e68,2024-11-21T01:28:44.040000 +CVE-2011-2673,0,0,d65694c5023ba9d3d44ef05e8389db23526bee1a819b358e304633fd6848e5bb,2024-11-21T01:28:44.187000 +CVE-2011-2674,0,0,949796766b006cfbcc209abfac5f2f756eeee0ec4f8a6ba5cd4f74abdd3bd15e,2024-11-21T01:28:44.300000 +CVE-2011-2675,0,0,a3013641be142094c7a70aba5c03b86803594eac653a5fe43599b4b0c7d1e1e2,2024-11-21T01:28:44.410000 +CVE-2011-2676,0,0,2b4a331298ce3860ff7db90716a9f6a4015b93d90fb385fcb39b6daef125bf4d,2024-11-21T01:28:44.517000 +CVE-2011-2677,0,0,ac0f45cfc8f8972d2836c9cf78ceaf21ff912bb8916247ea3eb0310f98a0b1a5,2024-11-21T01:28:44.627000 +CVE-2011-2678,0,0,f111e2134fb8de5de14d350a00cc6e5bac16bf4ff05c191a6bb170d1e7e493e6,2024-11-21T01:28:44.727000 +CVE-2011-2679,0,0,13eeae37da586f0c8d4b2d146333acaeea4645242be33f4177b5c19ac2cb4cac,2024-11-21T01:28:44.867000 +CVE-2011-2680,0,0,c876e68c284144232fad1e890d2a20f52ef975652271cd98d422548aeaffab53,2024-11-21T01:28:45 +CVE-2011-2681,0,0,ba373c3e1e0b600b56b684d4819482736b2f2a24bff2bf8476675c02e7c1eb87,2024-11-21T01:28:45.130000 +CVE-2011-2682,0,0,1327bb276444318b63f959e6f951e1c73d7e7396036fc97a61523f187286f94c,2024-11-21T01:28:45.260000 CVE-2011-2683,0,0,d606c0fac405cb0431936f7c7546f587312afac3e5f81e0b2b395dbfcd5e0bff,2017-11-21T18:22:29.383000 CVE-2011-2684,0,0,959599d5d272153828fb21a6028cc2d5e6bf3006107b5cd6718e171751b1412c,2017-11-21T18:13:34.660000 -CVE-2011-2685,0,1,c25aa11140d6d20e1eec761cfae2b9d5995b0179bab64c250fdcb518ed5b6967,2024-11-21T01:28:45.603000 -CVE-2011-2686,0,1,0465dc2017e9eddbffa72df377f389678dbb80802fd751b64907c8cd48dd79e1,2024-11-21T01:28:45.717000 -CVE-2011-2687,0,1,4fcb8f7fe570b97928a2939e95f0f8ad28e181da4dff393ae3ac6101f368eeb3,2024-11-21T01:28:45.837000 -CVE-2011-2688,0,1,716af3fe4e1c859da37a8345b30aed5af9545192e50c978486d76229f0bc5259,2024-11-21T01:28:45.943000 -CVE-2011-2689,0,1,5270450df6e7dcab63018881894844e9ee8666db258eb303c0b75b981115fd7f,2024-11-21T01:28:46.060000 -CVE-2011-2690,0,1,01c0739af8936352e8f38035226766436ed90112fd68b6fe15dcdce224d1df48,2024-11-21T01:28:46.177000 -CVE-2011-2691,0,1,e3fa6014489724d1407bc9f4136cdce5a77d6c1ad1c2979e3a860e11aa88a840,2024-11-21T01:28:46.313000 -CVE-2011-2692,0,1,3e60a27892b6cf8d1c5c338eb3faf80288bafe4f2b75dcc35363d4bccd423c5c,2024-11-21T01:28:46.450000 +CVE-2011-2685,0,0,c25aa11140d6d20e1eec761cfae2b9d5995b0179bab64c250fdcb518ed5b6967,2024-11-21T01:28:45.603000 +CVE-2011-2686,0,0,0465dc2017e9eddbffa72df377f389678dbb80802fd751b64907c8cd48dd79e1,2024-11-21T01:28:45.717000 +CVE-2011-2687,0,0,4fcb8f7fe570b97928a2939e95f0f8ad28e181da4dff393ae3ac6101f368eeb3,2024-11-21T01:28:45.837000 +CVE-2011-2688,0,0,716af3fe4e1c859da37a8345b30aed5af9545192e50c978486d76229f0bc5259,2024-11-21T01:28:45.943000 +CVE-2011-2689,0,0,5270450df6e7dcab63018881894844e9ee8666db258eb303c0b75b981115fd7f,2024-11-21T01:28:46.060000 +CVE-2011-2690,0,0,01c0739af8936352e8f38035226766436ed90112fd68b6fe15dcdce224d1df48,2024-11-21T01:28:46.177000 +CVE-2011-2691,0,0,e3fa6014489724d1407bc9f4136cdce5a77d6c1ad1c2979e3a860e11aa88a840,2024-11-21T01:28:46.313000 +CVE-2011-2692,0,0,3e60a27892b6cf8d1c5c338eb3faf80288bafe4f2b75dcc35363d4bccd423c5c,2024-11-21T01:28:46.450000 CVE-2011-2693,0,0,eed143e3a76a6572a13cbc3b9fb5b1677f856a1a6287e16c573a1a4b29ea13b4,2023-02-13T01:20:05.270000 -CVE-2011-2694,0,1,d946e77e93cef5c4393d397011a0193e457d95a1f6dd4d8517b2b9ceb053cdb1,2024-11-21T01:28:46.703000 -CVE-2011-2695,0,1,e9d10b663393f5e3f68d27811f0118f7a6a8655417d9befd955fc9467b8c7097,2024-11-21T01:28:46.837000 -CVE-2011-2696,0,1,55b0681db14dcd578ac579871bfff8c35ec026c0e3c55a0a20dc21130010d895,2024-11-21T01:28:46.947000 -CVE-2011-2697,0,1,c7fbe2d9353f8efec294353d4b4ac39c2aaa22bd06f7627e39cb7d349252f737,2024-11-21T01:28:47.083000 -CVE-2011-2698,0,1,dc71fffb592e0b0c1dec88308521f2deaf1210adec7802fb5374afc2f16e15d4,2024-11-21T01:28:47.200000 +CVE-2011-2694,0,0,d946e77e93cef5c4393d397011a0193e457d95a1f6dd4d8517b2b9ceb053cdb1,2024-11-21T01:28:46.703000 +CVE-2011-2695,0,0,e9d10b663393f5e3f68d27811f0118f7a6a8655417d9befd955fc9467b8c7097,2024-11-21T01:28:46.837000 +CVE-2011-2696,0,0,55b0681db14dcd578ac579871bfff8c35ec026c0e3c55a0a20dc21130010d895,2024-11-21T01:28:46.947000 +CVE-2011-2697,0,0,c7fbe2d9353f8efec294353d4b4ac39c2aaa22bd06f7627e39cb7d349252f737,2024-11-21T01:28:47.083000 +CVE-2011-2698,0,0,dc71fffb592e0b0c1dec88308521f2deaf1210adec7802fb5374afc2f16e15d4,2024-11-21T01:28:47.200000 CVE-2011-2699,0,0,752263ed5ebbd2c5ab53cb19996e8ad6b790710a839d8f14575cf01128206c6a,2023-02-13T04:31:09.240000 -CVE-2011-2700,0,1,8405990110642e440b46afcf10c41c7d6a75987d2a7e8737124194c7483eb0fb,2024-11-21T01:28:47.440000 -CVE-2011-2701,0,1,bc22faef3820cb82c7a9b0983bf54b38275550db8996ff8ed3e0818f995a20b8,2024-11-21T01:28:47.547000 +CVE-2011-2700,0,0,8405990110642e440b46afcf10c41c7d6a75987d2a7e8737124194c7483eb0fb,2024-11-21T01:28:47.440000 +CVE-2011-2701,0,0,bc22faef3820cb82c7a9b0983bf54b38275550db8996ff8ed3e0818f995a20b8,2024-11-21T01:28:47.547000 CVE-2011-2702,0,0,306f0f4e2d2f3b3302c64421879b3e3eea43e1fa960da6b1d8bd366fcef38024,2023-02-13T01:20:09.800000 -CVE-2011-2703,0,1,7231427c66e68e2d7b6f04ce8e97c9b6b40ae9e1321e9baa0ef48230ab28d028,2024-11-21T01:28:47.773000 -CVE-2011-2704,0,1,923b58b6afd548392aed04bb82b97a50f80be2fdd05d9eae3cad8be0d4e69a97,2024-11-21T01:28:47.917000 -CVE-2011-2705,0,1,bf52945621cfac71bc6879b6d8f4d454543c8cb6123dc6bb0757318fbe00c163,2024-11-21T01:28:48.050000 +CVE-2011-2703,0,0,7231427c66e68e2d7b6f04ce8e97c9b6b40ae9e1321e9baa0ef48230ab28d028,2024-11-21T01:28:47.773000 +CVE-2011-2704,0,0,923b58b6afd548392aed04bb82b97a50f80be2fdd05d9eae3cad8be0d4e69a97,2024-11-21T01:28:47.917000 +CVE-2011-2705,0,0,bf52945621cfac71bc6879b6d8f4d454543c8cb6123dc6bb0757318fbe00c163,2024-11-21T01:28:48.050000 CVE-2011-2706,0,0,4a60f77cd1a9d32804646a3c0972760de2077ed63f3db6c947106ec3e8a1a6a6,2020-01-16T17:39:18.350000 CVE-2011-2707,0,0,5322604cb31239e83a4b7a4757eea437ac2be2817d192a6d122995d521986adc,2023-02-13T01:20:11.127000 CVE-2011-2708,0,0,4f564c2df5ad88bd1e83df2c7f30a1b594c4d3dc9cd77c9bafe3d259a8d20e53,2023-11-07T02:07:44.733000 CVE-2011-2709,0,0,30019397ce5a2ff5fef2a189f69a11c66a6a6bc0120afbef8059a0e4617113d2,2013-03-02T04:33:00.747000 -CVE-2011-2710,0,1,3b8c71fcb0e0e672b90cdd120ca90ff449d45b59441b6b6e38c108e08d83df79,2024-11-21T01:28:48.543000 -CVE-2011-2711,0,1,bb322cbe821f74dd015d558b64abc636e982bbf71b418bf4e1fd51c966215aa5,2024-11-21T01:28:48.670000 -CVE-2011-2712,0,1,6fd22dae37b7b7db969b0399e971c85ea95e12e32cc61319dd9042f773424030,2024-11-21T01:28:48.790000 -CVE-2011-2713,0,1,6a2a2cbfca5c2ecee863bafc952579573064ca12009f676e517080be8024cfec,2024-11-21T01:28:48.913000 +CVE-2011-2710,0,0,3b8c71fcb0e0e672b90cdd120ca90ff449d45b59441b6b6e38c108e08d83df79,2024-11-21T01:28:48.543000 +CVE-2011-2711,0,0,bb322cbe821f74dd015d558b64abc636e982bbf71b418bf4e1fd51c966215aa5,2024-11-21T01:28:48.670000 +CVE-2011-2712,0,0,6fd22dae37b7b7db969b0399e971c85ea95e12e32cc61319dd9042f773424030,2024-11-21T01:28:48.790000 +CVE-2011-2713,0,0,6a2a2cbfca5c2ecee863bafc952579573064ca12009f676e517080be8024cfec,2024-11-21T01:28:48.913000 CVE-2011-2714,0,0,ade87933323ed1b22acf546378694e2c2aa1c287e0979decfb503b3e37c39035,2020-01-23T19:22:55.740000 CVE-2011-2715,0,0,5dbf37c0965ceb2bca66686f3250fd66d136f857b11dda3a96aa2f8c0d4486bc,2020-01-24T14:24:46.880000 CVE-2011-2716,0,0,090aa4c2dd29557ed8168eec4698c64a6ee857ae70b887719b7c29288f843790,2020-08-27T20:15:09.893000 CVE-2011-2717,0,0,2ce112a19af47a6015bf8d682509f25b1c428fc4fc1859bf443a9c0f9ed44666,2019-12-18T21:04:24.183000 -CVE-2011-2718,0,1,d46f7ca71ce2fb5b8e26ca715b5e1b14a8ab43f11c523715e681c1e4edaa55e5,2024-11-21T01:28:49.523000 -CVE-2011-2719,0,1,ba63b6c353d8c058e473f1fb90b46368357e510a68cb42e3df351b24623ddbeb,2024-11-21T01:28:49.643000 -CVE-2011-2720,0,1,232ebbae40010197751c759b90480579a133a63f3d07e276e6c1f7f45a482bb0,2024-11-21T01:28:49.787000 -CVE-2011-2721,0,1,5260c46961c58844380ad56e92999f7dc2eef5dbc9fb8b960d58e7f0bbcc62e1,2024-11-21T01:28:49.930000 +CVE-2011-2718,0,0,d46f7ca71ce2fb5b8e26ca715b5e1b14a8ab43f11c523715e681c1e4edaa55e5,2024-11-21T01:28:49.523000 +CVE-2011-2719,0,0,ba63b6c353d8c058e473f1fb90b46368357e510a68cb42e3df351b24623ddbeb,2024-11-21T01:28:49.643000 +CVE-2011-2720,0,0,232ebbae40010197751c759b90480579a133a63f3d07e276e6c1f7f45a482bb0,2024-11-21T01:28:49.787000 +CVE-2011-2721,0,0,5260c46961c58844380ad56e92999f7dc2eef5dbc9fb8b960d58e7f0bbcc62e1,2024-11-21T01:28:49.930000 CVE-2011-2722,0,0,dc034def9ac9258d2708c49cac597df8507a0600779c58c5ee59e986b5f70605,2023-02-13T01:20:16.383000 -CVE-2011-2723,0,1,d2f0a237a752bd87f8426e6771221db3e50ed784eaf921ed83ac1582a3992fbb,2024-11-21T01:28:50.197000 -CVE-2011-2724,0,1,88aaf1de16e7c4b54aae2e836ce573f3351b1146694104c0e2eaad1d6445feef,2024-11-21T01:28:50.330000 +CVE-2011-2723,0,0,d2f0a237a752bd87f8426e6771221db3e50ed784eaf921ed83ac1582a3992fbb,2024-11-21T01:28:50.197000 +CVE-2011-2724,0,0,88aaf1de16e7c4b54aae2e836ce573f3351b1146694104c0e2eaad1d6445feef,2024-11-21T01:28:50.330000 CVE-2011-2725,0,0,ef15da84dac127acd8d3a553bca3fdc491c1fdb4faf4f0f8af078486f2305cc3,2018-10-30T16:27:33.420000 CVE-2011-2726,0,0,cd19c3887839e4ae3fef34522c200da1e8dd02f0ee7eefe53d02d64d6a20d8fc,2019-12-03T19:49:50.163000 CVE-2011-2727,0,0,1198ed111506c687070364a635612a03aab6460691ea7ee10afe9335aa598bcc,2015-03-25T20:46:06.727000 CVE-2011-2728,0,0,3e74b6309cd94be93b3947c4d43f9fd6e4b30140040e9063288539e38a234ea1,2013-01-29T05:00:00 -CVE-2011-2729,0,1,4d178e4e927d9d0671e2d803c657e56c86d8d9174f18e0b62766a28600324de8,2024-11-21T01:28:50.943000 +CVE-2011-2729,0,0,4d178e4e927d9d0671e2d803c657e56c86d8d9174f18e0b62766a28600324de8,2024-11-21T01:28:50.943000 CVE-2011-2730,0,0,3aadb8a3d7a94b8e899d2d3f7e0bbcf33c84f235515d5e97464ef6cf3f642c88,2017-08-09T01:29:00.343000 CVE-2011-2731,0,0,cd1cd7de75ee4a1c111174696672cb175732e80b8433a27119456c451939edfc,2013-10-24T03:32:16.470000 CVE-2011-2732,0,0,65e06bae4f4490d4330d750f65af0f66fe5301255ce72f3587189149b80ca8bb,2012-12-06T05:00:00 -CVE-2011-2733,0,1,502ab87aae5ed9d1c6ac1d1aa5b57222eff4a478fb1c695b496d1932f0dfc8b6,2024-11-21T01:28:51.427000 +CVE-2011-2733,0,0,502ab87aae5ed9d1c6ac1d1aa5b57222eff4a478fb1c695b496d1932f0dfc8b6,2024-11-21T01:28:51.427000 CVE-2011-2734,0,0,a6a200de92470352265fb6228e918ac5eea9446c36b95fc7e2ea04e10b4861b9,2023-11-07T02:07:45.397000 -CVE-2011-2735,0,1,efd67a255bbc8b833e7a0a75549cc8b924e196f179d9a3f1723dd25e451161f8,2024-11-21T01:28:51.540000 -CVE-2011-2736,0,1,a230f8db153ffef9bc6c5a964db09ac4a61a64f178cf36cdbc0b30bf43355fdd,2024-11-21T01:28:51.653000 -CVE-2011-2737,0,1,a979a709cabb608d344107aa5427e889286ed8194f890da8937e903a9e96f040,2024-11-21T01:28:51.760000 -CVE-2011-2738,0,1,76d0c5c08b2dfc9f7b6eb27e5eb3a0aede10cfc81fa8c859d0225bf36753a4cf,2024-11-21T01:28:51.860000 -CVE-2011-2739,0,1,94b1c85e66db9204542c4b92d628d2091b04d8b573fc21526dd59a3b82fb28e6,2024-11-21T01:28:51.983000 -CVE-2011-2740,0,1,6d2251fd9325a2b3c3396240bf4d9b034d3283316d22931ab22af4a0010919e4,2024-11-21T01:28:52.077000 -CVE-2011-2741,0,1,260bc7eaa0d33f0408db0535baa47dfb9682fc31d55ec208a2b0ad25f55fb697,2024-11-21T01:28:52.180000 -CVE-2011-2742,0,1,75bc7fe2b01fbb9d7872f74e8e112c468cd806b733b374cfa6667e86173785d0,2024-11-21T01:28:52.317000 -CVE-2011-2743,0,1,a9f5c146413a07ca9276e277654cd1d4e52f3a09b33000c5770c6cceafb2e7f8,2024-11-21T01:28:52.417000 -CVE-2011-2744,0,1,10fca397d577d61992f5b461fbb0a14a4f3aaf97ff7917df1c586e366f064161,2024-11-21T01:28:52.560000 -CVE-2011-2745,0,1,1fce0d7b2fb7bdbe515fb580146dce6bff171cae60a2ec026b7d348741cefab4,2024-11-21T01:28:52.697000 -CVE-2011-2746,0,1,ecee874a944e2c701d751ba317577d77cf364868081651af02f34a0aaf61d7a3,2024-11-21T01:28:52.827000 -CVE-2011-2747,0,1,9e94d14af8b50d0f1a64b5edf55f61de7b1af7623afb503d1136c41158a60549,2024-11-21T01:28:52.973000 -CVE-2011-2748,0,1,a83811a9338d7972b6aecf0572f2d4fb835c2b557f051c596053afd2d99a5981,2024-11-21T01:28:53.120000 -CVE-2011-2749,0,1,1beeb93bb311269781703f59d623cc3416a10502064f0977292bf96f632cd158,2024-11-21T01:28:53.300000 -CVE-2011-2750,0,1,6e91d93cf755ec4df0617aded17cf70c32c7f5acac614533ca12f665366a2c46,2024-11-21T01:28:53.477000 -CVE-2011-2751,0,1,1f485701cecdb49e570e3b099907e9b1c82d849050dc8993cae6e24784411934,2024-11-21T01:28:53.607000 -CVE-2011-2752,0,1,1d99fb6e09a0984b3b122883b43bc004a581a97a33fcdb954e4033b3f15f2bfc,2024-11-21T01:28:53.740000 -CVE-2011-2753,0,1,23f977c94c5fb904bce63547a9befef6ed827c3cefa65e61f3cd6c8bb3cdd70a,2024-11-21T01:28:53.893000 -CVE-2011-2754,0,1,8c0f935c17baa63c9a8bbd9ad1de6cbdc280e81ffdf4c0cc3a4a82745b80ac49,2024-11-21T01:28:54.033000 -CVE-2011-2755,0,1,fb86c642817557e3340338df0750592972d2f30a4e8ba572b6adfe93c1c8fb44,2024-11-21T01:28:54.170000 -CVE-2011-2756,0,1,b79edb4d59f65619649df6b7fb0d83b88e3e5f0717682d78d4b9111ee9ee9795,2024-11-21T01:28:54.303000 -CVE-2011-2757,0,1,830f1eee8d4ca2f3403e1d3fb7dc177b2ffa4f1913dc688849f02473dd24d6d1,2024-11-21T01:28:54.460000 -CVE-2011-2758,0,1,7ba65fb848089761cf9a5967b4473d225cfe7d825ab3f67707c91f4a0eda989d,2024-11-21T01:28:54.610000 -CVE-2011-2759,0,1,20d76c502a41b638c9da456af3413aae185cd3a3769c6b12c9be181975daf4fe,2024-11-21T01:28:54.753000 -CVE-2011-2760,0,1,2e67f196918cba01362f15444f50eacb068080a88d98ff658fedf743f4b7fdf2,2024-11-21T01:28:54.887000 -CVE-2011-2761,0,1,047803fab5a782e5aba02185a7b6365154c30d6a3987d8379bd3b44802a36c05,2024-11-21T01:28:55.030000 -CVE-2011-2762,0,1,452ca9b914f3ef2a13b43db18de5aca8ab6f5364c3128015166f8a832426be51,2024-11-21T01:28:55.177000 -CVE-2011-2763,0,1,5489d4813ef3e53a78bf5b34a93bb4edd9e2c436c19658ca11cece67262ced9a,2024-11-21T01:28:55.337000 -CVE-2011-2764,0,1,260f3b6470f66dc617fad41af68f06b3a4f802f74f0a3e0540f0bb8b3551109e,2024-11-21T01:28:55.480000 +CVE-2011-2735,0,0,efd67a255bbc8b833e7a0a75549cc8b924e196f179d9a3f1723dd25e451161f8,2024-11-21T01:28:51.540000 +CVE-2011-2736,0,0,a230f8db153ffef9bc6c5a964db09ac4a61a64f178cf36cdbc0b30bf43355fdd,2024-11-21T01:28:51.653000 +CVE-2011-2737,0,0,a979a709cabb608d344107aa5427e889286ed8194f890da8937e903a9e96f040,2024-11-21T01:28:51.760000 +CVE-2011-2738,0,0,76d0c5c08b2dfc9f7b6eb27e5eb3a0aede10cfc81fa8c859d0225bf36753a4cf,2024-11-21T01:28:51.860000 +CVE-2011-2739,0,0,94b1c85e66db9204542c4b92d628d2091b04d8b573fc21526dd59a3b82fb28e6,2024-11-21T01:28:51.983000 +CVE-2011-2740,0,0,6d2251fd9325a2b3c3396240bf4d9b034d3283316d22931ab22af4a0010919e4,2024-11-21T01:28:52.077000 +CVE-2011-2741,0,0,260bc7eaa0d33f0408db0535baa47dfb9682fc31d55ec208a2b0ad25f55fb697,2024-11-21T01:28:52.180000 +CVE-2011-2742,0,0,75bc7fe2b01fbb9d7872f74e8e112c468cd806b733b374cfa6667e86173785d0,2024-11-21T01:28:52.317000 +CVE-2011-2743,0,0,a9f5c146413a07ca9276e277654cd1d4e52f3a09b33000c5770c6cceafb2e7f8,2024-11-21T01:28:52.417000 +CVE-2011-2744,0,0,10fca397d577d61992f5b461fbb0a14a4f3aaf97ff7917df1c586e366f064161,2024-11-21T01:28:52.560000 +CVE-2011-2745,0,0,1fce0d7b2fb7bdbe515fb580146dce6bff171cae60a2ec026b7d348741cefab4,2024-11-21T01:28:52.697000 +CVE-2011-2746,0,0,ecee874a944e2c701d751ba317577d77cf364868081651af02f34a0aaf61d7a3,2024-11-21T01:28:52.827000 +CVE-2011-2747,0,0,9e94d14af8b50d0f1a64b5edf55f61de7b1af7623afb503d1136c41158a60549,2024-11-21T01:28:52.973000 +CVE-2011-2748,0,0,a83811a9338d7972b6aecf0572f2d4fb835c2b557f051c596053afd2d99a5981,2024-11-21T01:28:53.120000 +CVE-2011-2749,0,0,1beeb93bb311269781703f59d623cc3416a10502064f0977292bf96f632cd158,2024-11-21T01:28:53.300000 +CVE-2011-2750,0,0,6e91d93cf755ec4df0617aded17cf70c32c7f5acac614533ca12f665366a2c46,2024-11-21T01:28:53.477000 +CVE-2011-2751,0,0,1f485701cecdb49e570e3b099907e9b1c82d849050dc8993cae6e24784411934,2024-11-21T01:28:53.607000 +CVE-2011-2752,0,0,1d99fb6e09a0984b3b122883b43bc004a581a97a33fcdb954e4033b3f15f2bfc,2024-11-21T01:28:53.740000 +CVE-2011-2753,0,0,23f977c94c5fb904bce63547a9befef6ed827c3cefa65e61f3cd6c8bb3cdd70a,2024-11-21T01:28:53.893000 +CVE-2011-2754,0,0,8c0f935c17baa63c9a8bbd9ad1de6cbdc280e81ffdf4c0cc3a4a82745b80ac49,2024-11-21T01:28:54.033000 +CVE-2011-2755,0,0,fb86c642817557e3340338df0750592972d2f30a4e8ba572b6adfe93c1c8fb44,2024-11-21T01:28:54.170000 +CVE-2011-2756,0,0,b79edb4d59f65619649df6b7fb0d83b88e3e5f0717682d78d4b9111ee9ee9795,2024-11-21T01:28:54.303000 +CVE-2011-2757,0,0,830f1eee8d4ca2f3403e1d3fb7dc177b2ffa4f1913dc688849f02473dd24d6d1,2024-11-21T01:28:54.460000 +CVE-2011-2758,0,0,7ba65fb848089761cf9a5967b4473d225cfe7d825ab3f67707c91f4a0eda989d,2024-11-21T01:28:54.610000 +CVE-2011-2759,0,0,20d76c502a41b638c9da456af3413aae185cd3a3769c6b12c9be181975daf4fe,2024-11-21T01:28:54.753000 +CVE-2011-2760,0,0,2e67f196918cba01362f15444f50eacb068080a88d98ff658fedf743f4b7fdf2,2024-11-21T01:28:54.887000 +CVE-2011-2761,0,0,047803fab5a782e5aba02185a7b6365154c30d6a3987d8379bd3b44802a36c05,2024-11-21T01:28:55.030000 +CVE-2011-2762,0,0,452ca9b914f3ef2a13b43db18de5aca8ab6f5364c3128015166f8a832426be51,2024-11-21T01:28:55.177000 +CVE-2011-2763,0,0,5489d4813ef3e53a78bf5b34a93bb4edd9e2c436c19658ca11cece67262ced9a,2024-11-21T01:28:55.337000 +CVE-2011-2764,0,0,260f3b6470f66dc617fad41af68f06b3a4f802f74f0a3e0540f0bb8b3551109e,2024-11-21T01:28:55.480000 CVE-2011-2765,0,0,84f8d69d1ba00e9808c6f766bf0b3c3ae2befe9ef6fae1988fa307bc16f98596,2018-10-16T13:44:44.220000 -CVE-2011-2766,0,1,7dd538291a08c09b6987881c3f2256ddc3e8100460c8b7d36caefbe012d0062c,2024-11-21T01:28:55.787000 +CVE-2011-2766,0,0,7dd538291a08c09b6987881c3f2256ddc3e8100460c8b7d36caefbe012d0062c,2024-11-21T01:28:55.787000 CVE-2011-2767,0,0,27177625d2b9896949aa16f670d3c558fa7170cbe80b48b332b2ef9365a2cb3a,2023-11-07T02:07:45.910000 -CVE-2011-2768,0,1,88cf20329df497b781e3c96805d1509c960f6ca3217aa3eaf7c1d51e29801484,2024-11-21T01:28:56.107000 -CVE-2011-2769,0,1,8550575da0306ee2409e6b16ec7f47ceacfed913d381efe0784b5f3aa1146b07,2024-11-21T01:28:56.277000 -CVE-2011-2770,0,1,2f9aed36131ba9040b2ac40be37917dcf495671adbdc6a263cd4816e86a45ef0,2024-11-21T01:28:56.450000 -CVE-2011-2771,0,1,ec3d07073fcdbca0905b14372b5c1e83849df7fdb630099e299d4e7435150fce,2024-11-21T01:28:56.597000 -CVE-2011-2772,0,1,c717337d48cd6edd33a19e38b7778572703022754a3ea185aa4afd8fb0115842,2024-11-21T01:28:56.777000 -CVE-2011-2773,0,1,856b3526df592d26f8cdf971964c22115861a70602ea2097a2b64cdebfd0ceaf,2024-11-21T01:28:56.950000 -CVE-2011-2774,0,1,b0bee3e2f928806a30a462f03323d9fd73106c10e99dfece9368be25b1b60d96,2024-11-21T01:28:57.113000 -CVE-2011-2776,0,1,c3f5020816ef394f9cc135082e940c4ea85605a0155c7753ec12443359155ea2,2024-11-21T01:28:57.273000 +CVE-2011-2768,0,0,88cf20329df497b781e3c96805d1509c960f6ca3217aa3eaf7c1d51e29801484,2024-11-21T01:28:56.107000 +CVE-2011-2769,0,0,8550575da0306ee2409e6b16ec7f47ceacfed913d381efe0784b5f3aa1146b07,2024-11-21T01:28:56.277000 +CVE-2011-2770,0,0,2f9aed36131ba9040b2ac40be37917dcf495671adbdc6a263cd4816e86a45ef0,2024-11-21T01:28:56.450000 +CVE-2011-2771,0,0,ec3d07073fcdbca0905b14372b5c1e83849df7fdb630099e299d4e7435150fce,2024-11-21T01:28:56.597000 +CVE-2011-2772,0,0,c717337d48cd6edd33a19e38b7778572703022754a3ea185aa4afd8fb0115842,2024-11-21T01:28:56.777000 +CVE-2011-2773,0,0,856b3526df592d26f8cdf971964c22115861a70602ea2097a2b64cdebfd0ceaf,2024-11-21T01:28:56.950000 +CVE-2011-2774,0,0,b0bee3e2f928806a30a462f03323d9fd73106c10e99dfece9368be25b1b60d96,2024-11-21T01:28:57.113000 +CVE-2011-2776,0,0,c3f5020816ef394f9cc135082e940c4ea85605a0155c7753ec12443359155ea2,2024-11-21T01:28:57.273000 CVE-2011-2777,0,0,6d2edde70c22b68f51fa09ade9095c4c79b201e0bdf7374f1bb9e340055025ab,2012-12-20T05:00:00 -CVE-2011-2778,0,1,9feccb874b1903819f3a7b9775c67e31557be5066e32644ccf132ec6a710ff3d,2024-11-21T01:28:57.570000 -CVE-2011-2779,0,1,11edacd3c83a9bb0cae467e5bd859adec6d9e3dfadccb5f36d9b3395d8ce5fab,2024-11-21T01:28:57.740000 -CVE-2011-2780,0,1,6c0f764abbb10fc0b0b3051302d338c6c13002fb1b1b1ab1feb249f81c9abf85,2024-11-21T01:28:57.883000 -CVE-2011-2782,0,1,9083c1cf347d59d8319504726d50c33ddf7577eb54c14becf43f050b169ffea1,2024-11-21T01:28:58.043000 -CVE-2011-2783,0,1,5a4d4e9a67db60c639d769fccbc13a294bd7379901ce521d26fb48b3ef34aa5d,2024-11-21T01:28:58.170000 -CVE-2011-2784,0,1,3f696f53f8a2748d787b4082e9922a075fd52c630b5c33933c67a3763834030f,2024-11-21T01:28:58.293000 -CVE-2011-2785,0,1,89a8d7a96fcef2c32ce2b9bba0dfa905eceff357bb74d91a1f56dcfa92d6f364,2024-11-21T01:28:58.403000 -CVE-2011-2786,0,1,4914dc33b534c15fbc2457360786e3e7653b084dff9abacac7751bf4e025952c,2024-11-21T01:28:58.513000 -CVE-2011-2787,0,1,16c57d33e391df2d44838d638eddd46fedf9c8e8658ca9287c3594b9365fb1e8,2024-11-21T01:28:58.633000 -CVE-2011-2788,0,1,c0549e1390265b58ff122d2801cc3339d6a53c6d31f30e0191d2676543b20fcf,2024-11-21T01:28:58.757000 -CVE-2011-2789,0,1,68d30375831cd6e2dfa6697c00b553e9d04f6bdaf85b6e4d714f0b333d3f0991,2024-11-21T01:28:58.887000 -CVE-2011-2790,0,1,a253d6d438d49ce2b08ca0d85f8606e342a9242241ad82a0eebdfd711f77f67a,2024-11-21T01:28:59.013000 -CVE-2011-2791,0,1,cc3567352f7a2175b4685de66c06310b47a3f77fae986af2b5b5c190e9c2e037,2024-11-21T01:28:59.150000 -CVE-2011-2792,0,1,25098f30b0327a062dcb1f6e93b2e36e3bf1dc892d89c5d932a7cef285bf7047,2024-11-21T01:28:59.273000 -CVE-2011-2793,0,1,0ffdc0d5eba8364c9883f8f2e4f3e8e353263f7f00a4ae4c053562b660e4715c,2024-11-21T01:28:59.397000 -CVE-2011-2794,0,1,4256eadf4909bb10b088553a30806487baf6cacbbb518f790c2691b646cce956,2024-11-21T01:28:59.520000 -CVE-2011-2795,0,1,02b7a5c7a1e12c26791253fa1d5ed79001f64abd5984edfbaffafa1c6b399d70,2024-11-21T01:28:59.640000 -CVE-2011-2796,0,1,7c135c616907d1e978a96de55091875907a29b6b89f0fc12383f35ebedb36fcf,2024-11-21T01:28:59.773000 -CVE-2011-2797,0,1,de18ac5b1c2cc14df71495752cfe1368dcae8520b08b9e47c39b56b073a9a02a,2024-11-21T01:28:59.900000 -CVE-2011-2798,0,1,ec58e8493578e5fbb72b7ad7dba7643e191f1be888eff44253431ce60495d158,2024-11-21T01:29:00.013000 -CVE-2011-2799,0,1,512abe255de675ec41f509746f965831723d9e368a579b6074a52b93fdf5f41d,2024-11-21T01:29:00.137000 -CVE-2011-2800,0,1,00bb861564c3c8e0f65d1f74f8325c23dd0bfddf09bb0719f03278ddc6f42db0,2024-11-21T01:29:00.257000 -CVE-2011-2801,0,1,5cdab901fc4feec0ae4aa76d985bea4afda8bfefcf8384a01c90c1ee067955aa,2024-11-21T01:29:00.360000 -CVE-2011-2802,0,1,7c2ea2cb77635e9e4ab9fc264f859fd7d939c429af59aaf6da5adb04b62ea0aa,2024-11-21T01:29:00.463000 -CVE-2011-2803,0,1,9ad3f15f53818cda1629fc02f6c02fe84131b35e5598da2b2c5b595db1f4ae3c,2024-11-21T01:29:00.563000 -CVE-2011-2804,0,1,be2f79632008b0824b99df1417188091f0e071cb440e870826e39ce52db5a345,2024-11-21T01:29:00.677000 -CVE-2011-2805,0,1,d46a389e1a56023a2d942b4c518c955da0b5a6f25c1a6f9567aabb4a49a92cc5,2024-11-21T01:29:00.783000 -CVE-2011-2806,0,1,a57721262d4be812334e5145036c3e64f484a4957560ffb8c85a76ec8cf2929d,2024-11-21T01:29:00.897000 +CVE-2011-2778,0,0,9feccb874b1903819f3a7b9775c67e31557be5066e32644ccf132ec6a710ff3d,2024-11-21T01:28:57.570000 +CVE-2011-2779,0,0,11edacd3c83a9bb0cae467e5bd859adec6d9e3dfadccb5f36d9b3395d8ce5fab,2024-11-21T01:28:57.740000 +CVE-2011-2780,0,0,6c0f764abbb10fc0b0b3051302d338c6c13002fb1b1b1ab1feb249f81c9abf85,2024-11-21T01:28:57.883000 +CVE-2011-2782,0,0,9083c1cf347d59d8319504726d50c33ddf7577eb54c14becf43f050b169ffea1,2024-11-21T01:28:58.043000 +CVE-2011-2783,0,0,5a4d4e9a67db60c639d769fccbc13a294bd7379901ce521d26fb48b3ef34aa5d,2024-11-21T01:28:58.170000 +CVE-2011-2784,0,0,3f696f53f8a2748d787b4082e9922a075fd52c630b5c33933c67a3763834030f,2024-11-21T01:28:58.293000 +CVE-2011-2785,0,0,89a8d7a96fcef2c32ce2b9bba0dfa905eceff357bb74d91a1f56dcfa92d6f364,2024-11-21T01:28:58.403000 +CVE-2011-2786,0,0,4914dc33b534c15fbc2457360786e3e7653b084dff9abacac7751bf4e025952c,2024-11-21T01:28:58.513000 +CVE-2011-2787,0,0,16c57d33e391df2d44838d638eddd46fedf9c8e8658ca9287c3594b9365fb1e8,2024-11-21T01:28:58.633000 +CVE-2011-2788,0,0,c0549e1390265b58ff122d2801cc3339d6a53c6d31f30e0191d2676543b20fcf,2024-11-21T01:28:58.757000 +CVE-2011-2789,0,0,68d30375831cd6e2dfa6697c00b553e9d04f6bdaf85b6e4d714f0b333d3f0991,2024-11-21T01:28:58.887000 +CVE-2011-2790,0,0,a253d6d438d49ce2b08ca0d85f8606e342a9242241ad82a0eebdfd711f77f67a,2024-11-21T01:28:59.013000 +CVE-2011-2791,0,0,cc3567352f7a2175b4685de66c06310b47a3f77fae986af2b5b5c190e9c2e037,2024-11-21T01:28:59.150000 +CVE-2011-2792,0,0,25098f30b0327a062dcb1f6e93b2e36e3bf1dc892d89c5d932a7cef285bf7047,2024-11-21T01:28:59.273000 +CVE-2011-2793,0,0,0ffdc0d5eba8364c9883f8f2e4f3e8e353263f7f00a4ae4c053562b660e4715c,2024-11-21T01:28:59.397000 +CVE-2011-2794,0,0,4256eadf4909bb10b088553a30806487baf6cacbbb518f790c2691b646cce956,2024-11-21T01:28:59.520000 +CVE-2011-2795,0,0,02b7a5c7a1e12c26791253fa1d5ed79001f64abd5984edfbaffafa1c6b399d70,2024-11-21T01:28:59.640000 +CVE-2011-2796,0,0,7c135c616907d1e978a96de55091875907a29b6b89f0fc12383f35ebedb36fcf,2024-11-21T01:28:59.773000 +CVE-2011-2797,0,0,de18ac5b1c2cc14df71495752cfe1368dcae8520b08b9e47c39b56b073a9a02a,2024-11-21T01:28:59.900000 +CVE-2011-2798,0,0,ec58e8493578e5fbb72b7ad7dba7643e191f1be888eff44253431ce60495d158,2024-11-21T01:29:00.013000 +CVE-2011-2799,0,0,512abe255de675ec41f509746f965831723d9e368a579b6074a52b93fdf5f41d,2024-11-21T01:29:00.137000 +CVE-2011-2800,0,0,00bb861564c3c8e0f65d1f74f8325c23dd0bfddf09bb0719f03278ddc6f42db0,2024-11-21T01:29:00.257000 +CVE-2011-2801,0,0,5cdab901fc4feec0ae4aa76d985bea4afda8bfefcf8384a01c90c1ee067955aa,2024-11-21T01:29:00.360000 +CVE-2011-2802,0,0,7c2ea2cb77635e9e4ab9fc264f859fd7d939c429af59aaf6da5adb04b62ea0aa,2024-11-21T01:29:00.463000 +CVE-2011-2803,0,0,9ad3f15f53818cda1629fc02f6c02fe84131b35e5598da2b2c5b595db1f4ae3c,2024-11-21T01:29:00.563000 +CVE-2011-2804,0,0,be2f79632008b0824b99df1417188091f0e071cb440e870826e39ce52db5a345,2024-11-21T01:29:00.677000 +CVE-2011-2805,0,0,d46a389e1a56023a2d942b4c518c955da0b5a6f25c1a6f9567aabb4a49a92cc5,2024-11-21T01:29:00.783000 +CVE-2011-2806,0,0,a57721262d4be812334e5145036c3e64f484a4957560ffb8c85a76ec8cf2929d,2024-11-21T01:29:00.897000 CVE-2011-2807,0,0,408f691f688108acc5a6da9050a500b958ecebfcda4e1da0778cb5a315ff3b25,2023-11-07T02:07:55.100000 CVE-2011-2808,0,0,a4837028dd9f989df7d06402636af4af8b3a1807f686c9bbc84f391d82b1c3cd,2023-11-07T02:07:55.453000 -CVE-2011-2809,0,1,3e899372c4f5e844df5eef29bc325fdb1a9e05ae212e25fc515126ac83d930d3,2024-11-21T01:29:01.213000 +CVE-2011-2809,0,0,3e899372c4f5e844df5eef29bc325fdb1a9e05ae212e25fc515126ac83d930d3,2024-11-21T01:29:01.213000 CVE-2011-2810,0,0,b27fc5f95f863a544649c2be201cb9193ee0d5b76aea8458fe74b6d0a791e83d,2023-11-07T02:07:55.960000 -CVE-2011-2811,0,1,b410c377e64ebf664fb6e2b0153cc2e63cb94997d984defb3382b0ead4dc2b18,2024-11-21T01:29:01.370000 -CVE-2011-2813,0,1,97d00909ee975875562a0e3a32bb5d7efacc4fd813dda6bf2a6a9d8724eed018,2024-11-21T01:29:01.490000 -CVE-2011-2814,0,1,daa61bfa7aa04a360a8fc48d687ebeca330a0c6ebbeb9de89bcc86207468807b,2024-11-21T01:29:01.620000 -CVE-2011-2815,0,1,fa515839cc8e94b77e2fc38323600bd8204660d11cb1c70c20c599b454a1732e,2024-11-21T01:29:01.760000 -CVE-2011-2816,0,1,7927357df9d571d10901f21a290445ad501ec4fe7aaeb6ed053d5dabc72deba5,2024-11-21T01:29:01.887000 -CVE-2011-2817,0,1,1acf605a5920232ef4942562433c5ee27673fcb15d23b9937d180d56bdce0405,2024-11-21T01:29:02.040000 -CVE-2011-2818,0,1,c238e56dd0e97ee278fb1680849769c901a3b7a2f33c9f1af22932215b50f5df,2024-11-21T01:29:02.177000 -CVE-2011-2819,0,1,168422b07d209093c202281de89994d9945ad6707535e99ee33a2b8e42b131b6,2024-11-21T01:29:02.370000 -CVE-2011-2820,0,1,5a8d11d9c3b354d4c0f70207f14d1fc4a87b9b7b6db61230cd5a092c8a77e7b0,2024-11-21T01:29:02.980000 -CVE-2011-2821,0,1,b3ac0f37f8dfaa61de54244674e2064c2e5f1db8fd38d588752de0af2dc5e1f7,2024-11-21T01:29:03.377000 -CVE-2011-2822,0,1,1385fad51cc364c51693215252a3dac8ca5ea47db7c1944cbd48d8763e90db95,2024-11-21T01:29:03.930000 -CVE-2011-2823,0,1,d9abe7a672be2aa3319be9b14e73244d299e7287fe6558d80278fb2abb19ba3c,2024-11-21T01:29:04.557000 -CVE-2011-2824,0,1,2bd5c650f57e2d36bbccc689ced70b5bd0dc32aa13de54b004c69c8fed3ebf7f,2024-11-21T01:29:04.690000 -CVE-2011-2825,0,1,87a4caddac904b8ca370dbc0d5b3cd13c06518198316b78a5e28c304a81032a9,2024-11-21T01:29:04.830000 -CVE-2011-2826,0,1,80d2e8539aae99db44e1b67a0873beb207fb8e2c87b97dd8765c6a510eb8f8e9,2024-11-21T01:29:04.983000 -CVE-2011-2827,0,1,cf33736e4bd908d90ae2744d402e1fc779dfefee3a68a3d36dfe638a08dce674,2024-11-21T01:29:05.090000 -CVE-2011-2828,0,1,9b9fa321a767b91e90fc72bb79d02fd39c874c84ed13634656e0dd4dc5f4e442,2024-11-21T01:29:05.217000 -CVE-2011-2829,0,1,f45167105dd45b96a667cd6b21bb5064ea0f2739c052df42314d3f287d693b4e,2024-11-21T01:29:05.340000 -CVE-2011-2830,0,1,cb53c4c1cdf26ec5066bba58ba10fb7f3947e7152e318bd829b2412710587969,2024-11-21T01:29:05.453000 -CVE-2011-2831,0,1,9e394238267bb7334e93ede9b6b9042f584cc7fb480fc75a6785538c3fed9a04,2024-11-21T01:29:05.563000 +CVE-2011-2811,0,0,b410c377e64ebf664fb6e2b0153cc2e63cb94997d984defb3382b0ead4dc2b18,2024-11-21T01:29:01.370000 +CVE-2011-2813,0,0,97d00909ee975875562a0e3a32bb5d7efacc4fd813dda6bf2a6a9d8724eed018,2024-11-21T01:29:01.490000 +CVE-2011-2814,0,0,daa61bfa7aa04a360a8fc48d687ebeca330a0c6ebbeb9de89bcc86207468807b,2024-11-21T01:29:01.620000 +CVE-2011-2815,0,0,fa515839cc8e94b77e2fc38323600bd8204660d11cb1c70c20c599b454a1732e,2024-11-21T01:29:01.760000 +CVE-2011-2816,0,0,7927357df9d571d10901f21a290445ad501ec4fe7aaeb6ed053d5dabc72deba5,2024-11-21T01:29:01.887000 +CVE-2011-2817,0,0,1acf605a5920232ef4942562433c5ee27673fcb15d23b9937d180d56bdce0405,2024-11-21T01:29:02.040000 +CVE-2011-2818,0,0,c238e56dd0e97ee278fb1680849769c901a3b7a2f33c9f1af22932215b50f5df,2024-11-21T01:29:02.177000 +CVE-2011-2819,0,0,168422b07d209093c202281de89994d9945ad6707535e99ee33a2b8e42b131b6,2024-11-21T01:29:02.370000 +CVE-2011-2820,0,0,5a8d11d9c3b354d4c0f70207f14d1fc4a87b9b7b6db61230cd5a092c8a77e7b0,2024-11-21T01:29:02.980000 +CVE-2011-2821,0,0,b3ac0f37f8dfaa61de54244674e2064c2e5f1db8fd38d588752de0af2dc5e1f7,2024-11-21T01:29:03.377000 +CVE-2011-2822,0,0,1385fad51cc364c51693215252a3dac8ca5ea47db7c1944cbd48d8763e90db95,2024-11-21T01:29:03.930000 +CVE-2011-2823,0,0,d9abe7a672be2aa3319be9b14e73244d299e7287fe6558d80278fb2abb19ba3c,2024-11-21T01:29:04.557000 +CVE-2011-2824,0,0,2bd5c650f57e2d36bbccc689ced70b5bd0dc32aa13de54b004c69c8fed3ebf7f,2024-11-21T01:29:04.690000 +CVE-2011-2825,0,0,87a4caddac904b8ca370dbc0d5b3cd13c06518198316b78a5e28c304a81032a9,2024-11-21T01:29:04.830000 +CVE-2011-2826,0,0,80d2e8539aae99db44e1b67a0873beb207fb8e2c87b97dd8765c6a510eb8f8e9,2024-11-21T01:29:04.983000 +CVE-2011-2827,0,0,cf33736e4bd908d90ae2744d402e1fc779dfefee3a68a3d36dfe638a08dce674,2024-11-21T01:29:05.090000 +CVE-2011-2828,0,0,9b9fa321a767b91e90fc72bb79d02fd39c874c84ed13634656e0dd4dc5f4e442,2024-11-21T01:29:05.217000 +CVE-2011-2829,0,0,f45167105dd45b96a667cd6b21bb5064ea0f2739c052df42314d3f287d693b4e,2024-11-21T01:29:05.340000 +CVE-2011-2830,0,0,cb53c4c1cdf26ec5066bba58ba10fb7f3947e7152e318bd829b2412710587969,2024-11-21T01:29:05.453000 +CVE-2011-2831,0,0,9e394238267bb7334e93ede9b6b9042f584cc7fb480fc75a6785538c3fed9a04,2024-11-21T01:29:05.563000 CVE-2011-2833,0,0,0e824d0e7842001c2efaa7ac34ddc7e9ae927347361f06aefc07a4d5b933a15b,2023-11-07T02:08:02.803000 -CVE-2011-2834,0,1,d4beadeaa5f349ef75376dd11de985749b677988c354c66e4a7a6fc2dd867dd5,2024-11-21T01:29:05.840000 -CVE-2011-2835,0,1,15dfa98e348551e746f626a57fc1b4d91cbade99bb14c5b7d9b72db3a4a0e446,2024-11-21T01:29:05.973000 -CVE-2011-2836,0,1,66b545430280796eae7bb134783d40be137e2d84cb450d53a87709c096c972bd,2024-11-21T01:29:06.093000 -CVE-2011-2837,0,1,88681bcc034d7e00e57daa03cd2f81ee4eb09761ba47b9f019549b948c759acf,2024-11-21T01:29:06.200000 -CVE-2011-2838,0,1,71eb8f0b8ad0c0de3e6541312d388042497439521515ab298bb03e5bf3258446,2024-11-21T01:29:06.313000 -CVE-2011-2839,0,1,c0c15a05dd042e1c4f831bdca05971acd952611ba6ce420ecc4eda8ac35cc521,2024-11-21T01:29:06.437000 -CVE-2011-2840,0,1,55a3149ed5a026e82c4729595008d4641c9c06483c577f7a65b9e77f8d35a845,2024-11-21T01:29:06.543000 -CVE-2011-2841,0,1,559a3cd0c50206fd733074d2f65981be18a31bc5e5d8564bce768ed0d94d9e5f,2024-11-21T01:29:06.663000 -CVE-2011-2842,0,1,4e8e78040744c7298c35f917691c11a1b703be04f3c7c0aa85672d950dda2f57,2024-11-21T01:29:06.777000 -CVE-2011-2843,0,1,79650d1b63ec784081bd686c43754d49fc4e2f8dffde9d5c4cedd90f4440842d,2024-11-21T01:29:06.897000 -CVE-2011-2844,0,1,c2f086e87888a1759029f76d2f0feb8e3b285a175583b55448a668e75d1b3656,2024-11-21T01:29:07.007000 -CVE-2011-2845,0,1,ce857711a0c24ec15fa2c0a107279e4872cbaa33cbd5076e100ae0656057f89e,2024-11-21T01:29:07.133000 -CVE-2011-2846,0,1,aebbd483657fd920156a55cc2477f308d1551a9c2d99785b2213a94e1d4b50ae,2024-11-21T01:29:07.263000 -CVE-2011-2847,0,1,dc8743f4fd35bdcfe621e95b949d776cd178e0a734dce7f2fc1fd34b3d416812,2024-11-21T01:29:07.387000 -CVE-2011-2848,0,1,e57661f23a1887930c56e32924be8edfc81874e1b15deab6319887d7cc697f4c,2024-11-21T01:29:07.510000 -CVE-2011-2849,0,1,2494251ec698fd0c59e1de025cb020384a8aaf561066c3767b56b3b45e20d2aa,2024-11-21T01:29:07.647000 -CVE-2011-2850,0,1,13f24ce5522d466006dc9f9499a815d6a6e96530ad161e8a69f4c53c468cdbd7,2024-11-21T01:29:07.767000 -CVE-2011-2851,0,1,217fa07369121dec5b9685f9fb1c60b7978efc5b537f18c1b4b5e6b0b6064ae0,2024-11-21T01:29:07.880000 -CVE-2011-2852,0,1,9bdfe3e6bb49daf7b7dd3d27b729cc5ad96bd07168a29c4f86d53c5cfc6a7f8d,2024-11-21T01:29:07.990000 -CVE-2011-2853,0,1,854e0e1c7567a9c91089b6591bae3290dbe2024a2fd5ca6fc9a3110022bb01b2,2024-11-21T01:29:08.090000 -CVE-2011-2854,0,1,eac6dde86fb40512d6224e00cd7410dc8a481decafbbbf8825cfd7b15b0f47a4,2024-11-21T01:29:08.203000 -CVE-2011-2855,0,1,654d484f0d3b13aece73dfe900819ab54d20dc297ce64004870d2723df2512d1,2024-11-21T01:29:08.330000 -CVE-2011-2856,0,1,fc554bbb80ebf783d7abbeaab1d36f6c14f68f906969fc77696056faa131472e,2024-11-21T01:29:08.447000 -CVE-2011-2857,0,1,f23aff0fa31f9ee24f27499b4fb2eed4840cf64e88751397884c09a21c92542d,2024-11-21T01:29:08.553000 -CVE-2011-2858,0,1,b44faf4420c11e57abf6caff6550829e7f077d1993d1fddce5b3ff1b583a3af4,2024-11-21T01:29:08.677000 -CVE-2011-2859,0,1,5d4356943061ae691de84458f5a56338d397bd9fb1c118d1ebbe6690a3a9e30c,2024-11-21T01:29:08.783000 -CVE-2011-2860,0,1,bbb39224e5c5574f38455671104d388c44f641b7e3a11dbcc11274f3a9101f1b,2024-11-21T01:29:08.900000 -CVE-2011-2861,0,1,33f9ec33c519baabfc193a9d0f5b465e2500f0b89e31714747d9fcddf1e33b16,2024-11-21T01:29:09.020000 -CVE-2011-2862,0,1,6173ea3942663cdb190b4053ee01574bdd1da8c669d120531d73e557a98824f4,2024-11-21T01:29:09.133000 +CVE-2011-2834,0,0,d4beadeaa5f349ef75376dd11de985749b677988c354c66e4a7a6fc2dd867dd5,2024-11-21T01:29:05.840000 +CVE-2011-2835,0,0,15dfa98e348551e746f626a57fc1b4d91cbade99bb14c5b7d9b72db3a4a0e446,2024-11-21T01:29:05.973000 +CVE-2011-2836,0,0,66b545430280796eae7bb134783d40be137e2d84cb450d53a87709c096c972bd,2024-11-21T01:29:06.093000 +CVE-2011-2837,0,0,88681bcc034d7e00e57daa03cd2f81ee4eb09761ba47b9f019549b948c759acf,2024-11-21T01:29:06.200000 +CVE-2011-2838,0,0,71eb8f0b8ad0c0de3e6541312d388042497439521515ab298bb03e5bf3258446,2024-11-21T01:29:06.313000 +CVE-2011-2839,0,0,c0c15a05dd042e1c4f831bdca05971acd952611ba6ce420ecc4eda8ac35cc521,2024-11-21T01:29:06.437000 +CVE-2011-2840,0,0,55a3149ed5a026e82c4729595008d4641c9c06483c577f7a65b9e77f8d35a845,2024-11-21T01:29:06.543000 +CVE-2011-2841,0,0,559a3cd0c50206fd733074d2f65981be18a31bc5e5d8564bce768ed0d94d9e5f,2024-11-21T01:29:06.663000 +CVE-2011-2842,0,0,4e8e78040744c7298c35f917691c11a1b703be04f3c7c0aa85672d950dda2f57,2024-11-21T01:29:06.777000 +CVE-2011-2843,0,0,79650d1b63ec784081bd686c43754d49fc4e2f8dffde9d5c4cedd90f4440842d,2024-11-21T01:29:06.897000 +CVE-2011-2844,0,0,c2f086e87888a1759029f76d2f0feb8e3b285a175583b55448a668e75d1b3656,2024-11-21T01:29:07.007000 +CVE-2011-2845,0,0,ce857711a0c24ec15fa2c0a107279e4872cbaa33cbd5076e100ae0656057f89e,2024-11-21T01:29:07.133000 +CVE-2011-2846,0,0,aebbd483657fd920156a55cc2477f308d1551a9c2d99785b2213a94e1d4b50ae,2024-11-21T01:29:07.263000 +CVE-2011-2847,0,0,dc8743f4fd35bdcfe621e95b949d776cd178e0a734dce7f2fc1fd34b3d416812,2024-11-21T01:29:07.387000 +CVE-2011-2848,0,0,e57661f23a1887930c56e32924be8edfc81874e1b15deab6319887d7cc697f4c,2024-11-21T01:29:07.510000 +CVE-2011-2849,0,0,2494251ec698fd0c59e1de025cb020384a8aaf561066c3767b56b3b45e20d2aa,2024-11-21T01:29:07.647000 +CVE-2011-2850,0,0,13f24ce5522d466006dc9f9499a815d6a6e96530ad161e8a69f4c53c468cdbd7,2024-11-21T01:29:07.767000 +CVE-2011-2851,0,0,217fa07369121dec5b9685f9fb1c60b7978efc5b537f18c1b4b5e6b0b6064ae0,2024-11-21T01:29:07.880000 +CVE-2011-2852,0,0,9bdfe3e6bb49daf7b7dd3d27b729cc5ad96bd07168a29c4f86d53c5cfc6a7f8d,2024-11-21T01:29:07.990000 +CVE-2011-2853,0,0,854e0e1c7567a9c91089b6591bae3290dbe2024a2fd5ca6fc9a3110022bb01b2,2024-11-21T01:29:08.090000 +CVE-2011-2854,0,0,eac6dde86fb40512d6224e00cd7410dc8a481decafbbbf8825cfd7b15b0f47a4,2024-11-21T01:29:08.203000 +CVE-2011-2855,0,0,654d484f0d3b13aece73dfe900819ab54d20dc297ce64004870d2723df2512d1,2024-11-21T01:29:08.330000 +CVE-2011-2856,0,0,fc554bbb80ebf783d7abbeaab1d36f6c14f68f906969fc77696056faa131472e,2024-11-21T01:29:08.447000 +CVE-2011-2857,0,0,f23aff0fa31f9ee24f27499b4fb2eed4840cf64e88751397884c09a21c92542d,2024-11-21T01:29:08.553000 +CVE-2011-2858,0,0,b44faf4420c11e57abf6caff6550829e7f077d1993d1fddce5b3ff1b583a3af4,2024-11-21T01:29:08.677000 +CVE-2011-2859,0,0,5d4356943061ae691de84458f5a56338d397bd9fb1c118d1ebbe6690a3a9e30c,2024-11-21T01:29:08.783000 +CVE-2011-2860,0,0,bbb39224e5c5574f38455671104d388c44f641b7e3a11dbcc11274f3a9101f1b,2024-11-21T01:29:08.900000 +CVE-2011-2861,0,0,33f9ec33c519baabfc193a9d0f5b465e2500f0b89e31714747d9fcddf1e33b16,2024-11-21T01:29:09.020000 +CVE-2011-2862,0,0,6173ea3942663cdb190b4053ee01574bdd1da8c669d120531d73e557a98824f4,2024-11-21T01:29:09.133000 CVE-2011-2863,0,0,001006a0d23caea118d834b371de034d5f6e37205a9c597ac9673dfe6faaa079,2020-06-04T17:16:16.060000 -CVE-2011-2864,0,1,b4cd8981adc4d9f8b82498a5f68b07068987ab6f42a49057fbc914530043d1d5,2024-11-21T01:29:09.367000 +CVE-2011-2864,0,0,b4cd8981adc4d9f8b82498a5f68b07068987ab6f42a49057fbc914530043d1d5,2024-11-21T01:29:09.367000 CVE-2011-2866,0,0,bf66f82261dc3829d58ae69c4e3c0a9a4c8dd209fb116456a91020178436fa06,2023-11-07T02:08:14.223000 CVE-2011-2867,0,0,7fb1303eb36d54d7d8df0dfb4cf454c99fb7edb48ee29e9fbdc08df2045a01c9,2023-11-07T02:08:14.587000 CVE-2011-2868,0,0,f1b556bc67b90bc250fb0437d7683655ebb338bafd6d4454c30eb074223fcf57,2023-11-07T02:08:14.983000 @@ -49549,40 +49549,40 @@ CVE-2011-2870,0,0,9af8c86eb180d66d853ca6ba789bb1de4a1d4222513de43755e58480ed14db CVE-2011-2871,0,0,0ffb2af4bcfbb5276c2596be07a113c9e23a516b88171b7197927317f6eca046,2023-11-07T02:08:15.840000 CVE-2011-2872,0,0,2f350a526bf6d6e31c005f68fec288d18fc8531729147a8b269e1cf1417c88f3,2023-11-07T02:08:16.123000 CVE-2011-2873,0,0,ee1946f161f32ec7d14b3ae9dcb67b2bd243fdcd1ea926c482cd97790962d540,2023-11-07T02:08:16.397000 -CVE-2011-2874,0,1,5ae8a394b8d8ce3658fee2b7b78385152f6f27337940d0af25527f2218beb9e6,2024-11-21T01:29:10.547000 -CVE-2011-2875,0,1,01a38a0ca3541a7df46545d91bb9ccaf4d9acff031e95b2acb32f1ce6d1f0a3b,2024-11-21T01:29:10.663000 -CVE-2011-2876,0,1,80b0c1d7c351e777db806341d2f8a0827e27e79ee78b9ed1cf1697f1788f60e7,2024-11-21T01:29:10.777000 -CVE-2011-2877,0,1,ea7bfba9b693c2cc1b558c47487a18e21fe3024674c76389b79f1241e6ad8015,2024-11-21T01:29:10.893000 -CVE-2011-2878,0,1,275eb673efefaf5af55bf93a1eca8ccde0a3ffd9f90f25174a89ec3e67bbe6c7,2024-11-21T01:29:11.013000 -CVE-2011-2879,0,1,0e6be940de5e40fc4e75072eb0e0b88216a0a7fb33db0516832ab625b5cbf385,2024-11-21T01:29:11.123000 -CVE-2011-2880,0,1,a13c8521e3a1ba0731d31de590a55822efc4e2365fa1b7d9e87eb64c4ce093f9,2024-11-21T01:29:11.237000 -CVE-2011-2881,0,1,6586660554c614b05b2cbaaa89a5631c89813809c3cb47ca3f9228269da470a7,2024-11-21T01:29:11.353000 -CVE-2011-2882,0,1,c6195d90c63071142597a36a8a5a1fcbb0fb47901fc6217bdd19321de5ba8f99,2024-11-21T01:29:11.453000 -CVE-2011-2883,0,1,c85dab66581148e4d378644ff91edbfcc510c3bb5b9ed965709c460c098aeca2,2024-11-21T01:29:11.590000 -CVE-2011-2884,0,1,3635488cd657572af8ade5695e213508b447b17d520d6e6231d1641d298ca532,2024-11-21T01:29:11.727000 -CVE-2011-2885,0,1,04d86ce3df5d2562eeef3f8c7335ecf168094b4a0ad8dc84db57f35252314f86,2024-11-21T01:29:11.877000 -CVE-2011-2886,0,1,7592020aed11077521dbcc284d8b7e3fc810c49b7c655c4e2d70460c5435defb,2024-11-21T01:29:12.033000 -CVE-2011-2887,0,1,547558511262d761b0370d40cdb75c9d6906870c8e09e80d5d2e351aa56afa0f,2024-11-21T01:29:12.183000 -CVE-2011-2888,0,1,cbbda6010f25bfaf9b95e7c0cc168274047bda87897d4ce34d243a2fc6fe3b55,2024-11-21T01:29:12.340000 -CVE-2011-2889,0,1,87aa84759c034063e42bac67b9bb250487cde41d8a51072d1c3d159fd0993f55,2024-11-21T01:29:12.473000 -CVE-2011-2890,0,1,3c048821ed7c51340a6d56bbcc3e2ae5bd67dcb1af1490d8870a443c23792fc9,2024-11-21T01:29:12.623000 -CVE-2011-2891,0,1,a8990811eb7149a88e9c8d2f5257a69900fd71676fbf668e7abaa33385f167d1,2024-11-21T01:29:12.770000 -CVE-2011-2892,0,1,c8e16d1a3c0a4c4ddd2024f2d81058b36635997567aeaf90a77cd2bfb399066a,2024-11-21T01:29:12.927000 -CVE-2011-2893,0,1,6a12dd0653945d1ebf85f9daabc5d388786d85686e0b508c0d692537930b3a1b,2024-11-21T01:29:13.063000 -CVE-2011-2894,0,1,ed208a770a3ab6d6268d8aab900f17157d76b3e09d63b9cf771f0106d057fbbe,2024-11-21T01:29:13.193000 -CVE-2011-2895,0,1,1d542b0fe94ee6c88db1a790ce463417a263498047d84cb2f30ec336f5a18dbd,2024-11-21T01:29:13.317000 -CVE-2011-2896,0,1,ba4de3a818b984d37aeb569720a6c88a3094227f6ac6a7e34fd2ee579ea88dce,2024-11-21T01:29:13.487000 +CVE-2011-2874,0,0,5ae8a394b8d8ce3658fee2b7b78385152f6f27337940d0af25527f2218beb9e6,2024-11-21T01:29:10.547000 +CVE-2011-2875,0,0,01a38a0ca3541a7df46545d91bb9ccaf4d9acff031e95b2acb32f1ce6d1f0a3b,2024-11-21T01:29:10.663000 +CVE-2011-2876,0,0,80b0c1d7c351e777db806341d2f8a0827e27e79ee78b9ed1cf1697f1788f60e7,2024-11-21T01:29:10.777000 +CVE-2011-2877,0,0,ea7bfba9b693c2cc1b558c47487a18e21fe3024674c76389b79f1241e6ad8015,2024-11-21T01:29:10.893000 +CVE-2011-2878,0,0,275eb673efefaf5af55bf93a1eca8ccde0a3ffd9f90f25174a89ec3e67bbe6c7,2024-11-21T01:29:11.013000 +CVE-2011-2879,0,0,0e6be940de5e40fc4e75072eb0e0b88216a0a7fb33db0516832ab625b5cbf385,2024-11-21T01:29:11.123000 +CVE-2011-2880,0,0,a13c8521e3a1ba0731d31de590a55822efc4e2365fa1b7d9e87eb64c4ce093f9,2024-11-21T01:29:11.237000 +CVE-2011-2881,0,0,6586660554c614b05b2cbaaa89a5631c89813809c3cb47ca3f9228269da470a7,2024-11-21T01:29:11.353000 +CVE-2011-2882,0,0,c6195d90c63071142597a36a8a5a1fcbb0fb47901fc6217bdd19321de5ba8f99,2024-11-21T01:29:11.453000 +CVE-2011-2883,0,0,c85dab66581148e4d378644ff91edbfcc510c3bb5b9ed965709c460c098aeca2,2024-11-21T01:29:11.590000 +CVE-2011-2884,0,0,3635488cd657572af8ade5695e213508b447b17d520d6e6231d1641d298ca532,2024-11-21T01:29:11.727000 +CVE-2011-2885,0,0,04d86ce3df5d2562eeef3f8c7335ecf168094b4a0ad8dc84db57f35252314f86,2024-11-21T01:29:11.877000 +CVE-2011-2886,0,0,7592020aed11077521dbcc284d8b7e3fc810c49b7c655c4e2d70460c5435defb,2024-11-21T01:29:12.033000 +CVE-2011-2887,0,0,547558511262d761b0370d40cdb75c9d6906870c8e09e80d5d2e351aa56afa0f,2024-11-21T01:29:12.183000 +CVE-2011-2888,0,0,cbbda6010f25bfaf9b95e7c0cc168274047bda87897d4ce34d243a2fc6fe3b55,2024-11-21T01:29:12.340000 +CVE-2011-2889,0,0,87aa84759c034063e42bac67b9bb250487cde41d8a51072d1c3d159fd0993f55,2024-11-21T01:29:12.473000 +CVE-2011-2890,0,0,3c048821ed7c51340a6d56bbcc3e2ae5bd67dcb1af1490d8870a443c23792fc9,2024-11-21T01:29:12.623000 +CVE-2011-2891,0,0,a8990811eb7149a88e9c8d2f5257a69900fd71676fbf668e7abaa33385f167d1,2024-11-21T01:29:12.770000 +CVE-2011-2892,0,0,c8e16d1a3c0a4c4ddd2024f2d81058b36635997567aeaf90a77cd2bfb399066a,2024-11-21T01:29:12.927000 +CVE-2011-2893,0,0,6a12dd0653945d1ebf85f9daabc5d388786d85686e0b508c0d692537930b3a1b,2024-11-21T01:29:13.063000 +CVE-2011-2894,0,0,ed208a770a3ab6d6268d8aab900f17157d76b3e09d63b9cf771f0106d057fbbe,2024-11-21T01:29:13.193000 +CVE-2011-2895,0,0,1d542b0fe94ee6c88db1a790ce463417a263498047d84cb2f30ec336f5a18dbd,2024-11-21T01:29:13.317000 +CVE-2011-2896,0,0,ba4de3a818b984d37aeb569720a6c88a3094227f6ac6a7e34fd2ee579ea88dce,2024-11-21T01:29:13.487000 CVE-2011-2897,0,0,fedd3202dd9f466bf8cd108ed854f5bd3645b69e06a1d202e4d46b16247fe505,2019-11-14T15:28:37.130000 CVE-2011-2898,0,0,230c1ff60008de87d497a189f7542c536616907cd5783145feaa474484997b04,2023-02-13T04:31:14.910000 -CVE-2011-2899,0,1,a409ffef574ea184f743b1d2177ff191ccd951db1d06ddf395c98b7ccc6a2ee7,2024-11-21T01:29:13.890000 -CVE-2011-2900,0,1,93ca9603b5ba0ca38f64e874158d3d10ffda82c041662d9af001e1fbaddd6745,2024-11-21T01:29:14.027000 +CVE-2011-2899,0,0,a409ffef574ea184f743b1d2177ff191ccd951db1d06ddf395c98b7ccc6a2ee7,2024-11-21T01:29:13.890000 +CVE-2011-2900,0,0,93ca9603b5ba0ca38f64e874158d3d10ffda82c041662d9af001e1fbaddd6745,2024-11-21T01:29:14.027000 CVE-2011-2901,0,0,1e5a1cd0ab7e9785540d4fd0e68b4acc9a374702e66375f54c45f86f07a664f8,2023-02-13T04:31:28.443000 CVE-2011-2902,0,0,7d195580db79228d0a9d02326a90f16b4bed592dd1ea985a5313aff169be1b7e,2018-02-23T15:57:33.913000 -CVE-2011-2903,0,1,e2511e25c14e3d271db38676003b951b75e7880f74b9da72d817ddca4d927fc7,2024-11-21T01:29:14.427000 -CVE-2011-2904,0,1,c5218c360f6f3eb7cf201719f4bd2f72d52f9bae25452f5589c9d66623fbcb54,2024-11-21T01:29:14.550000 +CVE-2011-2903,0,0,e2511e25c14e3d271db38676003b951b75e7880f74b9da72d817ddca4d927fc7,2024-11-21T01:29:14.427000 +CVE-2011-2904,0,0,c5218c360f6f3eb7cf201719f4bd2f72d52f9bae25452f5589c9d66623fbcb54,2024-11-21T01:29:14.550000 CVE-2011-2905,0,0,144584b8f603c92444319abe5f8d96a42bc361b3b937740301b8f29eb2e61e27,2023-02-13T00:19:13.417000 CVE-2011-2906,0,0,cd6709002bbe141150f0fef2a86bd2b88dae13ecb700d32ef5e970e6041c8bfa,2024-08-07T00:15:19.440000 -CVE-2011-2907,0,1,f56eda4ac948a70e80034029de2dfddf8cf5fdd165769abc4fc3b476c1e13d51,2024-11-21T01:29:14.980000 +CVE-2011-2907,0,0,f56eda4ac948a70e80034029de2dfddf8cf5fdd165769abc4fc3b476c1e13d51,2024-11-21T01:29:14.980000 CVE-2011-2908,0,0,913f108243500962bf254fc6b3a4b45fe3d1f549ca8cc20731cc450864a9622a,2023-02-13T04:32:09.430000 CVE-2011-2909,0,0,859783f147807873420167a0fea742a8ce7c7779c11022409979d75ba48da6da,2023-02-13T04:32:09.577000 CVE-2011-2910,0,0,e27de25fc43e003b7ecdb0bcdf842697966ba403ab65c123e119d806bb8bf5da,2019-11-26T15:08:52.157000 @@ -49592,7 +49592,7 @@ CVE-2011-2913,0,0,e16f43932b8870094ad79104438cb7ae608fffdcebc8223cfed6446831d400 CVE-2011-2914,0,0,c7413a49f3a0e00799f4c1e5f7a464baeaa8dedaba0afb2f768a6f5541d6cfe1,2023-02-13T00:19:27.987000 CVE-2011-2915,0,0,6e9f02814261e43d956c5f9c2655b1b5e0e93ed89cde81ff5bda767183467544,2023-02-13T00:19:28.853000 CVE-2011-2916,0,0,bb806512640a06d78fa85c8ff015cbc76a45453a6d782e260846acbd3894ab07,2019-11-22T19:24:29.507000 -CVE-2011-2917,0,1,17922c2007814551cda16cc44bbc92175e2dc68eaf198e78e4abc77b9f4cd90a,2024-11-21T01:29:16.437000 +CVE-2011-2917,0,0,17922c2007814551cda16cc44bbc92175e2dc68eaf198e78e4abc77b9f4cd90a,2024-11-21T01:29:16.437000 CVE-2011-2918,0,0,40610ba5831711e639e0803ad1ec05e76cd0ef19a84ef6f8a517b47b3a070c80,2023-02-13T04:32:10.680000 CVE-2011-2919,0,0,7d940d9ecaefb6eb93d0bb3286195fce500bd9c1e263e0b5292f52f340608490,2023-02-13T04:32:11.657000 CVE-2011-2920,0,0,538e6d2af1549478ea79329ec54054b279e4ee36c0940826edab0bd5d6ede46a,2023-02-13T04:32:12.107000 @@ -49600,46 +49600,46 @@ CVE-2011-2921,0,0,5e99e31ed7919fc0c7b213635326ccd64b5001283df7162f813cb1b9deb136 CVE-2011-2922,0,0,73ca7d63a2a45e0ef3a60a08843ad5f3bc7a5061c4a8f1950588ad767eaed6b3,2019-11-21T15:28:40.360000 CVE-2011-2923,0,0,81a8cd9099fa727d5f010254016d1aa525e6e1261f22f84b3c737c612594bd76,2020-08-18T15:05:57.813000 CVE-2011-2924,0,0,955568144ba971de8fcb86219ed9256d9f3d63903514f8862b5163d49efa4fa3,2020-08-18T15:05:57.813000 -CVE-2011-2925,0,1,d5020d3418ef28ebc8f07eae26323ec8e14d7e4e620f33da866a437bc0162f45,2024-11-21T01:29:17.430000 +CVE-2011-2925,0,0,d5020d3418ef28ebc8f07eae26323ec8e14d7e4e620f33da866a437bc0162f45,2024-11-21T01:29:17.430000 CVE-2011-2926,0,0,dc37f7bf85021e763f65f58788e109386a74fa3f05a73022e3be83dcacf09af7,2023-11-07T02:08:20.700000 CVE-2011-2927,0,0,9ba24df90d9cec53087c773ba23b0e4074c7c76144497c6993a49e1c34428d79,2023-02-13T01:20:34.130000 -CVE-2011-2928,0,1,f218f2c68e3bcced7285e197a4bc6b17a5c7ed303676b38220a57c2fc0537900,2024-11-21T01:29:17.680000 -CVE-2011-2929,0,1,7448c6ac8a3ef6736b5c62fb9a511a1be2eb528afa527720b52ac6ed3ff6a349,2024-11-21T01:29:17.813000 -CVE-2011-2930,0,1,00684f542734e88d83bc7c19698dd938d9d0c3d370b39bc362cd1041609b365c,2024-11-21T01:29:17.973000 -CVE-2011-2931,0,1,562b9cfb2aeb3c3c5de9eb716d4f58a78c07339251d16bd718cb06b39f2ffc0a,2024-11-21T01:29:18.147000 -CVE-2011-2932,0,1,162f715fcc18a9a0127798d727baecebab53926c7e74fd1866a11bae417f9871,2024-11-21T01:29:18.313000 +CVE-2011-2928,0,0,f218f2c68e3bcced7285e197a4bc6b17a5c7ed303676b38220a57c2fc0537900,2024-11-21T01:29:17.680000 +CVE-2011-2929,0,0,7448c6ac8a3ef6736b5c62fb9a511a1be2eb528afa527720b52ac6ed3ff6a349,2024-11-21T01:29:17.813000 +CVE-2011-2930,0,0,00684f542734e88d83bc7c19698dd938d9d0c3d370b39bc362cd1041609b365c,2024-11-21T01:29:17.973000 +CVE-2011-2931,0,0,562b9cfb2aeb3c3c5de9eb716d4f58a78c07339251d16bd718cb06b39f2ffc0a,2024-11-21T01:29:18.147000 +CVE-2011-2932,0,0,162f715fcc18a9a0127798d727baecebab53926c7e74fd1866a11bae417f9871,2024-11-21T01:29:18.313000 CVE-2011-2933,0,0,0ed022a519734d93502c9aea0ece8163ac53ee510ee259b2261560848820bb04,2020-01-21T19:46:21.667000 CVE-2011-2934,0,0,78dca4f136d1b9bc7f35ef6a29d6ebf74c5c82ab1805864cf6eda0719c854e04,2020-01-17T17:19:46.547000 CVE-2011-2935,0,0,9c2beaaabe24e108b3b357503428b77a333b94c4486d57397dfb16a5c46233dc,2019-11-13T19:29:22.720000 CVE-2011-2936,0,0,4298c05d33aa215850c1921ebeac5675d9da6e46468f451ce4bd5f3de0e47228,2019-11-12T21:53:12.030000 -CVE-2011-2937,0,1,0affbd958196870e99ef760f55ff1d5427f4bbd6a39a53b4d7f16261f26357af,2024-11-21T01:29:18.957000 -CVE-2011-2938,0,1,c15a3d6280965cc38d90011b2f567de91e03a6c808f8b3214af8267f6db625da,2024-11-21T01:29:19.090000 -CVE-2011-2939,0,1,50f051d12cb0b5395ee6a2540ad911e1ef31fda0bfc9f684d904fa003b26c955,2024-11-21T01:29:19.240000 -CVE-2011-2940,0,1,c6d5552da451e405e1364a4d44014fe832f792862aaea789b2faff0257885310,2024-11-21T01:29:19.400000 +CVE-2011-2937,0,0,0affbd958196870e99ef760f55ff1d5427f4bbd6a39a53b4d7f16261f26357af,2024-11-21T01:29:18.957000 +CVE-2011-2938,0,0,c15a3d6280965cc38d90011b2f567de91e03a6c808f8b3214af8267f6db625da,2024-11-21T01:29:19.090000 +CVE-2011-2939,0,0,50f051d12cb0b5395ee6a2540ad911e1ef31fda0bfc9f684d904fa003b26c955,2024-11-21T01:29:19.240000 +CVE-2011-2940,0,0,c6d5552da451e405e1364a4d44014fe832f792862aaea789b2faff0257885310,2024-11-21T01:29:19.400000 CVE-2011-2941,0,0,6f54d04f9971e434deb71b9479954bdaba5b0d83d3dd23f03e29486ab83231de,2014-03-10T21:26:26.063000 CVE-2011-2942,0,0,eb6001945d2166ed061ee545c74f80a7665f6be3eaf273a4efd07650b0b4e545,2023-02-13T01:20:39.110000 -CVE-2011-2943,0,1,494d96a757d78b403c13b1f6a047d80f2c38d9f986abe75d3c6bca6603df52ff,2024-11-21T01:29:19.757000 +CVE-2011-2943,0,0,494d96a757d78b403c13b1f6a047d80f2c38d9f986abe75d3c6bca6603df52ff,2024-11-21T01:29:19.757000 CVE-2011-2944,0,0,564c806b2a0527fb6ca1a2446146e7c3b2fd6c22f76e87b05a7484b5c9e01e91,2017-08-29T01:29:53.223000 -CVE-2011-2945,0,1,fa6eba451862fa11b0c403c1c31f2e51812b9f331fe7a55687993405fd5ea45d,2024-11-21T01:29:20.043000 -CVE-2011-2946,0,1,5e03727cc8316c497295e7608f4a4e65f3fd4a115400a76580fb5c4a15fa2b8f,2024-11-21T01:29:20.193000 -CVE-2011-2947,0,1,be6b341d9987033abc39b93e8142e084f836275308f6230d9a1866de931e4d7e,2024-11-21T01:29:20.360000 -CVE-2011-2948,0,1,d16f56b7cf6b0f46f23a05864b81acfbd56fa383c262954f4043195be0c53763,2024-11-21T01:29:20.530000 -CVE-2011-2949,0,1,e3fdae58eb1b193048f7777d8dfda8e1d380fd66b20c1af6d7318718a3b230f8,2024-11-21T01:29:20.683000 -CVE-2011-2950,0,1,32d1896ed9616a98a3a154f47570ed1c301797e4e7a81ff8cf5b98e01fdc2bae,2024-11-21T01:29:20.827000 -CVE-2011-2951,0,1,d56581df9009871c79789c244a8a2a04acd5bc48c90633d0b5068f7793be5626,2024-11-21T01:29:20.977000 -CVE-2011-2952,0,1,a6d3dbd9817ae42248b25541e19fd3d1ccc70701210f044d7133c1458dd06cbd,2024-11-21T01:29:21.120000 -CVE-2011-2953,0,1,0e6f069ca8f2cd9ca27bc9d9fc807c1256efd205a242e2041c1951960a8a9c59,2024-11-21T01:29:21.253000 -CVE-2011-2954,0,1,95dc44264abe492001a8404f78e512a105c09d19dfa2a3396433a27d540d18dc,2024-11-21T01:29:21.397000 -CVE-2011-2955,0,1,cbc589ce4d1fdaa6cd1c0c2b4b022d29d0ebbfb440d416791a45a5634607863d,2024-11-21T01:29:21.537000 -CVE-2011-2956,0,1,f976280558b1f121a2295b22fbb564a9ffcc23c75a083ea0fbe68e808939d07e,2024-11-21T01:29:21.680000 -CVE-2011-2957,0,1,fc24b6d6892f3aa8b2de595c4f0e0d7fc9be48e0eb8fce5ee826fbab305249b3,2024-11-21T01:29:21.827000 -CVE-2011-2958,0,1,e79a04ed498b58508e24d63d7c0ee3e004beebd5884031d188944b789f6d503a,2024-11-21T01:29:21.967000 -CVE-2011-2959,0,1,2abfd7a0812fb307fddf13ffda821762cd761dd2c71d9abe01f00388e1ce6973,2024-11-21T01:29:22.120000 -CVE-2011-2960,0,1,0ff9db4cd5bfd84ee4d3c88610ac646da6d6879188f0820b807dbc3c5fdd9b1c,2024-11-21T01:29:22.273000 -CVE-2011-2961,0,1,839d0c5fbec13bdbc35af0f69f23b7e5eb382a07573e631ddbf74a1ee6ba1819,2024-11-21T01:29:22.440000 -CVE-2011-2962,0,1,f243bdcf46757918cbf61e99189447dcd5c53c502a614aaff190f1be1b6703b9,2024-11-21T01:29:22.577000 -CVE-2011-2963,0,1,205a47926e9a94f47e21b9ee12477600039b361700b5ec78f5cf38a9553c4dac,2024-11-21T01:29:22.730000 -CVE-2011-2964,0,1,ff96255d33c5ad2bdfbd9048ee95ff8558d46a26825f778f414a79fbd96bd0a8,2024-11-21T01:29:22.880000 +CVE-2011-2945,0,0,fa6eba451862fa11b0c403c1c31f2e51812b9f331fe7a55687993405fd5ea45d,2024-11-21T01:29:20.043000 +CVE-2011-2946,0,0,5e03727cc8316c497295e7608f4a4e65f3fd4a115400a76580fb5c4a15fa2b8f,2024-11-21T01:29:20.193000 +CVE-2011-2947,0,0,be6b341d9987033abc39b93e8142e084f836275308f6230d9a1866de931e4d7e,2024-11-21T01:29:20.360000 +CVE-2011-2948,0,0,d16f56b7cf6b0f46f23a05864b81acfbd56fa383c262954f4043195be0c53763,2024-11-21T01:29:20.530000 +CVE-2011-2949,0,0,e3fdae58eb1b193048f7777d8dfda8e1d380fd66b20c1af6d7318718a3b230f8,2024-11-21T01:29:20.683000 +CVE-2011-2950,0,0,32d1896ed9616a98a3a154f47570ed1c301797e4e7a81ff8cf5b98e01fdc2bae,2024-11-21T01:29:20.827000 +CVE-2011-2951,0,0,d56581df9009871c79789c244a8a2a04acd5bc48c90633d0b5068f7793be5626,2024-11-21T01:29:20.977000 +CVE-2011-2952,0,0,a6d3dbd9817ae42248b25541e19fd3d1ccc70701210f044d7133c1458dd06cbd,2024-11-21T01:29:21.120000 +CVE-2011-2953,0,0,0e6f069ca8f2cd9ca27bc9d9fc807c1256efd205a242e2041c1951960a8a9c59,2024-11-21T01:29:21.253000 +CVE-2011-2954,0,0,95dc44264abe492001a8404f78e512a105c09d19dfa2a3396433a27d540d18dc,2024-11-21T01:29:21.397000 +CVE-2011-2955,0,0,cbc589ce4d1fdaa6cd1c0c2b4b022d29d0ebbfb440d416791a45a5634607863d,2024-11-21T01:29:21.537000 +CVE-2011-2956,0,0,f976280558b1f121a2295b22fbb564a9ffcc23c75a083ea0fbe68e808939d07e,2024-11-21T01:29:21.680000 +CVE-2011-2957,0,0,fc24b6d6892f3aa8b2de595c4f0e0d7fc9be48e0eb8fce5ee826fbab305249b3,2024-11-21T01:29:21.827000 +CVE-2011-2958,0,0,e79a04ed498b58508e24d63d7c0ee3e004beebd5884031d188944b789f6d503a,2024-11-21T01:29:21.967000 +CVE-2011-2959,0,0,2abfd7a0812fb307fddf13ffda821762cd761dd2c71d9abe01f00388e1ce6973,2024-11-21T01:29:22.120000 +CVE-2011-2960,0,0,0ff9db4cd5bfd84ee4d3c88610ac646da6d6879188f0820b807dbc3c5fdd9b1c,2024-11-21T01:29:22.273000 +CVE-2011-2961,0,0,839d0c5fbec13bdbc35af0f69f23b7e5eb382a07573e631ddbf74a1ee6ba1819,2024-11-21T01:29:22.440000 +CVE-2011-2962,0,0,f243bdcf46757918cbf61e99189447dcd5c53c502a614aaff190f1be1b6703b9,2024-11-21T01:29:22.577000 +CVE-2011-2963,0,0,205a47926e9a94f47e21b9ee12477600039b361700b5ec78f5cf38a9553c4dac,2024-11-21T01:29:22.730000 +CVE-2011-2964,0,0,ff96255d33c5ad2bdfbd9048ee95ff8558d46a26825f778f414a79fbd96bd0a8,2024-11-21T01:29:22.880000 CVE-2011-2965,0,0,ca9e4b8de7d969097ab60f061b3dac424db35eb8eaa876506a78e29be8e9e14e,2023-11-07T02:08:21.247000 CVE-2011-2966,0,0,df7f098ec21f5b28cd593fe962c022e392eebb544de6490fdacf0e266a9bc87f,2023-11-07T02:08:21.470000 CVE-2011-2967,0,0,3ac73a5b66c2cfa1b3215806ab4ea6be6f24ce32ab0c74ee6922a846298eba7c,2023-11-07T02:08:21.680000 @@ -49650,45 +49650,45 @@ CVE-2011-2971,0,0,160ca30f56509ff384319119a299b36b7e4ad2d53eb7698aa900a52aa90f76 CVE-2011-2972,0,0,76211b6d3cea72e2b20f4b43fbf27cef599523ec76807f14d5ef43a670a64aa5,2023-11-07T02:08:22.813000 CVE-2011-2973,0,0,f6ae596e64572991fe5da95305d6494bbe1910c6f0af9589164552e046283630,2023-11-07T02:08:23.050000 CVE-2011-2974,0,0,e787b4c3f3960bdd16cc16d64542a100eed6b62537b7a0dc741fc1f8dd8d14e7,2023-11-07T02:08:23.313000 -CVE-2011-2975,0,1,6f4a215023ca4d0deabb1617a9732e485ac8e5a0b99a5967995a43df32d32d19,2024-11-21T01:29:23.163000 -CVE-2011-2976,0,1,34032b7ca0b5878ae1d554be8ab4b80c8cc80a468e52e82206973492dc1214b6,2024-11-21T01:29:23.320000 -CVE-2011-2977,0,1,be5aa9d0ec6f271b9aae1f40a69d7364a6cfaba48f632db476d22e92e9da933e,2024-11-21T01:29:23.487000 -CVE-2011-2978,0,1,5eacb633afab881dff841aad0475094d4161de18220c20a09210712bba2229ef,2024-11-21T01:29:23.637000 -CVE-2011-2979,0,1,deef23b0cd4a63d6f39b52cda067e94ebbe59cb91c37145465abdda31910277e,2024-11-21T01:29:23.803000 -CVE-2011-2980,0,1,92ac24cd42acacf21070ed3017fe33e412c0c9f27ae6a655478d8d5c35c41630,2024-11-21T01:29:23.967000 -CVE-2011-2981,0,1,ee6fa48873408d37ebc5caa1e9f15877b95632c94c3e26c7ebe74353921a02e7,2024-11-21T01:29:24.113000 -CVE-2011-2982,0,1,5b3186d0df1d1fee9ab3ae171124be658447d03058eeb057c4012238027af71c,2024-11-21T01:29:24.297000 -CVE-2011-2983,0,1,d269eba5de789723fe76f4ce67f83514ca4eae05ae59595d87de7c42b8ad0f38,2024-11-21T01:29:24.517000 -CVE-2011-2984,0,1,5e452a7e928b2e4d53db127824b76bab3a5e94a9b7b5ac4c4268d308e76e6998,2024-11-21T01:29:24.710000 -CVE-2011-2985,0,1,6d22e0f26877df8c4c99baeeaebf5b0532ab49dcb611536fd6e2f3ef92c72afb,2024-11-21T01:29:24.893000 -CVE-2011-2986,0,1,baa0b9543534de539ae0906df02f156150f5f088e4b4d952bf4a8b95e305b4d1,2024-11-21T01:29:25.113000 -CVE-2011-2987,0,1,1e4bfdcc15bc88b1d2cc9c07461a887b130fc1b80b81567fdb69f45263d691ba,2024-11-21T01:29:25.300000 -CVE-2011-2988,0,1,a2c231ba52ecb91070b400d533117dc121ee2b1c2257b9f684f8df8bc59ac7fd,2024-11-21T01:29:25.480000 -CVE-2011-2989,0,1,20654dc6fe5eeba3b9902231fdaf07d78169862f39125a684c76d7ad43c92e14,2024-11-21T01:29:25.670000 -CVE-2011-2990,0,1,616357fecb90bfd65eaa17b095db6f721d2fbe0cac64d2b38b30f7f7b9effcc7,2024-11-21T01:29:25.860000 -CVE-2011-2991,0,1,6b7f1a7e4ba1ea9a7237373130d259f14fb93487081c15026d7ba4dfbfcff252,2024-11-21T01:29:26.033000 -CVE-2011-2992,0,1,c9bc103a31873671090bca482eb2f90e645ff1568038e650c0675ea9fa7f92be,2024-11-21T01:29:26.217000 -CVE-2011-2993,0,1,cc876330e5bcfa3948667b8f7fcd8d4d7b6faca23d91210164740bb2174a0227,2024-11-21T01:29:26.397000 -CVE-2011-2995,0,1,10b69eb44e02f73756b7627243f4daee8743e1154914f27e90471ac7a8f68641,2024-11-21T01:29:26.553000 -CVE-2011-2996,0,1,63f779be5b98a5566b9a8feabf8b755b1c68d27f37c5e495a6870a5b68171dd5,2024-11-21T01:29:26.740000 -CVE-2011-2997,0,1,7f1f685c786fdec42bd5e3eeb351ba69392f4c2b7fd4064a195d1a71d524ead1,2024-11-21T01:29:26.887000 -CVE-2011-2998,0,1,6a197764786187219d9d8898d27cd9c2eb18e2f3bf777d234cb9cddf0b9b0e86,2024-11-21T01:29:27.070000 -CVE-2011-2999,0,1,51a7bd817bb8ec2220d07ea06ccd85dbc15f683b99271ee976790d3285b74607,2024-11-21T01:29:27.250000 -CVE-2011-3000,0,1,fc56ff6f578f091ac23d38b92c360259d470404d16ec3c86f4fbea1cfcdfca8a,2024-11-21T01:29:27.453000 -CVE-2011-3001,0,1,db2a72109fc2fa120d193c846b92bdad57c2faca23e298ebac30cab64c556aee,2024-11-21T01:29:27.653000 -CVE-2011-3002,0,1,c7268329b9f89c74fd2f88ee71ace3f13572ca1e22f551a141f50fa83c88c860,2024-11-21T01:29:27.827000 -CVE-2011-3003,0,1,7c130944edb855510c560b0bd63dc5afc8e3af9b2c46892ae8ed41a972f72871,2024-11-21T01:29:27.970000 -CVE-2011-3004,0,1,00a69183d8237a797a8d2ba3fcfe7c8f886823e67d2f784e3a5bcfc12bb749e8,2024-11-21T01:29:28.120000 -CVE-2011-3005,0,1,2632d078a26e575ddf4bc9a2a1e121ddce1df970bdf1bacbdf58fa12215e7843,2024-11-21T01:29:28.277000 -CVE-2011-3006,0,1,0934d923a4e71777afdc75b14675f95862e0937d11eb91dd3d97ec9faf84a279,2024-11-21T01:29:28.457000 -CVE-2011-3007,0,1,c7c4549d7f70c9893924617a12455a1ab35f395a278e58cbe88a75fee3e211e3,2024-11-21T01:29:28.610000 -CVE-2011-3008,0,1,876891e136622b9d4f13f40c9b275a89dfc3fbadd297d0a4f7c247ab56b5152a,2024-11-21T01:29:28.757000 -CVE-2011-3009,0,1,6347bb3b8414bfc9959ab6eaf30a7ec24f0411be1b1f134cbcfb73a520df8f03,2024-11-21T01:29:28.893000 -CVE-2011-3010,0,1,c9352dbdb822956c70eccf0fcedc1c10ad9dec9c961157d0e860d513fa94e4b0,2024-11-21T01:29:29.043000 -CVE-2011-3011,0,1,526dd1c66fc6b22ae51d85c430b79cd7e3d659306f984c107cfcda6e20b7f39f,2024-11-21T01:29:29.203000 -CVE-2011-3012,0,1,86c62cd68233690598e9157bf48413720e6a53bd64802bfcbc9e09bbd1a55926,2024-11-21T01:29:29.353000 -CVE-2011-3013,0,1,a3693517cf53fd23979cb49482c71fa26dc82bab9e2075f2fce25cb0bebb74ef,2024-11-21T01:29:29.517000 -CVE-2011-3014,0,1,d81eee08e74667966dfd1301e8f10107e065aa149a075df6a1a65763e127e97e,2024-11-21T01:29:29.660000 +CVE-2011-2975,0,0,6f4a215023ca4d0deabb1617a9732e485ac8e5a0b99a5967995a43df32d32d19,2024-11-21T01:29:23.163000 +CVE-2011-2976,0,0,34032b7ca0b5878ae1d554be8ab4b80c8cc80a468e52e82206973492dc1214b6,2024-11-21T01:29:23.320000 +CVE-2011-2977,0,0,be5aa9d0ec6f271b9aae1f40a69d7364a6cfaba48f632db476d22e92e9da933e,2024-11-21T01:29:23.487000 +CVE-2011-2978,0,0,5eacb633afab881dff841aad0475094d4161de18220c20a09210712bba2229ef,2024-11-21T01:29:23.637000 +CVE-2011-2979,0,0,deef23b0cd4a63d6f39b52cda067e94ebbe59cb91c37145465abdda31910277e,2024-11-21T01:29:23.803000 +CVE-2011-2980,0,0,92ac24cd42acacf21070ed3017fe33e412c0c9f27ae6a655478d8d5c35c41630,2024-11-21T01:29:23.967000 +CVE-2011-2981,0,0,ee6fa48873408d37ebc5caa1e9f15877b95632c94c3e26c7ebe74353921a02e7,2024-11-21T01:29:24.113000 +CVE-2011-2982,0,0,5b3186d0df1d1fee9ab3ae171124be658447d03058eeb057c4012238027af71c,2024-11-21T01:29:24.297000 +CVE-2011-2983,0,0,d269eba5de789723fe76f4ce67f83514ca4eae05ae59595d87de7c42b8ad0f38,2024-11-21T01:29:24.517000 +CVE-2011-2984,0,0,5e452a7e928b2e4d53db127824b76bab3a5e94a9b7b5ac4c4268d308e76e6998,2024-11-21T01:29:24.710000 +CVE-2011-2985,0,0,6d22e0f26877df8c4c99baeeaebf5b0532ab49dcb611536fd6e2f3ef92c72afb,2024-11-21T01:29:24.893000 +CVE-2011-2986,0,0,baa0b9543534de539ae0906df02f156150f5f088e4b4d952bf4a8b95e305b4d1,2024-11-21T01:29:25.113000 +CVE-2011-2987,0,0,1e4bfdcc15bc88b1d2cc9c07461a887b130fc1b80b81567fdb69f45263d691ba,2024-11-21T01:29:25.300000 +CVE-2011-2988,0,0,a2c231ba52ecb91070b400d533117dc121ee2b1c2257b9f684f8df8bc59ac7fd,2024-11-21T01:29:25.480000 +CVE-2011-2989,0,0,20654dc6fe5eeba3b9902231fdaf07d78169862f39125a684c76d7ad43c92e14,2024-11-21T01:29:25.670000 +CVE-2011-2990,0,0,616357fecb90bfd65eaa17b095db6f721d2fbe0cac64d2b38b30f7f7b9effcc7,2024-11-21T01:29:25.860000 +CVE-2011-2991,0,0,6b7f1a7e4ba1ea9a7237373130d259f14fb93487081c15026d7ba4dfbfcff252,2024-11-21T01:29:26.033000 +CVE-2011-2992,0,0,c9bc103a31873671090bca482eb2f90e645ff1568038e650c0675ea9fa7f92be,2024-11-21T01:29:26.217000 +CVE-2011-2993,0,0,cc876330e5bcfa3948667b8f7fcd8d4d7b6faca23d91210164740bb2174a0227,2024-11-21T01:29:26.397000 +CVE-2011-2995,0,0,10b69eb44e02f73756b7627243f4daee8743e1154914f27e90471ac7a8f68641,2024-11-21T01:29:26.553000 +CVE-2011-2996,0,0,63f779be5b98a5566b9a8feabf8b755b1c68d27f37c5e495a6870a5b68171dd5,2024-11-21T01:29:26.740000 +CVE-2011-2997,0,0,7f1f685c786fdec42bd5e3eeb351ba69392f4c2b7fd4064a195d1a71d524ead1,2024-11-21T01:29:26.887000 +CVE-2011-2998,0,0,6a197764786187219d9d8898d27cd9c2eb18e2f3bf777d234cb9cddf0b9b0e86,2024-11-21T01:29:27.070000 +CVE-2011-2999,0,0,51a7bd817bb8ec2220d07ea06ccd85dbc15f683b99271ee976790d3285b74607,2024-11-21T01:29:27.250000 +CVE-2011-3000,0,0,fc56ff6f578f091ac23d38b92c360259d470404d16ec3c86f4fbea1cfcdfca8a,2024-11-21T01:29:27.453000 +CVE-2011-3001,0,0,db2a72109fc2fa120d193c846b92bdad57c2faca23e298ebac30cab64c556aee,2024-11-21T01:29:27.653000 +CVE-2011-3002,0,0,c7268329b9f89c74fd2f88ee71ace3f13572ca1e22f551a141f50fa83c88c860,2024-11-21T01:29:27.827000 +CVE-2011-3003,0,0,7c130944edb855510c560b0bd63dc5afc8e3af9b2c46892ae8ed41a972f72871,2024-11-21T01:29:27.970000 +CVE-2011-3004,0,0,00a69183d8237a797a8d2ba3fcfe7c8f886823e67d2f784e3a5bcfc12bb749e8,2024-11-21T01:29:28.120000 +CVE-2011-3005,0,0,2632d078a26e575ddf4bc9a2a1e121ddce1df970bdf1bacbdf58fa12215e7843,2024-11-21T01:29:28.277000 +CVE-2011-3006,0,0,0934d923a4e71777afdc75b14675f95862e0937d11eb91dd3d97ec9faf84a279,2024-11-21T01:29:28.457000 +CVE-2011-3007,0,0,c7c4549d7f70c9893924617a12455a1ab35f395a278e58cbe88a75fee3e211e3,2024-11-21T01:29:28.610000 +CVE-2011-3008,0,0,876891e136622b9d4f13f40c9b275a89dfc3fbadd297d0a4f7c247ab56b5152a,2024-11-21T01:29:28.757000 +CVE-2011-3009,0,0,6347bb3b8414bfc9959ab6eaf30a7ec24f0411be1b1f134cbcfb73a520df8f03,2024-11-21T01:29:28.893000 +CVE-2011-3010,0,0,c9352dbdb822956c70eccf0fcedc1c10ad9dec9c961157d0e860d513fa94e4b0,2024-11-21T01:29:29.043000 +CVE-2011-3011,0,0,526dd1c66fc6b22ae51d85c430b79cd7e3d659306f984c107cfcda6e20b7f39f,2024-11-21T01:29:29.203000 +CVE-2011-3012,0,0,86c62cd68233690598e9157bf48413720e6a53bd64802bfcbc9e09bbd1a55926,2024-11-21T01:29:29.353000 +CVE-2011-3013,0,0,a3693517cf53fd23979cb49482c71fa26dc82bab9e2075f2fce25cb0bebb74ef,2024-11-21T01:29:29.517000 +CVE-2011-3014,0,0,d81eee08e74667966dfd1301e8f10107e065aa149a075df6a1a65763e127e97e,2024-11-21T01:29:29.660000 CVE-2011-3015,0,0,2369e358f005d384301b623aba8dbce6aa36d7cb0e40bbc00b1bc226cdf66266,2020-04-16T17:30:13.487000 CVE-2011-3016,0,0,a1f4ff4522817b4cfb497261b596b0ba46ba03ff32d3d3608146bd973cc1ad3a,2020-04-16T17:29:47.080000 CVE-2011-3017,0,0,4e55393f2f43b9a1518aec2d57bdbfa99bf03d17d9d0feee9e6651849107f0be,2020-04-16T17:27:08.917000 @@ -49791,77 +49791,77 @@ CVE-2011-3117,0,0,bbac11ad7afbc39bef4daf12f28f1dd56183233381a9139ee066bcdca4bd90 CVE-2011-3118,0,0,310b08f7ebeec466e99321a2d64b0634cb7844352426b541643f62595e8a5133,2023-11-07T02:08:25.273000 CVE-2011-3119,0,0,84a7eab98fe0dcab6b74db5b3e1ea6c2f0baea1b5d61e9d1c2474fff340ff5a7,2023-11-07T02:08:25.300000 CVE-2011-3120,0,0,52634d6429b907d728893823460964d6b4b2f369232af8ddab99536222e53b50,2023-11-07T02:08:25.330000 -CVE-2011-3122,0,1,df6172602a1b371bee765109c704c99658d54596955b5b4c0f2261108649aeb5,2024-11-21T01:29:46.853000 -CVE-2011-3123,0,1,703248cd1c266296b2fbcaaac513af3a0955e76c19ed34e2bf13db5fae04ce01,2024-11-21T01:29:47.010000 -CVE-2011-3124,0,1,ab5006e40d3aa9e8ce5c371a5707f14adf81aa60c93046ad652491376ee1bc20,2024-11-21T01:29:47.183000 -CVE-2011-3125,0,1,309829391a50407147d9e37b2046e22120a778d823ae0c2718dcd367f542ac74,2024-11-21T01:29:47.347000 -CVE-2011-3126,0,1,2cda0f5eea9db4276caf921c0b37d83cfd68708065b903deb1e0f9b2a2a0f1d8,2024-11-21T01:29:47.500000 -CVE-2011-3127,0,1,cf97f769e99fea1497a23a6292d56db897d5c4295fcc4f7fc822c66226608ded,2024-11-21T01:29:47.650000 -CVE-2011-3128,0,1,f2543888c1351ef4b13eed7c0fd2ece42649ae14fb83487667ae07ef4e984981,2024-11-21T01:29:47.810000 -CVE-2011-3129,0,1,d40889eab31c31469b4e4ca328fb149c681e17ca689c3201e28573226be04003,2024-11-21T01:29:47.967000 -CVE-2011-3130,0,1,5b2132b38304e13d0138aee08177c6172e648f5f07835b7bd738832427cfdfbb,2024-11-21T01:29:48.117000 +CVE-2011-3122,0,0,df6172602a1b371bee765109c704c99658d54596955b5b4c0f2261108649aeb5,2024-11-21T01:29:46.853000 +CVE-2011-3123,0,0,703248cd1c266296b2fbcaaac513af3a0955e76c19ed34e2bf13db5fae04ce01,2024-11-21T01:29:47.010000 +CVE-2011-3124,0,0,ab5006e40d3aa9e8ce5c371a5707f14adf81aa60c93046ad652491376ee1bc20,2024-11-21T01:29:47.183000 +CVE-2011-3125,0,0,309829391a50407147d9e37b2046e22120a778d823ae0c2718dcd367f542ac74,2024-11-21T01:29:47.347000 +CVE-2011-3126,0,0,2cda0f5eea9db4276caf921c0b37d83cfd68708065b903deb1e0f9b2a2a0f1d8,2024-11-21T01:29:47.500000 +CVE-2011-3127,0,0,cf97f769e99fea1497a23a6292d56db897d5c4295fcc4f7fc822c66226608ded,2024-11-21T01:29:47.650000 +CVE-2011-3128,0,0,f2543888c1351ef4b13eed7c0fd2ece42649ae14fb83487667ae07ef4e984981,2024-11-21T01:29:47.810000 +CVE-2011-3129,0,0,d40889eab31c31469b4e4ca328fb149c681e17ca689c3201e28573226be04003,2024-11-21T01:29:47.967000 +CVE-2011-3130,0,0,5b2132b38304e13d0138aee08177c6172e648f5f07835b7bd738832427cfdfbb,2024-11-21T01:29:48.117000 CVE-2011-3131,0,0,142f3bfe80b4ffa8c4c543b2320ac12b83c4180511bd4407695677fb02e494cd,2012-12-13T11:53:33.350000 -CVE-2011-3132,0,1,a8a8db57c5699b82f788225038560dc7c2b618afe50f12608b0ac61fb68f5a05,2024-11-21T01:29:48.427000 -CVE-2011-3133,0,1,0636736cf14589a573f256b1160f9332d07b47f86751ce03805525a084836c31,2024-11-21T01:29:48.577000 -CVE-2011-3134,0,1,e56d2f134de7ffb285a46abf81e66f26c49d401401d336c06a15ec774ed4b523,2024-11-21T01:29:48.730000 -CVE-2011-3135,0,1,7a703331f263d6076c27470f2c84e49b31e3a13c843a62aed2ab1ee463a4c858,2024-11-21T01:29:48.887000 -CVE-2011-3136,0,1,87f9abf83af1e66308ec712d18309bd4a8825e3211ebd4115c345e13e9065413,2024-11-21T01:29:49.043000 -CVE-2011-3137,0,1,c16e90fd0efb0bab46d8c7b44f9a307eb10878d7a00e250f7ee20cb6e3f99b07,2024-11-21T01:29:49.193000 -CVE-2011-3138,0,1,11a0c6e2fbc250a611886d27a33cb0871a0c1c73a2c8d0f9583c5df42a4515ae,2024-11-21T01:29:49.350000 +CVE-2011-3132,0,0,a8a8db57c5699b82f788225038560dc7c2b618afe50f12608b0ac61fb68f5a05,2024-11-21T01:29:48.427000 +CVE-2011-3133,0,0,0636736cf14589a573f256b1160f9332d07b47f86751ce03805525a084836c31,2024-11-21T01:29:48.577000 +CVE-2011-3134,0,0,e56d2f134de7ffb285a46abf81e66f26c49d401401d336c06a15ec774ed4b523,2024-11-21T01:29:48.730000 +CVE-2011-3135,0,0,7a703331f263d6076c27470f2c84e49b31e3a13c843a62aed2ab1ee463a4c858,2024-11-21T01:29:48.887000 +CVE-2011-3136,0,0,87f9abf83af1e66308ec712d18309bd4a8825e3211ebd4115c345e13e9065413,2024-11-21T01:29:49.043000 +CVE-2011-3137,0,0,c16e90fd0efb0bab46d8c7b44f9a307eb10878d7a00e250f7ee20cb6e3f99b07,2024-11-21T01:29:49.193000 +CVE-2011-3138,0,0,11a0c6e2fbc250a611886d27a33cb0871a0c1c73a2c8d0f9583c5df42a4515ae,2024-11-21T01:29:49.350000 CVE-2011-3139,0,0,8ba695480ed2343a40c84c359def22342f004918fab16808cab38dae7ea8ada6,2023-11-07T02:08:25.490000 -CVE-2011-3140,0,1,1a9519ef42408ac674e7dd915e05e975a357bf10e6d7673437ba3be081e2c90d,2024-11-21T01:29:49.517000 -CVE-2011-3141,0,1,ea025578c7ed166f9325aa2caed26a9fd3b8fcc2266eca3a9577eb8c68ddd2cb,2024-11-21T01:29:49.677000 -CVE-2011-3142,0,1,94f752d909232dd8012fdd811e4f2716e4da1d94fb33497515eb7515d18af302,2024-11-21T01:29:49.830000 -CVE-2011-3143,0,1,075ad6544c3d5e426c7ebcabf2e6bf92bbd4df6b043bff17bb56be6a19deb2ae,2024-11-21T01:29:49.987000 -CVE-2011-3144,0,1,1464be549f18277b6efd9be3b53fbeb35f124c21c46121caa52028d15bbaea6d,2024-11-21T01:29:50.153000 +CVE-2011-3140,0,0,1a9519ef42408ac674e7dd915e05e975a357bf10e6d7673437ba3be081e2c90d,2024-11-21T01:29:49.517000 +CVE-2011-3141,0,0,ea025578c7ed166f9325aa2caed26a9fd3b8fcc2266eca3a9577eb8c68ddd2cb,2024-11-21T01:29:49.677000 +CVE-2011-3142,0,0,94f752d909232dd8012fdd811e4f2716e4da1d94fb33497515eb7515d18af302,2024-11-21T01:29:49.830000 +CVE-2011-3143,0,0,075ad6544c3d5e426c7ebcabf2e6bf92bbd4df6b043bff17bb56be6a19deb2ae,2024-11-21T01:29:49.987000 +CVE-2011-3144,0,0,1464be549f18277b6efd9be3b53fbeb35f124c21c46121caa52028d15bbaea6d,2024-11-21T01:29:50.153000 CVE-2011-3145,0,0,10ca18cc272be6a59560878a3667bd7fdf49dbe5a941e3b8b7b6b57985ceab11,2019-10-09T23:03:23.897000 CVE-2011-3146,0,0,66cd1a842a8f999519ff4193d4c879d33497dcf2f9ca8990c5bc7144abb39bdd,2012-09-13T04:00:00 CVE-2011-3147,0,0,61a6753252a849d365e0050d2d0139f3b8f9fd4a916aa7186c39e86d0fcfb0bf,2020-09-03T16:09:15.110000 CVE-2011-3148,0,0,ce423eb192436f698e838b7cd784e605f73de3cd1eebda947727c447a601fd7c,2023-11-07T02:08:25.787000 CVE-2011-3149,0,0,c9992efc775166c8886ef80330836d36cc843269d54b420dc8f25c0bfa1bdc97,2023-11-07T02:08:25.853000 -CVE-2011-3150,0,1,d6afc45755a3c78d5d5e785aefdafde5b4db7e591f05088129f58888c99a6c60,2024-11-21T01:29:51.087000 +CVE-2011-3150,0,0,d6afc45755a3c78d5d5e785aefdafde5b4db7e591f05088129f58888c99a6c60,2024-11-21T01:29:51.087000 CVE-2011-3151,0,0,6aa923d5039db318a1d93a5b69483d102caa1d96b7d51f26965decf31f10ef1a,2019-10-09T23:03:24.350000 CVE-2011-3152,0,0,09c8d09b1adcd8d8bcd81b41657587ccbd1f7f8b089ba5394048cdacdfa553b3,2017-08-29T01:30:05.113000 CVE-2011-3153,0,0,7fc1954d3d5ed00fe74ed3366b2e23b10dfeb9ce0842171bcd017d90aa119228,2014-03-07T19:07:10.880000 CVE-2011-3154,0,0,a2d6bf9a8e0abfc0b140bce9b79d82486b2e3a6399f2d9344f787f9a6687480c,2014-05-05T04:59:47.573000 -CVE-2011-3155,0,1,790edb3fedb9d87793691a37b6db4226d36905930975a740387ce993e492a9a1,2024-11-21T01:29:51.893000 -CVE-2011-3156,0,1,b784be090ba4dd711a224cec7c7bee9ccd8f5a71c9a72b0a7c3dad3965a19501,2024-11-21T01:29:52.013000 -CVE-2011-3157,0,1,730aa1a78038213a814ada79a56164217c62ee78697e81002e547a0c190a78c7,2024-11-21T01:29:52.137000 -CVE-2011-3158,0,1,23d7824910f746e45788ff862d00d24dbbbd77d14dae9fc94c55533682099aad,2024-11-21T01:29:52.273000 -CVE-2011-3159,0,1,67b80354e97e163ec8e899258316e22b4b7b2b21572e81cbd2261f5c26c0cdea,2024-11-21T01:29:52.403000 -CVE-2011-3160,0,1,7dffc966db933af6d229fb999a2c0ef5c934bbf1e78587dd4b19c67acd29271a,2024-11-21T01:29:52.517000 -CVE-2011-3161,0,1,afa005c456e8ce8d2f2fd9d00d74984af9387f1d29d28a79eeaad4848584f22e,2024-11-21T01:29:52.633000 -CVE-2011-3162,0,1,e43a29fdfb210b314b4a4abfe1bae177befb6a38f06991130ddb88e6956beb7a,2024-11-21T01:29:52.750000 -CVE-2011-3163,0,1,9d314b2eb866991f91d4a955c42c1b3ae4fd81a0fc8ed1a3fef5810811864450,2024-11-21T01:29:52.873000 -CVE-2011-3164,0,1,7aabb5e7e35a56a34cc0938e4c6eec3b2352b8b59c285ec626d5547ed9b431b9,2024-11-21T01:29:52.997000 -CVE-2011-3165,0,1,43f3212ec2ea936e0002c9dcb81ca6b7f0d36d69627500527d0288464a1bdf4c,2024-11-21T01:29:53.113000 -CVE-2011-3166,0,1,69643d400127590de0642a4b9f0b947544f0844a75d8751634fcfda7dfe66a0f,2024-11-21T01:29:53.223000 -CVE-2011-3167,0,1,012c8a7da0c96bdecb70039e1308133450a4d5a61dde9768e1e61884ee4c00e0,2024-11-21T01:29:53.333000 -CVE-2011-3168,0,1,f10ab819babbea3448127fee34d83ad775b19a8f80a2d0dfa5499d2c09fb17a9,2024-11-21T01:29:53.450000 -CVE-2011-3169,0,1,0d10bbd17e4b55aa4949d10c6a647148e6759436fdc68ea142447f4118576e63,2024-11-21T01:29:53.560000 -CVE-2011-3170,0,1,ef9b64a3485907112d44a20dd776239295539dffaa004928a6a425ea60deb76a,2024-11-21T01:29:53.670000 -CVE-2011-3171,0,1,d8554bd77f692daec742bfd97d0a824339fc3b96efb38eb964656f240670c0a6,2024-11-21T01:29:53.840000 +CVE-2011-3155,0,0,790edb3fedb9d87793691a37b6db4226d36905930975a740387ce993e492a9a1,2024-11-21T01:29:51.893000 +CVE-2011-3156,0,0,b784be090ba4dd711a224cec7c7bee9ccd8f5a71c9a72b0a7c3dad3965a19501,2024-11-21T01:29:52.013000 +CVE-2011-3157,0,0,730aa1a78038213a814ada79a56164217c62ee78697e81002e547a0c190a78c7,2024-11-21T01:29:52.137000 +CVE-2011-3158,0,0,23d7824910f746e45788ff862d00d24dbbbd77d14dae9fc94c55533682099aad,2024-11-21T01:29:52.273000 +CVE-2011-3159,0,0,67b80354e97e163ec8e899258316e22b4b7b2b21572e81cbd2261f5c26c0cdea,2024-11-21T01:29:52.403000 +CVE-2011-3160,0,0,7dffc966db933af6d229fb999a2c0ef5c934bbf1e78587dd4b19c67acd29271a,2024-11-21T01:29:52.517000 +CVE-2011-3161,0,0,afa005c456e8ce8d2f2fd9d00d74984af9387f1d29d28a79eeaad4848584f22e,2024-11-21T01:29:52.633000 +CVE-2011-3162,0,0,e43a29fdfb210b314b4a4abfe1bae177befb6a38f06991130ddb88e6956beb7a,2024-11-21T01:29:52.750000 +CVE-2011-3163,0,0,9d314b2eb866991f91d4a955c42c1b3ae4fd81a0fc8ed1a3fef5810811864450,2024-11-21T01:29:52.873000 +CVE-2011-3164,0,0,7aabb5e7e35a56a34cc0938e4c6eec3b2352b8b59c285ec626d5547ed9b431b9,2024-11-21T01:29:52.997000 +CVE-2011-3165,0,0,43f3212ec2ea936e0002c9dcb81ca6b7f0d36d69627500527d0288464a1bdf4c,2024-11-21T01:29:53.113000 +CVE-2011-3166,0,0,69643d400127590de0642a4b9f0b947544f0844a75d8751634fcfda7dfe66a0f,2024-11-21T01:29:53.223000 +CVE-2011-3167,0,0,012c8a7da0c96bdecb70039e1308133450a4d5a61dde9768e1e61884ee4c00e0,2024-11-21T01:29:53.333000 +CVE-2011-3168,0,0,f10ab819babbea3448127fee34d83ad775b19a8f80a2d0dfa5499d2c09fb17a9,2024-11-21T01:29:53.450000 +CVE-2011-3169,0,0,0d10bbd17e4b55aa4949d10c6a647148e6759436fdc68ea142447f4118576e63,2024-11-21T01:29:53.560000 +CVE-2011-3170,0,0,ef9b64a3485907112d44a20dd776239295539dffaa004928a6a425ea60deb76a,2024-11-21T01:29:53.670000 +CVE-2011-3171,0,0,d8554bd77f692daec742bfd97d0a824339fc3b96efb38eb964656f240670c0a6,2024-11-21T01:29:53.840000 CVE-2011-3172,0,0,762b6e04d4047c5c4fd176412a98e21e10214c415b94b4e1af9ba2217c78ea66,2023-11-07T02:08:26.100000 -CVE-2011-3173,0,1,8ad9012c8993b19a8ff537b219e6f62665977ca867f0e1719ac46bf6b11c8ba2,2024-11-21T01:29:54.120000 +CVE-2011-3173,0,0,8ad9012c8993b19a8ff537b219e6f62665977ca867f0e1719ac46bf6b11c8ba2,2024-11-21T01:29:54.120000 CVE-2011-3174,0,0,cddd1adbcc8fdbd2a521fb19b60b7ce8c29d23fbebd1169d117bfa8f97d0fcb8,2012-07-27T13:39:09.433000 CVE-2011-3175,0,0,92c34927cfc256a4dbe3a6d6fc45c5ddf4b2acfda5b84b61835f897f60d6491a,2012-09-07T04:21:53.680000 CVE-2011-3176,0,0,88a94afbfed8af1b70aa4dcead129adf4bc1d7e1510885ff0f63cca235c45858,2012-09-07T04:21:53.850000 CVE-2011-3177,0,0,dbd5f6e9fc6fe370a52b0c88830ea16193f5780097df56ba7021cf7de56d4780,2017-09-18T15:12:11.993000 CVE-2011-3178,0,0,29b9935eb8f74ff794404634b86711e7152d02986d910c9868a15cd7c230bb5c,2023-11-07T02:08:26.433000 -CVE-2011-3179,0,1,952fa286d4984eeca7c666cdb1f988a7af2ba704a3a2f6fc32bef6827432b902,2024-11-21T01:29:54.980000 +CVE-2011-3179,0,0,952fa286d4984eeca7c666cdb1f988a7af2ba704a3a2f6fc32bef6827432b902,2024-11-21T01:29:54.980000 CVE-2011-3180,0,0,35a9f1f8c566a53b9e4b9c2c1539583818d1ea45febcce02995f7e5655cd92ea,2014-04-17T13:36:38.733000 -CVE-2011-3181,0,1,6f53deb7662cd4eb71411ed533d31d36cbf5c1276fb555c1f1a00ef2ac627555,2024-11-21T01:29:55.260000 -CVE-2011-3182,0,1,52410b58c492a28abcb4cde8e0839177b881792af9c7b3f10adfdb6cc0c8fd8a,2024-11-21T01:29:55.420000 +CVE-2011-3181,0,0,6f53deb7662cd4eb71411ed533d31d36cbf5c1276fb555c1f1a00ef2ac627555,2024-11-21T01:29:55.260000 +CVE-2011-3182,0,0,52410b58c492a28abcb4cde8e0839177b881792af9c7b3f10adfdb6cc0c8fd8a,2024-11-21T01:29:55.420000 CVE-2011-3183,0,0,33515b96bdba9223616a4bd3e5aac5a2b0f8aaf9b9de9bcb07abb8f7e498242e,2021-07-15T20:42:58.670000 -CVE-2011-3184,0,1,4427a274efa875bab3ba2f4429abc0d06e373763bb3e0899ba2fc6c12194cd95,2024-11-21T01:29:55.657000 -CVE-2011-3185,0,1,f7c24afc301a43a44d0878344fb57e7cc6bea390cfdca6e4e10703ef66c8ab71,2024-11-21T01:29:55.793000 -CVE-2011-3186,0,1,df90a7ac6d6c39e69c61b590a53750a1d551b89ee81ecef4d1cff7053de629ad,2024-11-21T01:29:55.930000 -CVE-2011-3187,0,1,edb6d7c2548f35d1520658219c8a53bfa61569b7d9516569789a6108be67104d,2024-11-21T01:29:56.067000 +CVE-2011-3184,0,0,4427a274efa875bab3ba2f4429abc0d06e373763bb3e0899ba2fc6c12194cd95,2024-11-21T01:29:55.657000 +CVE-2011-3185,0,0,f7c24afc301a43a44d0878344fb57e7cc6bea390cfdca6e4e10703ef66c8ab71,2024-11-21T01:29:55.793000 +CVE-2011-3186,0,0,df90a7ac6d6c39e69c61b590a53750a1d551b89ee81ecef4d1cff7053de629ad,2024-11-21T01:29:55.930000 +CVE-2011-3187,0,0,edb6d7c2548f35d1520658219c8a53bfa61569b7d9516569789a6108be67104d,2024-11-21T01:29:56.067000 CVE-2011-3188,0,0,63cacfa3f21461e2a2e8c4a2e9a4c9d1d73d116267ba3f1639fc56f94bef80f2,2023-02-13T04:32:37.160000 -CVE-2011-3189,0,1,3e986b1c62228f45790c3bede50dc2b858ff33adfb7e64459b66262d6d96369f,2024-11-21T01:29:56.333000 -CVE-2011-3190,0,1,6a7e787bdb95efde5941010f71a617e8208c988ece85b8f0cadd84b688b023aa,2024-11-21T01:29:56.457000 +CVE-2011-3189,0,0,3e986b1c62228f45790c3bede50dc2b858ff33adfb7e64459b66262d6d96369f,2024-11-21T01:29:56.333000 +CVE-2011-3190,0,0,6a7e787bdb95efde5941010f71a617e8208c988ece85b8f0cadd84b688b023aa,2024-11-21T01:29:56.457000 CVE-2011-3191,0,0,ec917479ccc483964d67306a843fb291346d6597b84270f86f8e37c412f35dd5,2023-02-13T04:32:37.470000 -CVE-2011-3192,0,1,2fdf2e8b6b20b9bbc8d77f4727115e7de82ef972165d5fd6af1ee563de559bb8,2024-11-21T01:29:56.747000 +CVE-2011-3192,0,0,2fdf2e8b6b20b9bbc8d77f4727115e7de82ef972165d5fd6af1ee563de559bb8,2024-11-21T01:29:56.747000 CVE-2011-3193,0,0,053f4ea77c0d05252c0355c0407eb9c49079419d5a811447981fa658fa2c7678,2021-07-14T15:41:17.550000 CVE-2011-3194,0,0,5b88c4b0f7d3f5d47baae6942ea873ea4da9f822ed0cc3d5ae288097ff39a76b,2021-06-16T12:43:17.830000 CVE-2011-3195,0,0,d2f3f30e41c746c922ab2a1086ef1323d85e533ea49ac14fdd7a1d7cde3d4e90,2023-11-07T02:08:27.430000 @@ -49869,235 +49869,235 @@ CVE-2011-3196,0,0,0bbdee6bf31de3743e41255582860d45cf629f76cef3f6708d19c812e92530 CVE-2011-3197,0,0,6e0703f8ad35d05f9f843cc2b9ad10aca16f5029545ccb716038def7f7773707,2023-11-07T02:08:27.580000 CVE-2011-3198,0,0,9fbf25ec79a9b918e581da96e095c726c524f3f09aab934cbecfca54b1693b90,2023-11-07T02:08:27.643000 CVE-2011-3199,0,0,b129a75b477ceeabb256791bd2147cd3f451bbe7f0cab5af7ce99e3bb63696ab,2023-11-07T02:08:27.700000 -CVE-2011-3200,0,1,eedea51c7acf711fd543dd6173ae477b87df18d4508735cfdc971b490919647a,2024-11-21T01:29:57.957000 +CVE-2011-3200,0,0,eedea51c7acf711fd543dd6173ae477b87df18d4508735cfdc971b490919647a,2024-11-21T01:29:57.957000 CVE-2011-3201,0,0,37f05ff84c25e204f636de1dc811ff515e3ff6aec7fdade710ead8a222f0bba8,2023-02-13T04:32:38.117000 CVE-2011-3202,0,0,a353a0fbbde6dbc34895aa5d68997c2bc80a3d5432c8193f001184a6a0863317,2020-01-16T15:19:46.047000 CVE-2011-3203,0,0,db89fb6dac6d391067d52149185dfabb13b26da4938de3f2f66794e0292f5f80,2020-01-17T03:02:51.373000 -CVE-2011-3204,0,1,e431bc07e4529ebd45fecffe3c6ed14f92ba7f50b3a97eb67dfbb627af9dfaeb,2024-11-21T01:29:58.453000 -CVE-2011-3205,0,1,5bf4151aae1422900dcb62b376d99baa7d91e19017ac6d3b0ceba497836859e9,2024-11-21T01:29:58.557000 -CVE-2011-3206,0,1,c57404e53d774a02c143026125cae9b9890e5ba43de3ebfb4f9e38bf5a01a6c8,2024-11-21T01:29:58.710000 -CVE-2011-3207,0,1,3e684829167ee7ac583969909a3f57b60f65642d01a04891da920d5fcaa6198d,2024-11-21T01:29:58.823000 -CVE-2011-3208,0,1,1f6e6789c12329126efa2d3c314c1e0068b803bae9d8689f6500ce27e4d53f18,2024-11-21T01:29:58.967000 +CVE-2011-3204,0,0,e431bc07e4529ebd45fecffe3c6ed14f92ba7f50b3a97eb67dfbb627af9dfaeb,2024-11-21T01:29:58.453000 +CVE-2011-3205,0,0,5bf4151aae1422900dcb62b376d99baa7d91e19017ac6d3b0ceba497836859e9,2024-11-21T01:29:58.557000 +CVE-2011-3206,0,0,c57404e53d774a02c143026125cae9b9890e5ba43de3ebfb4f9e38bf5a01a6c8,2024-11-21T01:29:58.710000 +CVE-2011-3207,0,0,3e684829167ee7ac583969909a3f57b60f65642d01a04891da920d5fcaa6198d,2024-11-21T01:29:58.823000 +CVE-2011-3208,0,0,1f6e6789c12329126efa2d3c314c1e0068b803bae9d8689f6500ce27e4d53f18,2024-11-21T01:29:58.967000 CVE-2011-3209,0,0,030edcae72e53ea8e5abfcae14c8dd50bd1d29807d1875df4baee296fdfa92ed,2023-02-13T04:32:38.207000 -CVE-2011-3210,0,1,ebe9d6b6f18956e8e9faada3ab192026e34906ee00b3365cddf25ffaa6203a01,2024-11-21T01:29:59.250000 -CVE-2011-3211,0,1,1a1255ea8b0308a70f039e0152a25e831f13fe1c8e402a1d574d21bba7b56385,2024-11-21T01:29:59.390000 -CVE-2011-3212,0,1,6fb81003559421a849c1a4ec6391939bce37593e00c895c28776d2956de8691f,2024-11-21T01:29:59.557000 -CVE-2011-3213,0,1,8a27674ca14ab34a36c28474ebf7bf0310c84c2c606611a1b8817bafd0465e13,2024-11-21T01:29:59.683000 -CVE-2011-3214,0,1,923a01ed3fbc53fcc8c52c9325d54e9ae28e275d24e6e2bab4813c87e0260f4d,2024-11-21T01:29:59.823000 -CVE-2011-3215,0,1,b04e4fecb8155c475a8afbd666b96bd6464730f1c379487c04c282a3e1a62648,2024-11-21T01:29:59.957000 -CVE-2011-3216,0,1,03bc6cf60089dc6e1637510a6e9b67ce0e79fce9486ebe414c6aa876951aa1be,2024-11-21T01:30:00.093000 -CVE-2011-3217,0,1,5d50601d1eef1c6fa5c44031f081d9df624bbd913199c21025b54e5842386801,2024-11-21T01:30:00.233000 -CVE-2011-3218,0,1,9b450708c881b4ba5f029d8a26365842354d718261d082e1587ff0bf264a4b50,2024-11-21T01:30:00.387000 -CVE-2011-3219,0,1,416261e2eec1abce9ae32297186417edaa71efccd3f396ec2adc065da7993c13,2024-11-21T01:30:00.527000 -CVE-2011-3220,0,1,f5441106912a37c7e4cc7da2246453b081f49a5ac14264af355d28402d887f31,2024-11-21T01:30:00.670000 -CVE-2011-3221,0,1,3d60ec649e9ddc1f348b23aed90ee231f0a1f059eeb79781c41729d087a56186,2024-11-21T01:30:00.807000 -CVE-2011-3222,0,1,6564b00f366fceddb2085ce829f9928cb7207cc359fafde0fea91fd88827929d,2024-11-21T01:30:00.960000 -CVE-2011-3223,0,1,0b14a7932aac92fbda321a968176ab348f048dd8765ef0d6794d906a966d094d,2024-11-21T01:30:01.107000 -CVE-2011-3224,0,1,7ad7642fbc3b724ad45833c889267745e8eaedbc399961510d3015988290483e,2024-11-21T01:30:01.257000 -CVE-2011-3225,0,1,31c4a4731fe99f95acfc743ae6f42d713fb9349db436fcafcf84b8baa007e699,2024-11-21T01:30:01.400000 -CVE-2011-3226,0,1,b5ef48530b324499f517c23dd398a33d1b948b149692e7bff67910a31dffd5b9,2024-11-21T01:30:01.530000 -CVE-2011-3227,0,1,18c9397b45e9da320ab29cf114f239bdbf7535fc2b52182268145e44e8e20aec,2024-11-21T01:30:01.653000 -CVE-2011-3228,0,1,fa2dc020475be5fd9da51ebf645a45b3f6fcc4c9f4947d58587f269319c7625f,2024-11-21T01:30:01.797000 -CVE-2011-3229,0,1,705f0a773b78b2162975d5cd0d023eaa0185494f67af0bff5fe288e1464e4126,2024-11-21T01:30:01.940000 -CVE-2011-3230,0,1,6d74ec7960bbd3e86637306686f97002fbb1d5a89751d7a15284ec062e485f69,2024-11-21T01:30:02.087000 -CVE-2011-3231,0,1,5e91cdf33eb718b42d893949e49e559d8e9b6dc7db0bc73a40d456e2759a823c,2024-11-21T01:30:02.263000 -CVE-2011-3232,0,1,8dbdc5f91cfb24543277a5fc524b4fc2fdf673f33cfb73a3de68217114c5dbe3,2024-11-21T01:30:02.460000 -CVE-2011-3233,0,1,0ba6092c6a1b342b91bcb8b427f08abfede5ec7a27922e2cddb8f849ed4cc894,2024-11-21T01:30:02.643000 -CVE-2011-3234,0,1,2073de9e06d9fd5988767434b27f7ff559d6056e34e403d5bd51456e555aa16c,2024-11-21T01:30:02.820000 -CVE-2011-3235,0,1,fac67752ea8d374cf2cc6931fd18139c884f7ee2726777c6a8b8932e85f49162,2024-11-21T01:30:02.980000 -CVE-2011-3236,0,1,fdfad86a78864476edbac8b1f683a130b729ab5068bb009da8efe5183c3686c8,2024-11-21T01:30:03.140000 -CVE-2011-3237,0,1,1e766f14b35f286a64de25c1a0c0d2bef5dd3f3bf0b0171974622c18a8b819ce,2024-11-21T01:30:03.303000 -CVE-2011-3238,0,1,f8edd218c5f36c903bc107a88c4d8ba99d0c2390dea6e01126b5e79a11a3b857,2024-11-21T01:30:03.457000 -CVE-2011-3239,0,1,af31b8d9e4025ee69893d59dd429dfa53ad9a9ed85a16bc7e3fb085f1e7fd27e,2024-11-21T01:30:03.620000 +CVE-2011-3210,0,0,ebe9d6b6f18956e8e9faada3ab192026e34906ee00b3365cddf25ffaa6203a01,2024-11-21T01:29:59.250000 +CVE-2011-3211,0,0,1a1255ea8b0308a70f039e0152a25e831f13fe1c8e402a1d574d21bba7b56385,2024-11-21T01:29:59.390000 +CVE-2011-3212,0,0,6fb81003559421a849c1a4ec6391939bce37593e00c895c28776d2956de8691f,2024-11-21T01:29:59.557000 +CVE-2011-3213,0,0,8a27674ca14ab34a36c28474ebf7bf0310c84c2c606611a1b8817bafd0465e13,2024-11-21T01:29:59.683000 +CVE-2011-3214,0,0,923a01ed3fbc53fcc8c52c9325d54e9ae28e275d24e6e2bab4813c87e0260f4d,2024-11-21T01:29:59.823000 +CVE-2011-3215,0,0,b04e4fecb8155c475a8afbd666b96bd6464730f1c379487c04c282a3e1a62648,2024-11-21T01:29:59.957000 +CVE-2011-3216,0,0,03bc6cf60089dc6e1637510a6e9b67ce0e79fce9486ebe414c6aa876951aa1be,2024-11-21T01:30:00.093000 +CVE-2011-3217,0,0,5d50601d1eef1c6fa5c44031f081d9df624bbd913199c21025b54e5842386801,2024-11-21T01:30:00.233000 +CVE-2011-3218,0,0,9b450708c881b4ba5f029d8a26365842354d718261d082e1587ff0bf264a4b50,2024-11-21T01:30:00.387000 +CVE-2011-3219,0,0,416261e2eec1abce9ae32297186417edaa71efccd3f396ec2adc065da7993c13,2024-11-21T01:30:00.527000 +CVE-2011-3220,0,0,f5441106912a37c7e4cc7da2246453b081f49a5ac14264af355d28402d887f31,2024-11-21T01:30:00.670000 +CVE-2011-3221,0,0,3d60ec649e9ddc1f348b23aed90ee231f0a1f059eeb79781c41729d087a56186,2024-11-21T01:30:00.807000 +CVE-2011-3222,0,0,6564b00f366fceddb2085ce829f9928cb7207cc359fafde0fea91fd88827929d,2024-11-21T01:30:00.960000 +CVE-2011-3223,0,0,0b14a7932aac92fbda321a968176ab348f048dd8765ef0d6794d906a966d094d,2024-11-21T01:30:01.107000 +CVE-2011-3224,0,0,7ad7642fbc3b724ad45833c889267745e8eaedbc399961510d3015988290483e,2024-11-21T01:30:01.257000 +CVE-2011-3225,0,0,31c4a4731fe99f95acfc743ae6f42d713fb9349db436fcafcf84b8baa007e699,2024-11-21T01:30:01.400000 +CVE-2011-3226,0,0,b5ef48530b324499f517c23dd398a33d1b948b149692e7bff67910a31dffd5b9,2024-11-21T01:30:01.530000 +CVE-2011-3227,0,0,18c9397b45e9da320ab29cf114f239bdbf7535fc2b52182268145e44e8e20aec,2024-11-21T01:30:01.653000 +CVE-2011-3228,0,0,fa2dc020475be5fd9da51ebf645a45b3f6fcc4c9f4947d58587f269319c7625f,2024-11-21T01:30:01.797000 +CVE-2011-3229,0,0,705f0a773b78b2162975d5cd0d023eaa0185494f67af0bff5fe288e1464e4126,2024-11-21T01:30:01.940000 +CVE-2011-3230,0,0,6d74ec7960bbd3e86637306686f97002fbb1d5a89751d7a15284ec062e485f69,2024-11-21T01:30:02.087000 +CVE-2011-3231,0,0,5e91cdf33eb718b42d893949e49e559d8e9b6dc7db0bc73a40d456e2759a823c,2024-11-21T01:30:02.263000 +CVE-2011-3232,0,0,8dbdc5f91cfb24543277a5fc524b4fc2fdf673f33cfb73a3de68217114c5dbe3,2024-11-21T01:30:02.460000 +CVE-2011-3233,0,0,0ba6092c6a1b342b91bcb8b427f08abfede5ec7a27922e2cddb8f849ed4cc894,2024-11-21T01:30:02.643000 +CVE-2011-3234,0,0,2073de9e06d9fd5988767434b27f7ff559d6056e34e403d5bd51456e555aa16c,2024-11-21T01:30:02.820000 +CVE-2011-3235,0,0,fac67752ea8d374cf2cc6931fd18139c884f7ee2726777c6a8b8932e85f49162,2024-11-21T01:30:02.980000 +CVE-2011-3236,0,0,fdfad86a78864476edbac8b1f683a130b729ab5068bb009da8efe5183c3686c8,2024-11-21T01:30:03.140000 +CVE-2011-3237,0,0,1e766f14b35f286a64de25c1a0c0d2bef5dd3f3bf0b0171974622c18a8b819ce,2024-11-21T01:30:03.303000 +CVE-2011-3238,0,0,f8edd218c5f36c903bc107a88c4d8ba99d0c2390dea6e01126b5e79a11a3b857,2024-11-21T01:30:03.457000 +CVE-2011-3239,0,0,af31b8d9e4025ee69893d59dd429dfa53ad9a9ed85a16bc7e3fb085f1e7fd27e,2024-11-21T01:30:03.620000 CVE-2011-3240,0,0,99bf34fafb6e17d3f45d01dd418a3fed1227fb9d72dc31930402eb940b8ba76c,2023-11-07T02:08:28.320000 -CVE-2011-3241,0,1,8a0f3e6c0021d8f4a3852ec0ed3813a9d059e1d0c319df9f684325a96fe32e38,2024-11-21T01:30:03.793000 -CVE-2011-3242,0,1,b8678644a68b716037df3d228ecd5e3fb2498808fe50204ca25007fba34ade85,2024-11-21T01:30:03.960000 -CVE-2011-3243,0,1,90cff7ac2a21c65312cb4cb1448063addc560b6d64bd959d3d0662f27c2e6402,2024-11-21T01:30:04.133000 -CVE-2011-3244,0,1,7ea4f0647a50d7706e5d6910a3da7b5df1ad5261147d9985de6ed640e0d82933,2024-11-21T01:30:04.297000 -CVE-2011-3245,0,1,1e7332eaea90a1cb3bf6eec362cf98f17bb30dae5e5243f003729b6d2521dd4a,2024-11-21T01:30:04.443000 -CVE-2011-3246,0,1,8bc3d570ca59a2ed074e31c8fa4daa02b111d888e621db0f28a7ae34db35d41c,2024-11-21T01:30:04.570000 -CVE-2011-3247,0,1,e4fc104b8da61acb30a03dd8a547a6ca9d0260bb77893449c6651591ca1668bc,2024-11-21T01:30:04.703000 -CVE-2011-3248,0,1,8b83da0ab11602151bb59efa6f5f2f5e26a8e80e43b381fd936e7a7fcbbf926f,2024-11-21T01:30:04.860000 -CVE-2011-3249,0,1,07efe75a7a792e203df543a28a7d512ac2efba5067c2bc3f154033b6485ffcbd,2024-11-21T01:30:05.063000 -CVE-2011-3250,0,1,4d8dffcdeed8d3b45014848c5c741eea4ca198e4bfee67fb0a674e8cf7ff8b64,2024-11-21T01:30:05.770000 -CVE-2011-3251,0,1,0e7aee629832ad39e091ef3adfb5b59f16cce3aec5e7c69af8cd1444210d754a,2024-11-21T01:30:06.193000 -CVE-2011-3252,0,1,f7c2a660269dcd73164f16f744101aa8b17f397f4b06193ed467ab14e4a6b176,2024-11-21T01:30:06.687000 -CVE-2011-3253,0,1,cdaced1b2239d7e78b5b52f48ffde78721723749e078a6310d84371b722a3efa,2024-11-21T01:30:06.823000 -CVE-2011-3254,0,1,1cff7240aecc320a66af6fbf50a7cf68fb4177b1726d09b67560cfc192f6143e,2024-11-21T01:30:06.947000 -CVE-2011-3255,0,1,60f391c5dcfaff0a6d371998721e199d8cb92f4ddc731119f168a3a8feb0524c,2024-11-21T01:30:07.083000 -CVE-2011-3256,0,1,544bdc321ed5e798eccd5f0e5796cc3127b7b29b0c1dc2c86ab1ae5a0943b277,2024-11-21T01:30:07.210000 -CVE-2011-3257,0,1,9c687819fe0c963ada0ad09607be2f80bf56e212970b95b35aafcda6770a0497,2024-11-21T01:30:07.353000 +CVE-2011-3241,0,0,8a0f3e6c0021d8f4a3852ec0ed3813a9d059e1d0c319df9f684325a96fe32e38,2024-11-21T01:30:03.793000 +CVE-2011-3242,0,0,b8678644a68b716037df3d228ecd5e3fb2498808fe50204ca25007fba34ade85,2024-11-21T01:30:03.960000 +CVE-2011-3243,0,0,90cff7ac2a21c65312cb4cb1448063addc560b6d64bd959d3d0662f27c2e6402,2024-11-21T01:30:04.133000 +CVE-2011-3244,0,0,7ea4f0647a50d7706e5d6910a3da7b5df1ad5261147d9985de6ed640e0d82933,2024-11-21T01:30:04.297000 +CVE-2011-3245,0,0,1e7332eaea90a1cb3bf6eec362cf98f17bb30dae5e5243f003729b6d2521dd4a,2024-11-21T01:30:04.443000 +CVE-2011-3246,0,0,8bc3d570ca59a2ed074e31c8fa4daa02b111d888e621db0f28a7ae34db35d41c,2024-11-21T01:30:04.570000 +CVE-2011-3247,0,0,e4fc104b8da61acb30a03dd8a547a6ca9d0260bb77893449c6651591ca1668bc,2024-11-21T01:30:04.703000 +CVE-2011-3248,0,0,8b83da0ab11602151bb59efa6f5f2f5e26a8e80e43b381fd936e7a7fcbbf926f,2024-11-21T01:30:04.860000 +CVE-2011-3249,0,0,07efe75a7a792e203df543a28a7d512ac2efba5067c2bc3f154033b6485ffcbd,2024-11-21T01:30:05.063000 +CVE-2011-3250,0,0,4d8dffcdeed8d3b45014848c5c741eea4ca198e4bfee67fb0a674e8cf7ff8b64,2024-11-21T01:30:05.770000 +CVE-2011-3251,0,0,0e7aee629832ad39e091ef3adfb5b59f16cce3aec5e7c69af8cd1444210d754a,2024-11-21T01:30:06.193000 +CVE-2011-3252,0,0,f7c2a660269dcd73164f16f744101aa8b17f397f4b06193ed467ab14e4a6b176,2024-11-21T01:30:06.687000 +CVE-2011-3253,0,0,cdaced1b2239d7e78b5b52f48ffde78721723749e078a6310d84371b722a3efa,2024-11-21T01:30:06.823000 +CVE-2011-3254,0,0,1cff7240aecc320a66af6fbf50a7cf68fb4177b1726d09b67560cfc192f6143e,2024-11-21T01:30:06.947000 +CVE-2011-3255,0,0,60f391c5dcfaff0a6d371998721e199d8cb92f4ddc731119f168a3a8feb0524c,2024-11-21T01:30:07.083000 +CVE-2011-3256,0,0,544bdc321ed5e798eccd5f0e5796cc3127b7b29b0c1dc2c86ab1ae5a0943b277,2024-11-21T01:30:07.210000 +CVE-2011-3257,0,0,9c687819fe0c963ada0ad09607be2f80bf56e212970b95b35aafcda6770a0497,2024-11-21T01:30:07.353000 CVE-2011-3258,0,0,e02b2cccbaf10b24b5a9e21827a482af5c543d765c0d24e9981f30f6401431dd,2023-11-07T02:08:28.490000 -CVE-2011-3259,0,1,3e13c384faeb1da60cdd49c7e378cefd711fc06cde3c23a60926ec72fe157ff0,2024-11-21T01:30:07.527000 -CVE-2011-3260,0,1,3e554b40f9c1f4f03cea3ba13e922236ea9661a4ec83ef23f22cabe1c18b2778,2024-11-21T01:30:07.680000 -CVE-2011-3261,0,1,76f2c53ab8f87c8fbe5e8f922e7cc458a36c0e069c6113c1fee98c38cb5a1904,2024-11-21T01:30:07.810000 -CVE-2011-3262,0,1,238d0a63866e279bb37567ec374f5bb0818dbfc22b754fda1783ca96d0fc3139,2024-11-21T01:30:07.943000 -CVE-2011-3263,0,1,da6120f780b22f20009d903e3b379201ae2f5c9f75f291738c302c68b069c500,2024-11-21T01:30:08.103000 -CVE-2011-3264,0,1,84dddba443271bfddf70a8522e63b3dfe393290c02ccb527b6490440ed662538,2024-11-21T01:30:08.280000 -CVE-2011-3265,0,1,fd27d2f59f6c3c83aa19129ebbb574acfd93b0b23cf61f33dbba23fe13661522,2024-11-21T01:30:08.463000 -CVE-2011-3266,0,1,a739ecb1e8230f51239d8a35e5fbc703891fbcc5f1fdf3a9995df38d265cb13a,2024-11-21T01:30:08.643000 -CVE-2011-3267,0,1,d85a03d159ab2385da764653c2a8bda41bc3a7b5e4ea3bdebfe321622cf68f77,2024-11-21T01:30:08.837000 -CVE-2011-3268,0,1,5a15625e773c543819869b09562ba6725cbc1f5d64b64b4fa6826eeef84f8abc,2024-11-21T01:30:09.027000 +CVE-2011-3259,0,0,3e13c384faeb1da60cdd49c7e378cefd711fc06cde3c23a60926ec72fe157ff0,2024-11-21T01:30:07.527000 +CVE-2011-3260,0,0,3e554b40f9c1f4f03cea3ba13e922236ea9661a4ec83ef23f22cabe1c18b2778,2024-11-21T01:30:07.680000 +CVE-2011-3261,0,0,76f2c53ab8f87c8fbe5e8f922e7cc458a36c0e069c6113c1fee98c38cb5a1904,2024-11-21T01:30:07.810000 +CVE-2011-3262,0,0,238d0a63866e279bb37567ec374f5bb0818dbfc22b754fda1783ca96d0fc3139,2024-11-21T01:30:07.943000 +CVE-2011-3263,0,0,da6120f780b22f20009d903e3b379201ae2f5c9f75f291738c302c68b069c500,2024-11-21T01:30:08.103000 +CVE-2011-3264,0,0,84dddba443271bfddf70a8522e63b3dfe393290c02ccb527b6490440ed662538,2024-11-21T01:30:08.280000 +CVE-2011-3265,0,0,fd27d2f59f6c3c83aa19129ebbb574acfd93b0b23cf61f33dbba23fe13661522,2024-11-21T01:30:08.463000 +CVE-2011-3266,0,0,a739ecb1e8230f51239d8a35e5fbc703891fbcc5f1fdf3a9995df38d265cb13a,2024-11-21T01:30:08.643000 +CVE-2011-3267,0,0,d85a03d159ab2385da764653c2a8bda41bc3a7b5e4ea3bdebfe321622cf68f77,2024-11-21T01:30:08.837000 +CVE-2011-3268,0,0,5a15625e773c543819869b09562ba6725cbc1f5d64b64b4fa6826eeef84f8abc,2024-11-21T01:30:09.027000 CVE-2011-3269,0,0,5757dfdc6cd555b69a5f5293197a64581ef13dee192f9e02ca1e460b7bd5aff2,2020-03-10T19:52:33.257000 -CVE-2011-3270,0,1,64f3b210a0f4200a3769441930da8e177c83f7a68a809773e413f7cc9d46f140,2024-11-21T01:30:09.570000 -CVE-2011-3271,0,1,17dec90473afcb44830a4e6dda3c21d3c9161a332395661cc626b44f30df17a0,2024-11-21T01:30:09.710000 -CVE-2011-3272,0,1,508511d1bd1bad1eb225e70111c9ae8234042d93fc5a364554f7d6ae2af38f32,2024-11-21T01:30:09.843000 -CVE-2011-3273,0,1,6ed729dc9ce1bca3a67a25c38f607a1be7701b3f506660d504646935930defbc,2024-11-21T01:30:09.980000 -CVE-2011-3274,0,1,8c936b52ac94dd1617f4f64fc7a49c8d5a1232de19763e7e4bb9641659a8f028,2024-11-21T01:30:10.130000 -CVE-2011-3275,0,1,aed63d616bba7f3ccbdd4244a531ab6ca91c84dd9780587983f958b0dbdee1a4,2024-11-21T01:30:10.270000 -CVE-2011-3276,0,1,2f2b28f62d2a66a0219cdc25145ceb6be22c620da10bfca78e929971b08fa5fc,2024-11-21T01:30:10.407000 -CVE-2011-3277,0,1,8b811b100bb81ef0e36fe42769e1a5e169797a39120459e1cad815a5eb4066e0,2024-11-21T01:30:10.573000 -CVE-2011-3278,0,1,9e0f762ffe90583df72cbb84ed981bff2e0b7d7c1fe372ded07ab59fb504e905,2024-11-21T01:30:10.740000 -CVE-2011-3279,0,1,c5031977fb0859b15333ce4f6003f18a68ecf8df05ef35db7fe173074946f91d,2024-11-21T01:30:10.913000 -CVE-2011-3280,0,1,a4dff0765ccd440e3d51a493b2ab4f12a194d630bfbdd41d0de33a4db5159282,2024-11-21T01:30:11.053000 -CVE-2011-3281,0,1,b572c23ffafe5e9dc40a39d3e29008178a7de0b8eb410c0ed79deba73d0853ac,2024-11-21T01:30:11.220000 -CVE-2011-3282,0,1,cd37c766462f500ca38af7e669a51c6409499bf3db745dd0909243b5deb8fdce,2024-11-21T01:30:11.363000 +CVE-2011-3270,0,0,64f3b210a0f4200a3769441930da8e177c83f7a68a809773e413f7cc9d46f140,2024-11-21T01:30:09.570000 +CVE-2011-3271,0,0,17dec90473afcb44830a4e6dda3c21d3c9161a332395661cc626b44f30df17a0,2024-11-21T01:30:09.710000 +CVE-2011-3272,0,0,508511d1bd1bad1eb225e70111c9ae8234042d93fc5a364554f7d6ae2af38f32,2024-11-21T01:30:09.843000 +CVE-2011-3273,0,0,6ed729dc9ce1bca3a67a25c38f607a1be7701b3f506660d504646935930defbc,2024-11-21T01:30:09.980000 +CVE-2011-3274,0,0,8c936b52ac94dd1617f4f64fc7a49c8d5a1232de19763e7e4bb9641659a8f028,2024-11-21T01:30:10.130000 +CVE-2011-3275,0,0,aed63d616bba7f3ccbdd4244a531ab6ca91c84dd9780587983f958b0dbdee1a4,2024-11-21T01:30:10.270000 +CVE-2011-3276,0,0,2f2b28f62d2a66a0219cdc25145ceb6be22c620da10bfca78e929971b08fa5fc,2024-11-21T01:30:10.407000 +CVE-2011-3277,0,0,8b811b100bb81ef0e36fe42769e1a5e169797a39120459e1cad815a5eb4066e0,2024-11-21T01:30:10.573000 +CVE-2011-3278,0,0,9e0f762ffe90583df72cbb84ed981bff2e0b7d7c1fe372ded07ab59fb504e905,2024-11-21T01:30:10.740000 +CVE-2011-3279,0,0,c5031977fb0859b15333ce4f6003f18a68ecf8df05ef35db7fe173074946f91d,2024-11-21T01:30:10.913000 +CVE-2011-3280,0,0,a4dff0765ccd440e3d51a493b2ab4f12a194d630bfbdd41d0de33a4db5159282,2024-11-21T01:30:11.053000 +CVE-2011-3281,0,0,b572c23ffafe5e9dc40a39d3e29008178a7de0b8eb410c0ed79deba73d0853ac,2024-11-21T01:30:11.220000 +CVE-2011-3282,0,0,cd37c766462f500ca38af7e669a51c6409499bf3db745dd0909243b5deb8fdce,2024-11-21T01:30:11.363000 CVE-2011-3283,0,0,c0eea741d8ad85ffc44358796be66cd166129932f68a9a948718a50e2e6a22a7,2017-12-07T02:29:08.147000 CVE-2011-3285,0,0,fa90883190e2579a56bf1544005e02acb041e3ded8b2aac497135997bf67dd58,2023-08-15T14:28:06.997000 -CVE-2011-3287,0,1,ce4517c3832a47cecb6edfe69d84d38b745049edcf278361892b89778137241a,2024-11-21T01:30:11.800000 -CVE-2011-3288,0,1,bc6183904e65223567c5fbf429accf4ad33a9eff66e9abbdf8198a562cada2c7,2024-11-21T01:30:11.943000 +CVE-2011-3287,0,0,ce4517c3832a47cecb6edfe69d84d38b745049edcf278361892b89778137241a,2024-11-21T01:30:11.800000 +CVE-2011-3288,0,0,bc6183904e65223567c5fbf429accf4ad33a9eff66e9abbdf8198a562cada2c7,2024-11-21T01:30:11.943000 CVE-2011-3289,0,0,2cd9b8adec6190b350f04ff89b5f26f21fa0240606d71d2855ff9afe42fb40f1,2012-10-30T03:55:59 -CVE-2011-3290,0,1,b2f69e9d5877b53b97fb3177b3f3cbeb51dcb05e70a64fdb96056f908b8e81eb,2024-11-21T01:30:12.240000 +CVE-2011-3290,0,0,b2f69e9d5877b53b97fb3177b3f3cbeb51dcb05e70a64fdb96056f908b8e81eb,2024-11-21T01:30:12.240000 CVE-2011-3293,0,0,df391e5dec192b72ded252ec6187e4b29300572c6101ff36ab9cb92f7f90b51d,2012-06-09T03:36:29.400000 -CVE-2011-3294,0,1,b618b7640c07c92bba5058001b9e257d11d4b43c5ffaa0290c3917553b702df1,2024-11-21T01:30:12.520000 +CVE-2011-3294,0,0,b618b7640c07c92bba5058001b9e257d11d4b43c5ffaa0290c3917553b702df1,2024-11-21T01:30:12.520000 CVE-2011-3295,0,0,49e06222380f1d83ef9835626caf44bad2e7a742b6d25e627480f5055b88cfdf,2012-10-30T03:55:59.597000 -CVE-2011-3296,0,1,15c3b7194a24f6b7aae3f03b963e88a691e29ad3a5237195f872efdddeb142ed,2024-11-21T01:30:12.860000 -CVE-2011-3297,0,1,e041b0d57f0d924851fc286354cd602f31245bfbf07c855b06c871d9e70a7b89,2024-11-21T01:30:13.013000 -CVE-2011-3298,0,1,3c4dff54401b5b22138f8a5e0ad2d13248e07cd1b2fd0434882ff9d1794d5f20,2024-11-21T01:30:13.160000 -CVE-2011-3299,0,1,50a4b927d323f0240b5a6654bcad24d9880e349f336a3c2b73aa5655f5b83ff3,2024-11-21T01:30:13.320000 -CVE-2011-3300,0,1,d2159b780686f9a6bbe22d140f3d69318c647862f7c110b6f888dc9bcedbc02d,2024-11-21T01:30:13.487000 -CVE-2011-3301,0,1,b2da02617180be56e1dde6f39340bcefe1ec45351594c320508eb72b9b8a64e3,2024-11-21T01:30:13.660000 -CVE-2011-3302,0,1,07b236b465a66e0743924df74bf8e8778bf0bbdf00cf9867cda791c0dff4c6e7,2024-11-21T01:30:13.830000 -CVE-2011-3303,0,1,48e7f177adf110cf5d8da63de6218b18eef3b32062674dd09c7fc6fd68fb0645,2024-11-21T01:30:14 -CVE-2011-3304,0,1,bd34d514de1334c3a8228feef9900f3866bed49a76b5075546dddd535b0a2d79,2024-11-21T01:30:14.177000 -CVE-2011-3305,0,1,ba2b7f814abd07f1c4ade59e9a5250662f9c887bb0b67b455a09271c75739c54,2024-11-21T01:30:14.333000 +CVE-2011-3296,0,0,15c3b7194a24f6b7aae3f03b963e88a691e29ad3a5237195f872efdddeb142ed,2024-11-21T01:30:12.860000 +CVE-2011-3297,0,0,e041b0d57f0d924851fc286354cd602f31245bfbf07c855b06c871d9e70a7b89,2024-11-21T01:30:13.013000 +CVE-2011-3298,0,0,3c4dff54401b5b22138f8a5e0ad2d13248e07cd1b2fd0434882ff9d1794d5f20,2024-11-21T01:30:13.160000 +CVE-2011-3299,0,0,50a4b927d323f0240b5a6654bcad24d9880e349f336a3c2b73aa5655f5b83ff3,2024-11-21T01:30:13.320000 +CVE-2011-3300,0,0,d2159b780686f9a6bbe22d140f3d69318c647862f7c110b6f888dc9bcedbc02d,2024-11-21T01:30:13.487000 +CVE-2011-3301,0,0,b2da02617180be56e1dde6f39340bcefe1ec45351594c320508eb72b9b8a64e3,2024-11-21T01:30:13.660000 +CVE-2011-3302,0,0,07b236b465a66e0743924df74bf8e8778bf0bbdf00cf9867cda791c0dff4c6e7,2024-11-21T01:30:13.830000 +CVE-2011-3303,0,0,48e7f177adf110cf5d8da63de6218b18eef3b32062674dd09c7fc6fd68fb0645,2024-11-21T01:30:14 +CVE-2011-3304,0,0,bd34d514de1334c3a8228feef9900f3866bed49a76b5075546dddd535b0a2d79,2024-11-21T01:30:14.177000 +CVE-2011-3305,0,0,ba2b7f814abd07f1c4ade59e9a5250662f9c887bb0b67b455a09271c75739c54,2024-11-21T01:30:14.333000 CVE-2011-3309,0,0,6f78180a5ca2c6433086d0ed463c21f48bee74a6bbde20477411a2e69cb30afd,2023-08-15T14:28:06.997000 -CVE-2011-3310,0,1,718e042b75fc8437cd71abde3a401e58d43d5a2bf81a5b195613e3c461105220,2024-11-21T01:30:14.630000 -CVE-2011-3315,0,1,1aff2dae06eac499e628197627497892f7b2c521d8cedac7e8024cfe2b29241c,2024-11-21T01:30:14.773000 +CVE-2011-3310,0,0,718e042b75fc8437cd71abde3a401e58d43d5a2bf81a5b195613e3c461105220,2024-11-21T01:30:14.630000 +CVE-2011-3315,0,0,1aff2dae06eac499e628197627497892f7b2c521d8cedac7e8024cfe2b29241c,2024-11-21T01:30:14.773000 CVE-2011-3317,0,0,1b46b3d2249f2d12a4c1490b93573e5a24f8e6c8b17abcbe71e9c5588ea992b4,2012-06-09T03:36:31.323000 -CVE-2011-3318,0,1,f6bd341809b6524c461e76e378685bdf03a125310b191b37cc532abb2c1f46c8,2024-11-21T01:30:15.113000 -CVE-2011-3319,0,1,df4f33b313364bdb1806fa9ba6af9217312ae925d17436c3ad9fc54e0238ff26,2024-11-21T01:30:15.253000 -CVE-2011-3320,0,1,5acdcdd22c3910f22232e425f85eaef5c610f525c6985db001c8a2a1ca4a348b,2024-11-21T01:30:15.387000 -CVE-2011-3321,0,1,07c6d3e3a837d820800ffd102d85f731f914be968e188e322103a24e0eb32002,2024-11-21T01:30:15.513000 -CVE-2011-3322,0,1,fbbce70859de1b0a62cd518d46f2acde9605c918c3dd4ec4bc2d5a1c70013497,2024-11-21T01:30:15.657000 -CVE-2011-3323,0,1,e80408dd18ed0473ebd479d5aac429f768d3a31894e661015713e9d70e2c5efd,2024-11-21T01:30:15.803000 -CVE-2011-3324,0,1,bfb085ea7634db67c9bcc9a7695887457dafcb048072303891d37c09f6c681fc,2024-11-21T01:30:15.977000 -CVE-2011-3325,0,1,23f97c25d26536122c0ad1124ee09916a54fcf8f68028da586b8fa7f3506a508,2024-11-21T01:30:16.137000 -CVE-2011-3326,0,1,d34ed647f35f372025047fbdfeb2c2d0d7a46080b50cd484fa5af0bf676cd659,2024-11-21T01:30:16.313000 -CVE-2011-3327,0,1,5429b9d2778a7a02a058fdde15089b3aa07845ec92a847cfeafd39da66d3ab7c,2024-11-21T01:30:16.473000 -CVE-2011-3328,0,1,a94abe975ed9d1b01be5d21075cc674559bbc9dd9a789d91ead6ed768344d667,2024-11-21T01:30:16.630000 -CVE-2011-3330,0,1,9a98cbcd527b6983f8491987e1c17652005ce338e574adfa1535b0af759ebdd8,2024-11-21T01:30:16.777000 -CVE-2011-3332,0,1,21227f07c7f8612d88cf01fe2ca7be8e4453dfc036b56036220756c99e2cc685,2024-11-21T01:30:16.927000 +CVE-2011-3318,0,0,f6bd341809b6524c461e76e378685bdf03a125310b191b37cc532abb2c1f46c8,2024-11-21T01:30:15.113000 +CVE-2011-3319,0,0,df4f33b313364bdb1806fa9ba6af9217312ae925d17436c3ad9fc54e0238ff26,2024-11-21T01:30:15.253000 +CVE-2011-3320,0,0,5acdcdd22c3910f22232e425f85eaef5c610f525c6985db001c8a2a1ca4a348b,2024-11-21T01:30:15.387000 +CVE-2011-3321,0,0,07c6d3e3a837d820800ffd102d85f731f914be968e188e322103a24e0eb32002,2024-11-21T01:30:15.513000 +CVE-2011-3322,0,0,fbbce70859de1b0a62cd518d46f2acde9605c918c3dd4ec4bc2d5a1c70013497,2024-11-21T01:30:15.657000 +CVE-2011-3323,0,0,e80408dd18ed0473ebd479d5aac429f768d3a31894e661015713e9d70e2c5efd,2024-11-21T01:30:15.803000 +CVE-2011-3324,0,0,bfb085ea7634db67c9bcc9a7695887457dafcb048072303891d37c09f6c681fc,2024-11-21T01:30:15.977000 +CVE-2011-3325,0,0,23f97c25d26536122c0ad1124ee09916a54fcf8f68028da586b8fa7f3506a508,2024-11-21T01:30:16.137000 +CVE-2011-3326,0,0,d34ed647f35f372025047fbdfeb2c2d0d7a46080b50cd484fa5af0bf676cd659,2024-11-21T01:30:16.313000 +CVE-2011-3327,0,0,5429b9d2778a7a02a058fdde15089b3aa07845ec92a847cfeafd39da66d3ab7c,2024-11-21T01:30:16.473000 +CVE-2011-3328,0,0,a94abe975ed9d1b01be5d21075cc674559bbc9dd9a789d91ead6ed768344d667,2024-11-21T01:30:16.630000 +CVE-2011-3330,0,0,9a98cbcd527b6983f8491987e1c17652005ce338e574adfa1535b0af759ebdd8,2024-11-21T01:30:16.777000 +CVE-2011-3332,0,0,21227f07c7f8612d88cf01fe2ca7be8e4453dfc036b56036220756c99e2cc685,2024-11-21T01:30:16.927000 CVE-2011-3336,0,0,7c66bff020dbabcbafafa33e31d8f043890b5eb0d0786a256a8b75c8a34752a3,2020-02-18T19:49:54.197000 -CVE-2011-3337,0,1,ca20eccbe880c0f2ea723e1138ebe9a7c7c92568f82c32fc7da41915f5a30925,2024-11-21T01:30:17.213000 -CVE-2011-3339,0,1,20c9e7f5ea052b181ec442752dee945fcaf34fbc933f44f7f80ed879a5a150ad,2024-11-21T01:30:17.353000 -CVE-2011-3340,0,1,9e380f563d69582bd79ff6008047e0da53b55f21468ee422673ff0316c9af0f0,2024-11-21T01:30:17.500000 -CVE-2011-3341,0,1,29276592f2541362ce9b763d822827d61394202344cf688834b85691c2354ba5,2024-11-21T01:30:17.680000 -CVE-2011-3342,0,1,f66e05462372ddf2e37c238c57fe90b5757e03aaa1ad34ef9ca2839c2249518c,2024-11-21T01:30:17.833000 -CVE-2011-3343,0,1,776b5c39d9aeba71e6eab5377cc89f50bb38e4f07ced4ed13484d986c190a5bf,2024-11-21T01:30:18.003000 +CVE-2011-3337,0,0,ca20eccbe880c0f2ea723e1138ebe9a7c7c92568f82c32fc7da41915f5a30925,2024-11-21T01:30:17.213000 +CVE-2011-3339,0,0,20c9e7f5ea052b181ec442752dee945fcaf34fbc933f44f7f80ed879a5a150ad,2024-11-21T01:30:17.353000 +CVE-2011-3340,0,0,9e380f563d69582bd79ff6008047e0da53b55f21468ee422673ff0316c9af0f0,2024-11-21T01:30:17.500000 +CVE-2011-3341,0,0,29276592f2541362ce9b763d822827d61394202344cf688834b85691c2354ba5,2024-11-21T01:30:17.680000 +CVE-2011-3342,0,0,f66e05462372ddf2e37c238c57fe90b5757e03aaa1ad34ef9ca2839c2249518c,2024-11-21T01:30:17.833000 +CVE-2011-3343,0,0,776b5c39d9aeba71e6eab5377cc89f50bb38e4f07ced4ed13484d986c190a5bf,2024-11-21T01:30:18.003000 CVE-2011-3344,0,0,ddabe4117c54c37dcfb77abc858b2d69b0ce4b68b2b84574c282dcfc3d2b9034,2023-02-13T00:19:51.077000 -CVE-2011-3345,0,1,00becb0f0e5bd753d7f8000db9cb705dbe00817fe58e45fbe0bd0912aca2b2cb,2024-11-21T01:30:18.317000 +CVE-2011-3345,0,0,00becb0f0e5bd753d7f8000db9cb705dbe00817fe58e45fbe0bd0912aca2b2cb,2024-11-21T01:30:18.317000 CVE-2011-3346,0,0,0e1356fa236ae2cfedc228cbd1130142a4f8baaad64b46ae222168ee7ff8b6f2,2023-11-07T02:08:29.430000 CVE-2011-3347,0,0,409e73e1eff7cf7744d26c0ec20d9432d7e46eec7e0d68fc4dc54d729f238f3a,2023-02-13T01:20:41.140000 -CVE-2011-3348,0,1,9ab42d8f02fbd61dd0be48bdbf35d082e107965eb43d8df1e86b0e20340cbc9b,2024-11-21T01:30:18.680000 +CVE-2011-3348,0,0,9ab42d8f02fbd61dd0be48bdbf35d082e107965eb43d8df1e86b0e20340cbc9b,2024-11-21T01:30:18.680000 CVE-2011-3349,0,0,de9b19b08d803a68aee6946cad55fa92728d6b1741ab98cb54c4f0e2cb9e6e8f,2019-12-03T16:19:59.420000 CVE-2011-3350,0,0,f64e5473d5a909d7848f9500da870b5f82bfb3cd2fedc1e1190d5ac26180d18c,2019-12-03T16:13:12.137000 CVE-2011-3351,0,0,2c1ece370419dfc4a249df63d019a37ca29e5588435158aefa47fa9b644a158f,2019-12-11T18:39:25.273000 CVE-2011-3352,0,0,4dfe57e80b3154393854f5b5ef5614cfe352f4b16a4546dadcfc3c012fb9d271,2019-11-21T20:22:54.430000 CVE-2011-3353,0,0,f1e7dafcb0165c38bd5902cb25cd60fcc66450167d85d3fe003ae9642c70e1e2,2023-02-13T01:20:46.850000 -CVE-2011-3354,0,1,f8dcf87fbd0aab194366bea550cdbc86436cdb1bfd7fc6bdde6bd800be278e98,2024-11-21T01:30:19.473000 +CVE-2011-3354,0,0,f8dcf87fbd0aab194366bea550cdbc86436cdb1bfd7fc6bdde6bd800be278e98,2024-11-21T01:30:19.473000 CVE-2011-3355,0,0,268f22c14834525287853ff7d7b3125342d3b819ea327bf9061dda78d050ae8f,2019-12-14T14:28:30.653000 -CVE-2011-3356,0,1,49f69a7db2d0034b5c322ca6639f2f87e9813c2f250c655192eb9f03cc589bbb,2024-11-21T01:30:19.717000 -CVE-2011-3357,0,1,44e209adb64e95d3f0cf54f41de2d5e2fbf6a0cd51be926711d4f633168f4267,2024-11-21T01:30:19.870000 -CVE-2011-3358,0,1,a9f9032bd13340907bbce5c30e5a1a0dc2e259ef1b92f178f380366ed08b90a0,2024-11-21T01:30:20.010000 +CVE-2011-3356,0,0,49f69a7db2d0034b5c322ca6639f2f87e9813c2f250c655192eb9f03cc589bbb,2024-11-21T01:30:19.717000 +CVE-2011-3357,0,0,44e209adb64e95d3f0cf54f41de2d5e2fbf6a0cd51be926711d4f633168f4267,2024-11-21T01:30:19.870000 +CVE-2011-3358,0,0,a9f9032bd13340907bbce5c30e5a1a0dc2e259ef1b92f178f380366ed08b90a0,2024-11-21T01:30:20.010000 CVE-2011-3359,0,0,eb5bbb5643b64dbbcf3691972622b0239f02fc5713c3d4b28d268565849047ae,2023-02-13T04:32:38.440000 -CVE-2011-3360,0,1,d93fbbab89f2f73f3dc3e08b3a20b5a972f0896c1691273c6ac62c84a618c26d,2024-11-21T01:30:20.270000 +CVE-2011-3360,0,0,d93fbbab89f2f73f3dc3e08b3a20b5a972f0896c1691273c6ac62c84a618c26d,2024-11-21T01:30:20.270000 CVE-2011-3361,0,0,9c057d6c718ca1c9b854d4b74d1cdf94dad04c547d39c21c57fff6b2ea43902a,2017-08-29T01:30:10.880000 -CVE-2011-3362,0,1,5893ca118cddb7355278ba57308dc9651eb26ce3ecf0d5ef5ccf1980a347120b,2024-11-21T01:30:20.520000 +CVE-2011-3362,0,0,5893ca118cddb7355278ba57308dc9651eb26ce3ecf0d5ef5ccf1980a347120b,2024-11-21T01:30:20.520000 CVE-2011-3363,0,0,ceccc2a580ffce33dedb260d99e2d17184186efa05004ada4210f620819cc12a,2023-02-13T01:20:50.530000 -CVE-2011-3364,0,1,0b6e85732eb9c8a3e5d35b44a78f13158120d1e23d11f04323b7827364141881,2024-11-21T01:30:20.773000 -CVE-2011-3365,0,1,8f9e3dd2861af8b5d01b03f45e449b9141ce4b64cdf2767de506c74a95030653,2024-11-21T01:30:20.883000 -CVE-2011-3366,0,1,808429d3d5b11b438ccf6fb80b6a8dcba5affdc18cce60d861fda783af0213e8,2024-11-21T01:30:20.993000 -CVE-2011-3367,0,1,f2beef72cc397d2a7b043fdb6bba4f35d9060ed29af21c50485d2ade211311e8,2024-11-21T01:30:21.113000 -CVE-2011-3368,0,1,4700f168ea056696e15217f9a1df931e8b62998111e2798cf84f6ae534378684,2024-11-21T01:30:21.220000 -CVE-2011-3369,0,1,3fe73af8f5742a0c570e6c10ae4688e94a97da3e3af149c1e42c1a74b7517d5d,2024-11-21T01:30:21.870000 +CVE-2011-3364,0,0,0b6e85732eb9c8a3e5d35b44a78f13158120d1e23d11f04323b7827364141881,2024-11-21T01:30:20.773000 +CVE-2011-3365,0,0,8f9e3dd2861af8b5d01b03f45e449b9141ce4b64cdf2767de506c74a95030653,2024-11-21T01:30:20.883000 +CVE-2011-3366,0,0,808429d3d5b11b438ccf6fb80b6a8dcba5affdc18cce60d861fda783af0213e8,2024-11-21T01:30:20.993000 +CVE-2011-3367,0,0,f2beef72cc397d2a7b043fdb6bba4f35d9060ed29af21c50485d2ade211311e8,2024-11-21T01:30:21.113000 +CVE-2011-3368,0,0,4700f168ea056696e15217f9a1df931e8b62998111e2798cf84f6ae534378684,2024-11-21T01:30:21.220000 +CVE-2011-3369,0,0,3fe73af8f5742a0c570e6c10ae4688e94a97da3e3af149c1e42c1a74b7517d5d,2024-11-21T01:30:21.870000 CVE-2011-3370,0,0,384b3bb78f76a864476529ebf30775d16e452ad2f3c323381aaf24d9613e5943,2019-11-12T21:16:05.337000 -CVE-2011-3371,0,1,865fb70448cb43758a3c7612ba566a19b74b1f16d341960a8b1825ea16e6ca8a,2024-11-21T01:30:22.257000 -CVE-2011-3372,0,1,8c9eab438d5b545d38bc34a1103d00dc329855e421a9dceb5991dc064154d0a8,2024-11-21T01:30:22.397000 +CVE-2011-3371,0,0,865fb70448cb43758a3c7612ba566a19b74b1f16d341960a8b1825ea16e6ca8a,2024-11-21T01:30:22.257000 +CVE-2011-3372,0,0,8c9eab438d5b545d38bc34a1103d00dc329855e421a9dceb5991dc064154d0a8,2024-11-21T01:30:22.397000 CVE-2011-3373,0,0,44f80aa25a684997959240e70cdd32fc3d97c24ba5b889560a3e5a6c737cb98e,2019-12-12T16:22:30.320000 CVE-2011-3374,0,0,8690c4b98f9f136eba835babab4cf1990bd9cf23a214588fb7599a8a7960278b,2021-02-09T16:08:18.683000 -CVE-2011-3375,0,1,f751b28f1acc542fb0a8d377ed2374edc31df903ea1b3ec7e0972f62fcb18f31,2024-11-21T01:30:23.593000 -CVE-2011-3376,0,1,19f069ffd660d14d8e6c12547381dc545ad5e6006cb10083a899c7f1e3ac3179,2024-11-21T01:30:23.730000 +CVE-2011-3375,0,0,f751b28f1acc542fb0a8d377ed2374edc31df903ea1b3ec7e0972f62fcb18f31,2024-11-21T01:30:23.593000 +CVE-2011-3376,0,0,19f069ffd660d14d8e6c12547381dc545ad5e6006cb10083a899c7f1e3ac3179,2024-11-21T01:30:23.730000 CVE-2011-3377,0,0,111e3f9380c165e729df2aebc25b4c96cc0b55a5f825861bb0ac2fad7ffe7d14,2018-10-30T16:27:33.653000 -CVE-2011-3378,0,1,8fb674428a0572929e28edfd421f7c37fd030b06012a9ccfdf915b1b44ba19e4,2024-11-21T01:30:23.970000 -CVE-2011-3379,0,1,90bbfd5135feaaa3af3aaa24964dd19a3bf3f6825e441889016d031659627e9e,2024-11-21T01:30:24.100000 -CVE-2011-3380,0,1,dec533929a7579497882f17a6cf744186f823b47892190f175aae24b7770a29d,2024-11-21T01:30:24.220000 -CVE-2011-3381,0,1,5178aa3e531b897553d06460cfe83d27c9a81c66f578df7d887f93868c293adb,2024-11-21T01:30:24.333000 -CVE-2011-3382,0,1,68b2028947a8140ad4f75620624aa3f3a0478e3ed345a59faaf67dda9cdb0705,2024-11-21T01:30:24.463000 -CVE-2011-3383,0,1,b75641cf3f3cd8e806f2edb2a2af4e2741020985ec9f8ce5105869f6255284c9,2024-11-21T01:30:24.577000 -CVE-2011-3384,0,1,e622675cd6b2bf6760def6b14a3717a71f3ff56ec038aeb4612ddf86c7de708a,2024-11-21T01:30:24.690000 -CVE-2011-3385,0,1,80b3af464b718bd4f2dccf4d9c81e0e47f986852babcc3e234067aec2d828075,2024-11-21T01:30:24.800000 -CVE-2011-3386,0,1,afa42cc31e2e0cd0f54657e623d3a686b1757680c9ae56f4312eec0f13583edb,2024-11-21T01:30:24.900000 -CVE-2011-3387,0,1,6dc467f31b8c97753df8b7a1ddbab4d41e07cf89e76d644d8808d38461d443e5,2024-11-21T01:30:25.047000 -CVE-2011-3388,0,1,1533240744ffe1ccef3a25593d5e9507f9dfab915240620eda2a0b93d5057950,2024-11-21T01:30:25.183000 -CVE-2011-3389,0,1,f5fc1bcbc6e217cf7334ad2c3d594d8a6508dd4cd684a43703ed32cdba145543,2024-11-21T01:30:25.357000 -CVE-2011-3390,0,1,f8b98cfa73eb15d1716b51527cf4c5400a9d7917aded892b7c06a69d7d7aac74,2024-11-21T01:30:25.700000 -CVE-2011-3391,0,1,7b31cc4ac26f567ad4623c7ad034d325b0095365667f7fcae9d0a5f0f5ae71ea,2024-11-21T01:30:25.850000 -CVE-2011-3392,0,1,d7b488676d495ae7395a106563ae834be9194dac40f55c6432b56f2e9205944c,2024-11-21T01:30:26 -CVE-2011-3393,0,1,211f690f52b7f882ae3efdfc10f771aab57f74c5ab0f7e2c5276d12b2322db1b,2024-11-21T01:30:26.157000 -CVE-2011-3394,0,1,fe717cf404a804a3ac7fb59c0ab2817e7665a2fa3383bde407829d41c35d3515,2024-11-21T01:30:26.317000 +CVE-2011-3378,0,0,8fb674428a0572929e28edfd421f7c37fd030b06012a9ccfdf915b1b44ba19e4,2024-11-21T01:30:23.970000 +CVE-2011-3379,0,0,90bbfd5135feaaa3af3aaa24964dd19a3bf3f6825e441889016d031659627e9e,2024-11-21T01:30:24.100000 +CVE-2011-3380,0,0,dec533929a7579497882f17a6cf744186f823b47892190f175aae24b7770a29d,2024-11-21T01:30:24.220000 +CVE-2011-3381,0,0,5178aa3e531b897553d06460cfe83d27c9a81c66f578df7d887f93868c293adb,2024-11-21T01:30:24.333000 +CVE-2011-3382,0,0,68b2028947a8140ad4f75620624aa3f3a0478e3ed345a59faaf67dda9cdb0705,2024-11-21T01:30:24.463000 +CVE-2011-3383,0,0,b75641cf3f3cd8e806f2edb2a2af4e2741020985ec9f8ce5105869f6255284c9,2024-11-21T01:30:24.577000 +CVE-2011-3384,0,0,e622675cd6b2bf6760def6b14a3717a71f3ff56ec038aeb4612ddf86c7de708a,2024-11-21T01:30:24.690000 +CVE-2011-3385,0,0,80b3af464b718bd4f2dccf4d9c81e0e47f986852babcc3e234067aec2d828075,2024-11-21T01:30:24.800000 +CVE-2011-3386,0,0,afa42cc31e2e0cd0f54657e623d3a686b1757680c9ae56f4312eec0f13583edb,2024-11-21T01:30:24.900000 +CVE-2011-3387,0,0,6dc467f31b8c97753df8b7a1ddbab4d41e07cf89e76d644d8808d38461d443e5,2024-11-21T01:30:25.047000 +CVE-2011-3388,0,0,1533240744ffe1ccef3a25593d5e9507f9dfab915240620eda2a0b93d5057950,2024-11-21T01:30:25.183000 +CVE-2011-3389,0,0,f5fc1bcbc6e217cf7334ad2c3d594d8a6508dd4cd684a43703ed32cdba145543,2024-11-21T01:30:25.357000 +CVE-2011-3390,0,0,f8b98cfa73eb15d1716b51527cf4c5400a9d7917aded892b7c06a69d7d7aac74,2024-11-21T01:30:25.700000 +CVE-2011-3391,0,0,7b31cc4ac26f567ad4623c7ad034d325b0095365667f7fcae9d0a5f0f5ae71ea,2024-11-21T01:30:25.850000 +CVE-2011-3392,0,0,d7b488676d495ae7395a106563ae834be9194dac40f55c6432b56f2e9205944c,2024-11-21T01:30:26 +CVE-2011-3393,0,0,211f690f52b7f882ae3efdfc10f771aab57f74c5ab0f7e2c5276d12b2322db1b,2024-11-21T01:30:26.157000 +CVE-2011-3394,0,0,fe717cf404a804a3ac7fb59c0ab2817e7665a2fa3383bde407829d41c35d3515,2024-11-21T01:30:26.317000 CVE-2011-3395,0,0,6e7d1a897970221d5e4fd00c152188b829ab79904d4c25ab69e2a1b349a2f885,2023-11-07T02:08:30.767000 -CVE-2011-3396,0,1,70317064561614b05966cc48f922c6cb0e3ce4bdbc85fa72d3660c8753dabe69,2024-11-21T01:30:26.467000 -CVE-2011-3397,0,1,ea6b017c0b0003f7d636c9c363ae4e2858c5b6baf2c804d94f23ae581f26acee,2024-11-21T01:30:26.573000 +CVE-2011-3396,0,0,70317064561614b05966cc48f922c6cb0e3ce4bdbc85fa72d3660c8753dabe69,2024-11-21T01:30:26.467000 +CVE-2011-3397,0,0,ea6b017c0b0003f7d636c9c363ae4e2858c5b6baf2c804d94f23ae581f26acee,2024-11-21T01:30:26.573000 CVE-2011-3398,0,0,246f6969a15122dd90a428541c7ba87fb53327f277bc7471527ca66dc9d5151c,2023-11-07T02:08:31.053000 CVE-2011-3399,0,0,5ae74307d0b276b1b3501e19426680ef0b1a778b1a11e3a97c6c099a9ccf7d41,2023-11-07T02:08:31.310000 -CVE-2011-3400,0,1,ee762d7ad3ea8296ca015ec309d9bebadf37d5021250571cc16e0118862e1679,2024-11-21T01:30:26.713000 -CVE-2011-3401,0,1,2b68e7e5cfe1c5198e9aa0bb086e99b8d460c34cb798fab096c033b748c505ac,2024-11-21T01:30:26.813000 -CVE-2011-3402,0,1,6492f43ddf9572f81c19848a90dfeae8d11af023c5553de5ed898aa9aa8bc90e,2024-11-21T01:30:26.923000 -CVE-2011-3403,0,1,a386cac9b05bb0bc4797d2e90a1a30ae78bcee560fe456e205b7fd55fae01f1f,2024-11-21T01:30:27.060000 -CVE-2011-3404,0,1,8af0afed6bf8d2a251e7ed8b24cd49597fdd8d0f6704ba87a9c4b4a72d7263ed,2024-11-21T01:30:27.167000 +CVE-2011-3400,0,0,ee762d7ad3ea8296ca015ec309d9bebadf37d5021250571cc16e0118862e1679,2024-11-21T01:30:26.713000 +CVE-2011-3401,0,0,2b68e7e5cfe1c5198e9aa0bb086e99b8d460c34cb798fab096c033b748c505ac,2024-11-21T01:30:26.813000 +CVE-2011-3402,0,0,6492f43ddf9572f81c19848a90dfeae8d11af023c5553de5ed898aa9aa8bc90e,2024-11-21T01:30:26.923000 +CVE-2011-3403,0,0,a386cac9b05bb0bc4797d2e90a1a30ae78bcee560fe456e205b7fd55fae01f1f,2024-11-21T01:30:27.060000 +CVE-2011-3404,0,0,8af0afed6bf8d2a251e7ed8b24cd49597fdd8d0f6704ba87a9c4b4a72d7263ed,2024-11-21T01:30:27.167000 CVE-2011-3405,0,0,0449b070fd1686d4c30cf2c476482f8d530134bb6ff92a977bd76730f421fc55,2023-11-07T02:08:31.617000 -CVE-2011-3406,0,1,ea3c2a143b287146221ab1d7c2ba4571caa26a8ca4c769e16178ec66b86d2689,2024-11-21T01:30:27.297000 +CVE-2011-3406,0,0,ea3c2a143b287146221ab1d7c2ba4571caa26a8ca4c769e16178ec66b86d2689,2024-11-21T01:30:27.297000 CVE-2011-3407,0,0,84a8bb257fe317a655aef47c283c8ab99ad50012742ae8d64d4d6e31d934dca1,2023-11-07T02:08:31.853000 -CVE-2011-3408,0,1,0302707ebb6222d84c8191372cdd8228395e5a1dac5091989b6e69c076bed162,2024-11-21T01:30:27.437000 +CVE-2011-3408,0,0,0302707ebb6222d84c8191372cdd8228395e5a1dac5091989b6e69c076bed162,2024-11-21T01:30:27.437000 CVE-2011-3409,0,0,deb950b8953feda3ca3bd4c302f9ace65d9a91a981c9b4144c398401fd40f847,2023-11-07T02:08:32.087000 -CVE-2011-3410,0,1,a1439305e765ec98c5016389df753e8358014399685a986f1e7d284a4eaa8b69,2024-11-21T01:30:27.557000 -CVE-2011-3411,0,1,56bf647cd8517694e6aeab39cbcc316a5614e0a3c808867fb2709d36755da71f,2024-11-21T01:30:27.663000 -CVE-2011-3412,0,1,a2933f8c9e35b998d17c349f2e7f66d879ecebe180310f42665063090360b238,2024-11-21T01:30:27.783000 -CVE-2011-3413,0,1,54a23c5a7912af240c8d645fe311116fa48a18099e81de2873edc3726cd73a3f,2024-11-21T01:30:27.893000 -CVE-2011-3414,0,1,5574b61288f329282f6c66c91773f196dbe480d1e89abdc31b1564a0358c65c4,2024-11-21T01:30:28.003000 -CVE-2011-3415,0,1,a746958bd1c112ecc2c6c2bae55a65f71733668a2e194250173b1187288fd8ca,2024-11-21T01:30:28.123000 -CVE-2011-3416,0,1,452de323d3162b0ff725ffe1130d0d4adec7be55f46fb094ff0394e921490e09,2024-11-21T01:30:28.237000 -CVE-2011-3417,0,1,f396ba7ebf4d85c02c9f8f968d22e1466e0d7cb78a9cb9f46c61eba8cbebb5d2,2024-11-21T01:30:28.357000 +CVE-2011-3410,0,0,a1439305e765ec98c5016389df753e8358014399685a986f1e7d284a4eaa8b69,2024-11-21T01:30:27.557000 +CVE-2011-3411,0,0,56bf647cd8517694e6aeab39cbcc316a5614e0a3c808867fb2709d36755da71f,2024-11-21T01:30:27.663000 +CVE-2011-3412,0,0,a2933f8c9e35b998d17c349f2e7f66d879ecebe180310f42665063090360b238,2024-11-21T01:30:27.783000 +CVE-2011-3413,0,0,54a23c5a7912af240c8d645fe311116fa48a18099e81de2873edc3726cd73a3f,2024-11-21T01:30:27.893000 +CVE-2011-3414,0,0,5574b61288f329282f6c66c91773f196dbe480d1e89abdc31b1564a0358c65c4,2024-11-21T01:30:28.003000 +CVE-2011-3415,0,0,a746958bd1c112ecc2c6c2bae55a65f71733668a2e194250173b1187288fd8ca,2024-11-21T01:30:28.123000 +CVE-2011-3416,0,0,452de323d3162b0ff725ffe1130d0d4adec7be55f46fb094ff0394e921490e09,2024-11-21T01:30:28.237000 +CVE-2011-3417,0,0,f396ba7ebf4d85c02c9f8f968d22e1466e0d7cb78a9cb9f46c61eba8cbebb5d2,2024-11-21T01:30:28.357000 CVE-2011-3418,0,0,634aaa6bbd18b20753639ef55bff9cc3d52400e406486bffc01e821a5114dc23,2023-11-07T02:08:32.393000 CVE-2011-3419,0,0,d02edd76607f1657bb6871ed67be0d353da11e6ec269407844d6b61907e64f53,2023-11-07T02:08:32.653000 -CVE-2011-3420,0,1,a357c92b21206dd5ee3fdc3e315a43c8d6486ca90656dfdc7b90a3c0394c3641,2024-11-21T01:30:28.517000 -CVE-2011-3421,0,1,6bdde9e940e4e89499135c300405ea3e4252d63ad3f7e60ed541d67d6b78335d,2024-11-21T01:30:28.667000 -CVE-2011-3422,0,1,749447bb44a6daacd07e43d02d711a73d53950f0a2ba4d34d89106d089f6d0b2,2024-11-21T01:30:28.807000 -CVE-2011-3423,0,1,eb7a64328a99b4a674a7556e736d81f4eb533e9cbb43fce0abe774b4a1607773,2024-11-21T01:30:28.947000 -CVE-2011-3424,0,1,146c0b0d6db20b5028ce5d9f244e9df53ae47c01562b568782bb04a0b08b8c37,2024-11-21T01:30:29.093000 -CVE-2011-3426,0,1,9736da3740f81e96fe2e4df73658f95d802825e05738a2643b4319f02cd3068d,2024-11-21T01:30:29.237000 -CVE-2011-3427,0,1,9bb0e021f5815cee61ad5c4c1a4acdaaea333d3a39f6d80faa9c3ced9334f2d5,2024-11-21T01:30:29.357000 +CVE-2011-3420,0,0,a357c92b21206dd5ee3fdc3e315a43c8d6486ca90656dfdc7b90a3c0394c3641,2024-11-21T01:30:28.517000 +CVE-2011-3421,0,0,6bdde9e940e4e89499135c300405ea3e4252d63ad3f7e60ed541d67d6b78335d,2024-11-21T01:30:28.667000 +CVE-2011-3422,0,0,749447bb44a6daacd07e43d02d711a73d53950f0a2ba4d34d89106d089f6d0b2,2024-11-21T01:30:28.807000 +CVE-2011-3423,0,0,eb7a64328a99b4a674a7556e736d81f4eb533e9cbb43fce0abe774b4a1607773,2024-11-21T01:30:28.947000 +CVE-2011-3424,0,0,146c0b0d6db20b5028ce5d9f244e9df53ae47c01562b568782bb04a0b08b8c37,2024-11-21T01:30:29.093000 +CVE-2011-3426,0,0,9736da3740f81e96fe2e4df73658f95d802825e05738a2643b4319f02cd3068d,2024-11-21T01:30:29.237000 +CVE-2011-3427,0,0,9bb0e021f5815cee61ad5c4c1a4acdaaea333d3a39f6d80faa9c3ced9334f2d5,2024-11-21T01:30:29.357000 CVE-2011-3428,0,0,1db73fcde07fb482078db40f9e7cbb5ab1953698d234396c94425c0cc2fd71ff,2017-04-28T17:47:17.337000 -CVE-2011-3429,0,1,fc350464fe66b1de3cc3e4029fe5e7ec85727293540e8aeffd59398c2d9bc51f,2024-11-21T01:30:29.593000 -CVE-2011-3430,0,1,966d02c09d451cb1234852d1437d7b1af8d60542456c8d5d4de081fd75f972a4,2024-11-21T01:30:29.707000 -CVE-2011-3431,0,1,4392636be3882225df09965ca487526aeb5f61d5d9c92d2e01ef32aed42d5d3f,2024-11-21T01:30:29.833000 -CVE-2011-3432,0,1,afde46d63fb20be4bb7e64512da9384c58747869f01e53b84096eb60942d61c4,2024-11-21T01:30:29.953000 +CVE-2011-3429,0,0,fc350464fe66b1de3cc3e4029fe5e7ec85727293540e8aeffd59398c2d9bc51f,2024-11-21T01:30:29.593000 +CVE-2011-3430,0,0,966d02c09d451cb1234852d1437d7b1af8d60542456c8d5d4de081fd75f972a4,2024-11-21T01:30:29.707000 +CVE-2011-3431,0,0,4392636be3882225df09965ca487526aeb5f61d5d9c92d2e01ef32aed42d5d3f,2024-11-21T01:30:29.833000 +CVE-2011-3432,0,0,afde46d63fb20be4bb7e64512da9384c58747869f01e53b84096eb60942d61c4,2024-11-21T01:30:29.953000 CVE-2011-3433,0,0,8e919bc874a2d42c81106cd1846d36b79e9f749935644fad8cf9ba9611ce8f42,2023-11-07T02:08:32.983000 -CVE-2011-3434,0,1,f45b2efdefa9ac92a8d79891ef01a60a88b6b496686b89407e5c5381901bf7ad,2024-11-21T01:30:30.080000 -CVE-2011-3435,0,1,4f7200af2c1d46c94f71cd30d6c99de96d3003a972616faa29103a00386340ff,2024-11-21T01:30:30.200000 -CVE-2011-3436,0,1,8ca7d29824290ab859dd676388437af3307b53b8628c95d721abea2fead94041,2024-11-21T01:30:30.313000 -CVE-2011-3437,0,1,e922cd868c319c2530cfe4a1861c71ce825b85e94480539db14ab9dea0f47891,2024-11-21T01:30:30.437000 +CVE-2011-3434,0,0,f45b2efdefa9ac92a8d79891ef01a60a88b6b496686b89407e5c5381901bf7ad,2024-11-21T01:30:30.080000 +CVE-2011-3435,0,0,4f7200af2c1d46c94f71cd30d6c99de96d3003a972616faa29103a00386340ff,2024-11-21T01:30:30.200000 +CVE-2011-3436,0,0,8ca7d29824290ab859dd676388437af3307b53b8628c95d721abea2fead94041,2024-11-21T01:30:30.313000 +CVE-2011-3437,0,0,e922cd868c319c2530cfe4a1861c71ce825b85e94480539db14ab9dea0f47891,2024-11-21T01:30:30.437000 CVE-2011-3438,0,0,92a7ad9a73171a1de938dff46547b55a2736096b375006967d128900c221b2f8,2017-04-28T15:57:14.433000 -CVE-2011-3439,0,1,20d4c3419a1fee1447755d6d429f94fe0d658f73f15f114c267f5aaad120b3f7,2024-11-21T01:30:30.667000 -CVE-2011-3440,0,1,a4831529f4f444a66d55ca5d3a7a004bca9ee69c15a06f388144c7c2023cd0cd,2024-11-21T01:30:30.780000 -CVE-2011-3441,0,1,224199145a50d4b9ef642e3451bb04ff4cbf40f085517946a923b8fdfa9e4816,2024-11-21T01:30:30.893000 -CVE-2011-3442,0,1,74d0133a6baddf7d1087752c29c49ada9dc99c678e3ccf2c1a98c65adf04aeab,2024-11-21T01:30:31.020000 +CVE-2011-3439,0,0,20d4c3419a1fee1447755d6d429f94fe0d658f73f15f114c267f5aaad120b3f7,2024-11-21T01:30:30.667000 +CVE-2011-3440,0,0,a4831529f4f444a66d55ca5d3a7a004bca9ee69c15a06f388144c7c2023cd0cd,2024-11-21T01:30:30.780000 +CVE-2011-3441,0,0,224199145a50d4b9ef642e3451bb04ff4cbf40f085517946a923b8fdfa9e4816,2024-11-21T01:30:30.893000 +CVE-2011-3442,0,0,74d0133a6baddf7d1087752c29c49ada9dc99c678e3ccf2c1a98c65adf04aeab,2024-11-21T01:30:31.020000 CVE-2011-3443,0,0,3fa145aed92966009aba28f8c76a3576f9a3887290a2a8217dbd01a35cd3040c,2012-03-02T05:00:00 -CVE-2011-3444,0,1,8098823028219e2634b07638625f95cc73b3752822c281f231e4cff52b634f50,2024-11-21T01:30:31.250000 +CVE-2011-3444,0,0,8098823028219e2634b07638625f95cc73b3752822c281f231e4cff52b634f50,2024-11-21T01:30:31.250000 CVE-2011-3445,0,0,2e9a9c12fa548700b032b361b975a1c4e902051332b0fcbd58365f7e63a9d59d,2023-11-07T02:08:33.210000 -CVE-2011-3446,0,1,8bcb21a73d0b7d8fed9d941be6ba47609132021b34d942cad80edfeb45b053d8,2024-11-21T01:30:31.383000 -CVE-2011-3447,0,1,cd434f34850ea02b5dd9df269f3a4962f5ad2226408993dde02bd29c4baccf78,2024-11-21T01:30:31.483000 +CVE-2011-3446,0,0,8bcb21a73d0b7d8fed9d941be6ba47609132021b34d942cad80edfeb45b053d8,2024-11-21T01:30:31.383000 +CVE-2011-3447,0,0,cd434f34850ea02b5dd9df269f3a4962f5ad2226408993dde02bd29c4baccf78,2024-11-21T01:30:31.483000 CVE-2011-3448,0,0,bf3a2191d096f75b7bd20344e6d6f9a0aa13dec507286bf1ad2e8ba0d415febd,2012-02-03T05:00:00 CVE-2011-3449,0,0,a6c853cf26be0ab1f9d6b8ec2fe95ba4aab9769d4dd9409da2c4ad745595de12,2012-02-03T05:00:00 CVE-2011-3450,0,0,66f0ead319fd543296b3832257172e11b92a5c35782d3c30b0e99ea296e92048,2012-02-03T05:00:00 @@ -50128,127 +50128,127 @@ CVE-2011-3474,0,0,a88106746e27c8a1dd142076d5a0a936527b616f82bd8ffc32759467282403 CVE-2011-3475,0,0,1444bdcd1b79c5f0f0ea1acce5b1eb1716f55527b3d7cf4cc1bc43c0b33c94a6,2023-11-07T02:08:34.010000 CVE-2011-3476,0,0,fd319a8bb8cef64f74ed9479931d324bac746f9369c60eef02f9c2e9742e09b3,2023-11-07T02:08:34.040000 CVE-2011-3477,0,0,c3bbbce6a077ff881ad8582a15d5fb823ad2958d133dafa8693423af8d563625,2018-03-21T14:35:53.287000 -CVE-2011-3478,0,1,a5dbe0062b268b4985139041a3db0c9ba26a7b51aa917a87558e7c5e10d23db7,2024-11-21T01:30:33.430000 -CVE-2011-3479,0,1,ba3cd845010b6adad59c0889334dcef5f50c02e0687defa15279b77bd0532dfc,2024-11-21T01:30:33.593000 +CVE-2011-3478,0,0,a5dbe0062b268b4985139041a3db0c9ba26a7b51aa917a87558e7c5e10d23db7,2024-11-21T01:30:33.430000 +CVE-2011-3479,0,0,ba3cd845010b6adad59c0889334dcef5f50c02e0687defa15279b77bd0532dfc,2024-11-21T01:30:33.593000 CVE-2011-3480,0,0,55de2ed252baaf96aa7bca7893ddd86fc9b17bcbb13aeb04ada91b5e59181997,2023-11-07T02:08:34.290000 -CVE-2011-3481,0,1,c7285d9d5f5ef8f3da57b845032a6631f7f517b76c9ff17d13d98a76b0b1fdfb,2024-11-21T01:30:33.767000 -CVE-2011-3482,0,1,e44111606816014c5a7d4471d71ab09adf488c17e6b2e69691a0e77df63e00d5,2024-11-21T01:30:33.927000 -CVE-2011-3483,0,1,203c258508bcfc618c6877cdf1011304126ecca00fc0e116c83625e91d97d96f,2024-11-21T01:30:34.077000 -CVE-2011-3484,0,1,5e2ab92a9d30354af09a2ceb563aeb14c082939394be7f1bd06db9f00a736f72,2024-11-21T01:30:34.237000 -CVE-2011-3486,0,1,9733d140e0adde11ebcade87448803f91cd69b847607e027a177bcaac6cc9b11,2024-11-21T01:30:34.403000 -CVE-2011-3487,0,1,257fdb0ab0eaceeef60e084afbc7a06a72530df3b831cf3700026bff1887dcc6,2024-11-21T01:30:34.570000 -CVE-2011-3488,0,1,439a974f4ff74fa533d1921c739001b23948738363d46dca80ac1f2109cba503,2024-11-21T01:30:34.733000 -CVE-2011-3489,0,1,abf8fffb978413c9561ab450e4d66365b2fae13d068027bee6201a4259ed2654,2024-11-21T01:30:34.880000 -CVE-2011-3490,0,1,bf0f1684a9cf6f410098a8f61e4f2ddde625187cadfb48a9231f4ede1930ff16,2024-11-21T01:30:35.030000 -CVE-2011-3491,0,1,f5f8f23c9cf282922be3572a69c1e50dce46f64783275402eb7d3cc68e7e272f,2024-11-21T01:30:35.193000 -CVE-2011-3492,0,1,d142c5d9c6612892d30e39dd42869d5cbcc994a15cb80814410314a6d171e759,2024-11-21T01:30:35.357000 -CVE-2011-3493,0,1,ea19b0ea2e775a432cb3db14bd8f083081e1d4c14a20f3384e03863b98c8393e,2024-11-21T01:30:35.533000 -CVE-2011-3494,0,1,134f15fb9a4e0d2c1dfd1e702d0723b61b19a63cfa39fc1e11ce9930f8d6ca7f,2024-11-21T01:30:35.680000 -CVE-2011-3495,0,1,26e4210655d1a5ccf08c52ae08f7cb9a30a30fdd6bdd24b8d96012c9aa51e07e,2024-11-21T01:30:35.830000 -CVE-2011-3496,0,1,71389c3c673983e73cfa2d70d1efc1a20ce79de445d37aa58126211f5d20c309,2024-11-21T01:30:35.990000 -CVE-2011-3497,0,1,1264c32d262e76c9144050705ad181c43b93a2a41d8c7206d096e745d94e2b9d,2024-11-21T01:30:36.153000 -CVE-2011-3498,0,1,f17349129483bd3711fb5c304baffe5afb8d2dc30ebc76ff233c66a9128a6d4a,2024-11-21T01:30:36.293000 -CVE-2011-3499,0,1,e77d35fab7be73d997ebd0dacbd85e467d8b6fe388660127a33c08a4d89bba79,2024-11-21T01:30:36.450000 -CVE-2011-3500,0,1,31d98dce5401af4c2a73d53290d2a6b7b85f6b095d1519b730a8291067527ecc,2024-11-21T01:30:36.593000 -CVE-2011-3501,0,1,22f8ec2e06b783b4cb4811401ff496dcf96034d434184232c8d15ed76558f57c,2024-11-21T01:30:36.737000 -CVE-2011-3502,0,1,e31575bd3ad6e777329d29b2864df8244604947d2f41b24f7983332e5f51abfa,2024-11-21T01:30:36.870000 -CVE-2011-3503,0,1,ab64e7a636fa27f14bba5d74efce87733f8fc9d4205ff879e9f6d22c50405082,2024-11-21T01:30:37.007000 -CVE-2011-3504,0,1,ec28973612cb83af1fd2c1ecbf08d5eee161ee4dd82dd71551f395c7656b8135,2024-11-21T01:30:37.153000 +CVE-2011-3481,0,0,c7285d9d5f5ef8f3da57b845032a6631f7f517b76c9ff17d13d98a76b0b1fdfb,2024-11-21T01:30:33.767000 +CVE-2011-3482,0,0,e44111606816014c5a7d4471d71ab09adf488c17e6b2e69691a0e77df63e00d5,2024-11-21T01:30:33.927000 +CVE-2011-3483,0,0,203c258508bcfc618c6877cdf1011304126ecca00fc0e116c83625e91d97d96f,2024-11-21T01:30:34.077000 +CVE-2011-3484,0,0,5e2ab92a9d30354af09a2ceb563aeb14c082939394be7f1bd06db9f00a736f72,2024-11-21T01:30:34.237000 +CVE-2011-3486,0,0,9733d140e0adde11ebcade87448803f91cd69b847607e027a177bcaac6cc9b11,2024-11-21T01:30:34.403000 +CVE-2011-3487,0,0,257fdb0ab0eaceeef60e084afbc7a06a72530df3b831cf3700026bff1887dcc6,2024-11-21T01:30:34.570000 +CVE-2011-3488,0,0,439a974f4ff74fa533d1921c739001b23948738363d46dca80ac1f2109cba503,2024-11-21T01:30:34.733000 +CVE-2011-3489,0,0,abf8fffb978413c9561ab450e4d66365b2fae13d068027bee6201a4259ed2654,2024-11-21T01:30:34.880000 +CVE-2011-3490,0,0,bf0f1684a9cf6f410098a8f61e4f2ddde625187cadfb48a9231f4ede1930ff16,2024-11-21T01:30:35.030000 +CVE-2011-3491,0,0,f5f8f23c9cf282922be3572a69c1e50dce46f64783275402eb7d3cc68e7e272f,2024-11-21T01:30:35.193000 +CVE-2011-3492,0,0,d142c5d9c6612892d30e39dd42869d5cbcc994a15cb80814410314a6d171e759,2024-11-21T01:30:35.357000 +CVE-2011-3493,0,0,ea19b0ea2e775a432cb3db14bd8f083081e1d4c14a20f3384e03863b98c8393e,2024-11-21T01:30:35.533000 +CVE-2011-3494,0,0,134f15fb9a4e0d2c1dfd1e702d0723b61b19a63cfa39fc1e11ce9930f8d6ca7f,2024-11-21T01:30:35.680000 +CVE-2011-3495,0,0,26e4210655d1a5ccf08c52ae08f7cb9a30a30fdd6bdd24b8d96012c9aa51e07e,2024-11-21T01:30:35.830000 +CVE-2011-3496,0,0,71389c3c673983e73cfa2d70d1efc1a20ce79de445d37aa58126211f5d20c309,2024-11-21T01:30:35.990000 +CVE-2011-3497,0,0,1264c32d262e76c9144050705ad181c43b93a2a41d8c7206d096e745d94e2b9d,2024-11-21T01:30:36.153000 +CVE-2011-3498,0,0,f17349129483bd3711fb5c304baffe5afb8d2dc30ebc76ff233c66a9128a6d4a,2024-11-21T01:30:36.293000 +CVE-2011-3499,0,0,e77d35fab7be73d997ebd0dacbd85e467d8b6fe388660127a33c08a4d89bba79,2024-11-21T01:30:36.450000 +CVE-2011-3500,0,0,31d98dce5401af4c2a73d53290d2a6b7b85f6b095d1519b730a8291067527ecc,2024-11-21T01:30:36.593000 +CVE-2011-3501,0,0,22f8ec2e06b783b4cb4811401ff496dcf96034d434184232c8d15ed76558f57c,2024-11-21T01:30:36.737000 +CVE-2011-3502,0,0,e31575bd3ad6e777329d29b2864df8244604947d2f41b24f7983332e5f51abfa,2024-11-21T01:30:36.870000 +CVE-2011-3503,0,0,ab64e7a636fa27f14bba5d74efce87733f8fc9d4205ff879e9f6d22c50405082,2024-11-21T01:30:37.007000 +CVE-2011-3504,0,0,ec28973612cb83af1fd2c1ecbf08d5eee161ee4dd82dd71551f395c7656b8135,2024-11-21T01:30:37.153000 CVE-2011-3505,0,0,fe245ad7a25aab97f5e204cdde51da7f11805296a0b1711cdc4d0d892b1145bb,2023-11-07T02:08:34.687000 -CVE-2011-3506,0,1,9fb3cf0c9eab13f0423f3fe75591c798d174125b05c6b94b1117a90d9c1b5e2f,2024-11-21T01:30:37.333000 -CVE-2011-3507,0,1,0a2010756fa38fa236c8efe0422ffe70709ab1f706d35496b82f0b0f10fd2723,2024-11-21T01:30:37.447000 -CVE-2011-3508,0,1,67619b1424e678961c8112d8258cc7e40c2abef1bbab10b17647f29fd83d953d,2024-11-21T01:30:37.557000 -CVE-2011-3509,0,1,8978d556b1a406a65ddb7630e3043808aa3ced1ecd8f67c333523b43d92003b5,2024-11-21T01:30:37.667000 -CVE-2011-3510,0,1,a0ef01440fd6a4a73908c3fd6440a0b43a4520c02344f69de2dd22aa339369af,2024-11-21T01:30:37.777000 -CVE-2011-3511,0,1,b9867950f01d0d8336aae6b78d9ceba4a16b55a73e8243d1049119105b1bfbf3,2024-11-21T01:30:37.887000 -CVE-2011-3512,0,1,15233984a85586a319c1b4c5805695696843779a18b9534dfc472f07c332f0a8,2024-11-21T01:30:37.997000 -CVE-2011-3513,0,1,76d405768a622474084329dbeaac3c45bc05cf729b18f3ba07f981275164503b,2024-11-21T01:30:38.107000 -CVE-2011-3514,0,1,f0ef0c2167729e41061fa378133547ad814ed0cbe489ee64c8dea8ba6edf84f7,2024-11-21T01:30:38.233000 -CVE-2011-3515,0,1,fe297c820e2b0a28d98c7bf84c4efe76c73a0cf976e7c89b0e599929a7cd1046,2024-11-21T01:30:38.330000 -CVE-2011-3516,0,1,43bd82ec4f6cc317131f8f9025fe2cdb6279a7752b9a3e54fc39f75dcac8087c,2024-11-21T01:30:38.440000 -CVE-2011-3517,0,1,724155b9d397866cce5597bb79521855f217214d2df384bdd5aeee698d48126d,2024-11-21T01:30:38.570000 -CVE-2011-3518,0,1,80249edf16026c08f538b8a20dcf30aae2548aac0fd4a7a176c18e06d007a4b2,2024-11-21T01:30:38.713000 -CVE-2011-3519,0,1,f43653ef84408251b9b16f33269ca0555ed29f165c030c09028d7ff9c8b23bf3,2024-11-21T01:30:38.840000 -CVE-2011-3520,0,1,059de01bcfb11c6fda93dc47d8a5c1d57407a97331f5b00a564c6af8ad93c589,2024-11-21T01:30:38.947000 -CVE-2011-3521,0,1,0b8a552c451dc7ae11ddae7b648685aaab7e770935a675d695a836e6654bb9d0,2024-11-21T01:30:39.060000 -CVE-2011-3522,0,1,da4033e2a287725647ea78754184a1ca9d7ffb68ea69282caec6c980c03dec0b,2024-11-21T01:30:39.210000 -CVE-2011-3523,0,1,84e3bccbc4b2dcc5a5aa3fd0dcfb0d4c6c6b8abbc9da578bb997beb361c4dcb6,2024-11-21T01:30:39.350000 -CVE-2011-3524,0,1,28627d0338b19a9e85e8a4f532de3156c3e23100fb7664172e49d11da2b47383,2024-11-21T01:30:39.467000 -CVE-2011-3525,0,1,fb58ed4f0f1f678db26c036ba71dae4055ce701bb7ee7f51a425a5090f3cd19f,2024-11-21T01:30:39.583000 -CVE-2011-3526,0,1,c7d2453822ae26d833918fe594ff7fbbf185c32ae17c55718565df64ce95351d,2024-11-21T01:30:39.697000 -CVE-2011-3527,0,1,6c604c3df98af083e4d32a7aeae1458a4b52fa7d28f2cfa703058df88fdcd50a,2024-11-21T01:30:39.807000 -CVE-2011-3528,0,1,9eb4d91ead92c7c3d7465e858249f4bb8c1127bfd9ec1469b68d1f45d4f9196c,2024-11-21T01:30:39.920000 -CVE-2011-3529,0,1,a1b8d69b62ff098d0afe670344444c6400fe201fabd7ae94a7cef5d830413eb7,2024-11-21T01:30:40.030000 -CVE-2011-3530,0,1,ce376d50af0dec7d830d5e6a6229b8e75cfb3cb3a6f008d40368ba693bd4d532,2024-11-21T01:30:40.143000 -CVE-2011-3531,0,1,db5c4d2ed58b84959f817b8de9b20179404ae0014adf456f3add688b393b4c08,2024-11-21T01:30:40.253000 -CVE-2011-3532,0,1,8b83346ffb824b419fc960ba5b897a9c6497aa5bf3969859694d9b5e98e46aba,2024-11-21T01:30:40.353000 -CVE-2011-3533,0,1,b70f1650f08bcb8cf86d0128f0086ec5b72bee3904c076693503739ae79b9973,2024-11-21T01:30:40.470000 -CVE-2011-3534,0,1,a42cd15773dea65aca7ab862beade5ea4c835fb6fb90d2f3e49437a03f61d6bd,2024-11-21T01:30:40.580000 -CVE-2011-3535,0,1,bfab184bb19411047762dbe26e4b7329f33ec55420647cffb22cfd0896ba18ee,2024-11-21T01:30:40.690000 -CVE-2011-3536,0,1,2c7528bd598add8ba3400b579410db8d30e14ec1cb9b38cef7b969d47a1fef02,2024-11-21T01:30:40.807000 -CVE-2011-3537,0,1,be69bde0c40f29988f1e703721fe798a7371e0a0b8d21adb1c4413570788fb09,2024-11-21T01:30:40.923000 -CVE-2011-3538,0,1,35dd367d7022d6eec99783423f5729c2fca8ddc37c8222c5bb68e421a024d27c,2024-11-21T01:30:41.033000 -CVE-2011-3539,0,1,385bdf611238cbda643b5b88c53c0579fec054edbb663cb2f07930fe189c9d95,2024-11-21T01:30:41.147000 +CVE-2011-3506,0,0,9fb3cf0c9eab13f0423f3fe75591c798d174125b05c6b94b1117a90d9c1b5e2f,2024-11-21T01:30:37.333000 +CVE-2011-3507,0,0,0a2010756fa38fa236c8efe0422ffe70709ab1f706d35496b82f0b0f10fd2723,2024-11-21T01:30:37.447000 +CVE-2011-3508,0,0,67619b1424e678961c8112d8258cc7e40c2abef1bbab10b17647f29fd83d953d,2024-11-21T01:30:37.557000 +CVE-2011-3509,0,0,8978d556b1a406a65ddb7630e3043808aa3ced1ecd8f67c333523b43d92003b5,2024-11-21T01:30:37.667000 +CVE-2011-3510,0,0,a0ef01440fd6a4a73908c3fd6440a0b43a4520c02344f69de2dd22aa339369af,2024-11-21T01:30:37.777000 +CVE-2011-3511,0,0,b9867950f01d0d8336aae6b78d9ceba4a16b55a73e8243d1049119105b1bfbf3,2024-11-21T01:30:37.887000 +CVE-2011-3512,0,0,15233984a85586a319c1b4c5805695696843779a18b9534dfc472f07c332f0a8,2024-11-21T01:30:37.997000 +CVE-2011-3513,0,0,76d405768a622474084329dbeaac3c45bc05cf729b18f3ba07f981275164503b,2024-11-21T01:30:38.107000 +CVE-2011-3514,0,0,f0ef0c2167729e41061fa378133547ad814ed0cbe489ee64c8dea8ba6edf84f7,2024-11-21T01:30:38.233000 +CVE-2011-3515,0,0,fe297c820e2b0a28d98c7bf84c4efe76c73a0cf976e7c89b0e599929a7cd1046,2024-11-21T01:30:38.330000 +CVE-2011-3516,0,0,43bd82ec4f6cc317131f8f9025fe2cdb6279a7752b9a3e54fc39f75dcac8087c,2024-11-21T01:30:38.440000 +CVE-2011-3517,0,0,724155b9d397866cce5597bb79521855f217214d2df384bdd5aeee698d48126d,2024-11-21T01:30:38.570000 +CVE-2011-3518,0,0,80249edf16026c08f538b8a20dcf30aae2548aac0fd4a7a176c18e06d007a4b2,2024-11-21T01:30:38.713000 +CVE-2011-3519,0,0,f43653ef84408251b9b16f33269ca0555ed29f165c030c09028d7ff9c8b23bf3,2024-11-21T01:30:38.840000 +CVE-2011-3520,0,0,059de01bcfb11c6fda93dc47d8a5c1d57407a97331f5b00a564c6af8ad93c589,2024-11-21T01:30:38.947000 +CVE-2011-3521,0,0,0b8a552c451dc7ae11ddae7b648685aaab7e770935a675d695a836e6654bb9d0,2024-11-21T01:30:39.060000 +CVE-2011-3522,0,0,da4033e2a287725647ea78754184a1ca9d7ffb68ea69282caec6c980c03dec0b,2024-11-21T01:30:39.210000 +CVE-2011-3523,0,0,84e3bccbc4b2dcc5a5aa3fd0dcfb0d4c6c6b8abbc9da578bb997beb361c4dcb6,2024-11-21T01:30:39.350000 +CVE-2011-3524,0,0,28627d0338b19a9e85e8a4f532de3156c3e23100fb7664172e49d11da2b47383,2024-11-21T01:30:39.467000 +CVE-2011-3525,0,0,fb58ed4f0f1f678db26c036ba71dae4055ce701bb7ee7f51a425a5090f3cd19f,2024-11-21T01:30:39.583000 +CVE-2011-3526,0,0,c7d2453822ae26d833918fe594ff7fbbf185c32ae17c55718565df64ce95351d,2024-11-21T01:30:39.697000 +CVE-2011-3527,0,0,6c604c3df98af083e4d32a7aeae1458a4b52fa7d28f2cfa703058df88fdcd50a,2024-11-21T01:30:39.807000 +CVE-2011-3528,0,0,9eb4d91ead92c7c3d7465e858249f4bb8c1127bfd9ec1469b68d1f45d4f9196c,2024-11-21T01:30:39.920000 +CVE-2011-3529,0,0,a1b8d69b62ff098d0afe670344444c6400fe201fabd7ae94a7cef5d830413eb7,2024-11-21T01:30:40.030000 +CVE-2011-3530,0,0,ce376d50af0dec7d830d5e6a6229b8e75cfb3cb3a6f008d40368ba693bd4d532,2024-11-21T01:30:40.143000 +CVE-2011-3531,0,0,db5c4d2ed58b84959f817b8de9b20179404ae0014adf456f3add688b393b4c08,2024-11-21T01:30:40.253000 +CVE-2011-3532,0,0,8b83346ffb824b419fc960ba5b897a9c6497aa5bf3969859694d9b5e98e46aba,2024-11-21T01:30:40.353000 +CVE-2011-3533,0,0,b70f1650f08bcb8cf86d0128f0086ec5b72bee3904c076693503739ae79b9973,2024-11-21T01:30:40.470000 +CVE-2011-3534,0,0,a42cd15773dea65aca7ab862beade5ea4c835fb6fb90d2f3e49437a03f61d6bd,2024-11-21T01:30:40.580000 +CVE-2011-3535,0,0,bfab184bb19411047762dbe26e4b7329f33ec55420647cffb22cfd0896ba18ee,2024-11-21T01:30:40.690000 +CVE-2011-3536,0,0,2c7528bd598add8ba3400b579410db8d30e14ec1cb9b38cef7b969d47a1fef02,2024-11-21T01:30:40.807000 +CVE-2011-3537,0,0,be69bde0c40f29988f1e703721fe798a7371e0a0b8d21adb1c4413570788fb09,2024-11-21T01:30:40.923000 +CVE-2011-3538,0,0,35dd367d7022d6eec99783423f5729c2fca8ddc37c8222c5bb68e421a024d27c,2024-11-21T01:30:41.033000 +CVE-2011-3539,0,0,385bdf611238cbda643b5b88c53c0579fec054edbb663cb2f07930fe189c9d95,2024-11-21T01:30:41.147000 CVE-2011-3540,0,0,bb9c999493a201ca54af40e7ae80b737789888feed733ac46757539b2878d339,2023-11-07T02:08:35.163000 -CVE-2011-3541,0,1,934a9a61d37d073ef046583b45b01193b0e9d62f2e098f5dcf23a21c674fc1b5,2024-11-21T01:30:41.290000 -CVE-2011-3542,0,1,098928a98e939e9446880349899c98aa21e5ef48d58b902c37b44986d5beaac1,2024-11-21T01:30:41.407000 -CVE-2011-3543,0,1,51e6ef23a8da4ed65094a056e1b4471cc6884e54149dd436e66aa4683032175b,2024-11-21T01:30:41.517000 -CVE-2011-3544,0,1,efa6f93867b5191b2d736eb68beb1613778dee382545b51d6b72bc42ee74dfb1,2024-11-21T01:30:41.623000 -CVE-2011-3545,0,1,50ec363bcc7dcefbeccac750f29595e2e82bd631dd2ec4cd07b6ce87e428afd7,2024-11-21T01:30:41.803000 -CVE-2011-3546,0,1,1a015a9806f89109e161daf57c059bfc195642f335da8bf01679c605358dd070,2024-11-21T01:30:41.973000 -CVE-2011-3547,0,1,a6c72abf932e666a8bee62bb133134aca33c8bd9af549f891e17cff5575ef690,2024-11-21T01:30:42.120000 -CVE-2011-3548,0,1,16859a2b1bddfd8751b46c6f70f084c5369f7e27f287868bb32ab11dd9458c14,2024-11-21T01:30:42.293000 -CVE-2011-3549,0,1,5eeac37f68ef979c92227a3a1aab6eff0f007e57dc23bd0dc05b23ad549c8bd2,2024-11-21T01:30:42.457000 -CVE-2011-3550,0,1,0e11a8aa868c24f7d07b50e0ef268e8b83f6e0a0d402208849e708eb9259fa0c,2024-11-21T01:30:42.620000 -CVE-2011-3551,0,1,797ac8f6b3a8456021e4b1ac7cb03bf7309eeea8b18e277f4963bd03bbce8cc7,2024-11-21T01:30:42.767000 -CVE-2011-3552,0,1,b9d9169c5caf38e3fcafd14df7451d86c7a583df66705307234c6e1a751e718b,2024-11-21T01:30:42.913000 -CVE-2011-3553,0,1,6bb0ac18930b67938531d10978f8220782b6bedd1fb5aa7fb4ab8dfa2340a1aa,2024-11-21T01:30:43.090000 -CVE-2011-3554,0,1,164baab5ddd92f7c860d051a1b9464932d12e7743d6fb8a6a9dd108fa181cf68,2024-11-21T01:30:43.240000 -CVE-2011-3555,0,1,f1014f95a0c3f98dd5635a9ffbd69512115fe6c6598f01c4baa2846915fccabd,2024-11-21T01:30:43.397000 -CVE-2011-3556,0,1,e0c2c36176990e7d3a81148ced8e2f79c704d865786250d11efcf62cade97e8d,2024-11-21T01:30:43.523000 -CVE-2011-3557,0,1,1053e16abe102d63f5c73c31c55d1f85eacf431cd89333d4fcdb117ffa93f9b1,2024-11-21T01:30:43.690000 -CVE-2011-3558,0,1,2b50a36097f1eb864fcdee33e3de07c6bc61c3fe9a2879e47ecc3127a387ddd7,2024-11-21T01:30:43.920000 -CVE-2011-3559,0,1,31d015723ca4a49d7f5d8ee132dd0c5826d6cd50fa4c2f18b2946ad32e21f93e,2024-11-21T01:30:44.070000 -CVE-2011-3560,0,1,a5ae090241d24003648ce89b7aa496ba80aef8563eb0794df5bf17de4c11f224,2024-11-21T01:30:44.200000 -CVE-2011-3561,0,1,5ddb72183d2865f7c3bf08967a012292b6a79e12530fa7e6fbcc21f66acadb4a,2024-11-21T01:30:44.377000 +CVE-2011-3541,0,0,934a9a61d37d073ef046583b45b01193b0e9d62f2e098f5dcf23a21c674fc1b5,2024-11-21T01:30:41.290000 +CVE-2011-3542,0,0,098928a98e939e9446880349899c98aa21e5ef48d58b902c37b44986d5beaac1,2024-11-21T01:30:41.407000 +CVE-2011-3543,0,0,51e6ef23a8da4ed65094a056e1b4471cc6884e54149dd436e66aa4683032175b,2024-11-21T01:30:41.517000 +CVE-2011-3544,0,0,efa6f93867b5191b2d736eb68beb1613778dee382545b51d6b72bc42ee74dfb1,2024-11-21T01:30:41.623000 +CVE-2011-3545,0,0,50ec363bcc7dcefbeccac750f29595e2e82bd631dd2ec4cd07b6ce87e428afd7,2024-11-21T01:30:41.803000 +CVE-2011-3546,0,0,1a015a9806f89109e161daf57c059bfc195642f335da8bf01679c605358dd070,2024-11-21T01:30:41.973000 +CVE-2011-3547,0,0,a6c72abf932e666a8bee62bb133134aca33c8bd9af549f891e17cff5575ef690,2024-11-21T01:30:42.120000 +CVE-2011-3548,0,0,16859a2b1bddfd8751b46c6f70f084c5369f7e27f287868bb32ab11dd9458c14,2024-11-21T01:30:42.293000 +CVE-2011-3549,0,0,5eeac37f68ef979c92227a3a1aab6eff0f007e57dc23bd0dc05b23ad549c8bd2,2024-11-21T01:30:42.457000 +CVE-2011-3550,0,0,0e11a8aa868c24f7d07b50e0ef268e8b83f6e0a0d402208849e708eb9259fa0c,2024-11-21T01:30:42.620000 +CVE-2011-3551,0,0,797ac8f6b3a8456021e4b1ac7cb03bf7309eeea8b18e277f4963bd03bbce8cc7,2024-11-21T01:30:42.767000 +CVE-2011-3552,0,0,b9d9169c5caf38e3fcafd14df7451d86c7a583df66705307234c6e1a751e718b,2024-11-21T01:30:42.913000 +CVE-2011-3553,0,0,6bb0ac18930b67938531d10978f8220782b6bedd1fb5aa7fb4ab8dfa2340a1aa,2024-11-21T01:30:43.090000 +CVE-2011-3554,0,0,164baab5ddd92f7c860d051a1b9464932d12e7743d6fb8a6a9dd108fa181cf68,2024-11-21T01:30:43.240000 +CVE-2011-3555,0,0,f1014f95a0c3f98dd5635a9ffbd69512115fe6c6598f01c4baa2846915fccabd,2024-11-21T01:30:43.397000 +CVE-2011-3556,0,0,e0c2c36176990e7d3a81148ced8e2f79c704d865786250d11efcf62cade97e8d,2024-11-21T01:30:43.523000 +CVE-2011-3557,0,0,1053e16abe102d63f5c73c31c55d1f85eacf431cd89333d4fcdb117ffa93f9b1,2024-11-21T01:30:43.690000 +CVE-2011-3558,0,0,2b50a36097f1eb864fcdee33e3de07c6bc61c3fe9a2879e47ecc3127a387ddd7,2024-11-21T01:30:43.920000 +CVE-2011-3559,0,0,31d015723ca4a49d7f5d8ee132dd0c5826d6cd50fa4c2f18b2946ad32e21f93e,2024-11-21T01:30:44.070000 +CVE-2011-3560,0,0,a5ae090241d24003648ce89b7aa496ba80aef8563eb0794df5bf17de4c11f224,2024-11-21T01:30:44.200000 +CVE-2011-3561,0,0,5ddb72183d2865f7c3bf08967a012292b6a79e12530fa7e6fbcc21f66acadb4a,2024-11-21T01:30:44.377000 CVE-2011-3562,0,0,36b8fb30502436eed9d2579d5d645d21b921fb3c902ad032cb313d8b4e71c675,2017-08-29T01:30:16.740000 CVE-2011-3563,0,0,2921eb53c950e450336703620e301792d0c737700e8d7d57d197d5d78a8e96f3,2022-05-13T14:52:55.963000 -CVE-2011-3564,0,1,bf00ef4a17ca412ee15a97027157be8f543cc3f2619b6c6346a70ed19b2680e9,2024-11-21T01:30:44.827000 -CVE-2011-3565,0,1,38e1e6cebe39625f24a4713bd05f66daa38bba018acec94a96bb5e37f58c4f3a,2024-11-21T01:30:44.943000 -CVE-2011-3566,0,1,097b65dca41792be3d50053425f6803b0e8c20d6ffe89986ea83316c22f8890d,2024-11-21T01:30:45.057000 +CVE-2011-3564,0,0,bf00ef4a17ca412ee15a97027157be8f543cc3f2619b6c6346a70ed19b2680e9,2024-11-21T01:30:44.827000 +CVE-2011-3565,0,0,38e1e6cebe39625f24a4713bd05f66daa38bba018acec94a96bb5e37f58c4f3a,2024-11-21T01:30:44.943000 +CVE-2011-3566,0,0,097b65dca41792be3d50053425f6803b0e8c20d6ffe89986ea83316c22f8890d,2024-11-21T01:30:45.057000 CVE-2011-3567,0,0,686ee105b789ede52ad6ae7cdfba23fda490e34fe0c81b214d3c9ca8fcd983bd,2023-11-07T02:08:35.750000 -CVE-2011-3568,0,1,0c0646b2fc006920315aedac73b0195ac83d946db1a71cd12444961cecaf9b99,2024-11-21T01:30:45.917000 -CVE-2011-3569,0,1,dbb55688a0c62ece84642385634ccac6194ef6e3badfe67e2a4d9891960c0e06,2024-11-21T01:30:46.053000 -CVE-2011-3570,0,1,3667dc4d5965a2d914e01d42789a1800931a3b9159f2b94227fa57460548e953,2024-11-21T01:30:46.250000 -CVE-2011-3571,0,1,52233a64e331fa0f65225be1b1355a955f7aaafbe1ab83f2e1b6a11f8b683776,2024-11-21T01:30:46.363000 +CVE-2011-3568,0,0,0c0646b2fc006920315aedac73b0195ac83d946db1a71cd12444961cecaf9b99,2024-11-21T01:30:45.917000 +CVE-2011-3569,0,0,dbb55688a0c62ece84642385634ccac6194ef6e3badfe67e2a4d9891960c0e06,2024-11-21T01:30:46.053000 +CVE-2011-3570,0,0,3667dc4d5965a2d914e01d42789a1800931a3b9159f2b94227fa57460548e953,2024-11-21T01:30:46.250000 +CVE-2011-3571,0,0,52233a64e331fa0f65225be1b1355a955f7aaafbe1ab83f2e1b6a11f8b683776,2024-11-21T01:30:46.363000 CVE-2011-3572,0,0,ed1b049f1c6806354288a30227e3661aa709b001673903f061af6a680333b74c,2023-11-07T02:08:36 -CVE-2011-3573,0,1,2dc9ea2487cf8f889c8366c2ed19397ff83c4de574284538a921933e865de87c,2024-11-21T01:30:46.493000 -CVE-2011-3574,0,1,c3cf0b1dcab1689fcb040b0216b9654f29f22d77d43bbda943f05a5783d562c4,2024-11-21T01:30:46.597000 -CVE-2011-3575,0,1,039510dd4ec4688cfc72d69d6c6ce868e1fc18e922682b9320daad3f7359a69c,2024-11-21T01:30:46.703000 -CVE-2011-3576,0,1,383c9d51ecad1b749485de775b99fd0fa81e90321853ebff31e596c53b440c24,2024-11-21T01:30:46.843000 -CVE-2011-3577,0,1,2711c05d5dc4577814563e0c2dfbf2fef73fd711112cd3daa8e7d571e689aed0,2024-11-21T01:30:46.973000 -CVE-2011-3578,0,1,126a9fb3dbfbc3e3287896d7fc46bfc215856cdc0b20a9df673a9e50a632a238,2024-11-21T01:30:47.113000 -CVE-2011-3579,0,1,80e9dbd3e35d737152c83fc8d97464be782e8bc168dd2f9fe28a091dff9c3258,2024-11-21T01:30:47.280000 -CVE-2011-3580,0,1,0cf9966ae8e3f1421c619d3d1696a2e614a7d4fb0efcc49839baae1176af3da3,2024-11-21T01:30:47.433000 -CVE-2011-3581,0,1,252af93f2dfb2e35ca670cd9284cf904d4619689fa6b356eb01f036a45b13a5e,2024-11-21T01:30:47.583000 +CVE-2011-3573,0,0,2dc9ea2487cf8f889c8366c2ed19397ff83c4de574284538a921933e865de87c,2024-11-21T01:30:46.493000 +CVE-2011-3574,0,0,c3cf0b1dcab1689fcb040b0216b9654f29f22d77d43bbda943f05a5783d562c4,2024-11-21T01:30:46.597000 +CVE-2011-3575,0,0,039510dd4ec4688cfc72d69d6c6ce868e1fc18e922682b9320daad3f7359a69c,2024-11-21T01:30:46.703000 +CVE-2011-3576,0,0,383c9d51ecad1b749485de775b99fd0fa81e90321853ebff31e596c53b440c24,2024-11-21T01:30:46.843000 +CVE-2011-3577,0,0,2711c05d5dc4577814563e0c2dfbf2fef73fd711112cd3daa8e7d571e689aed0,2024-11-21T01:30:46.973000 +CVE-2011-3578,0,0,126a9fb3dbfbc3e3287896d7fc46bfc215856cdc0b20a9df673a9e50a632a238,2024-11-21T01:30:47.113000 +CVE-2011-3579,0,0,80e9dbd3e35d737152c83fc8d97464be782e8bc168dd2f9fe28a091dff9c3258,2024-11-21T01:30:47.280000 +CVE-2011-3580,0,0,0cf9966ae8e3f1421c619d3d1696a2e614a7d4fb0efcc49839baae1176af3da3,2024-11-21T01:30:47.433000 +CVE-2011-3581,0,0,252af93f2dfb2e35ca670cd9284cf904d4619689fa6b356eb01f036a45b13a5e,2024-11-21T01:30:47.583000 CVE-2011-3582,0,0,fee5f084ebdfb8463ca4a9baa4fe72a86842930e5e0558d202b993f7f48dbde6,2020-01-27T12:32:26.197000 CVE-2011-3583,0,0,e5104563c0929310074146771f09b24fbde0c32a7adbc68c226fcc464d5faca7,2019-12-05T16:21:56.290000 CVE-2011-3584,0,0,843d73cb43b8e998da0f2c775d3c875792ce3652c746c37cca10bf12ff609245,2019-12-05T16:29:20.017000 CVE-2011-3585,0,0,8826e0d1e2fbe850a953a6f614132e53b20157fef34d332a3ad8faf9427173ac,2023-02-13T00:19:59.790000 CVE-2011-3586,0,0,bcc35ace8ee592cdb1e3851bec7ce4279b86e2e24818bd3d25201637ca5edf1c,2023-11-07T02:08:36.337000 -CVE-2011-3587,0,1,da0527a404b05365add24e4a7c9975a272989a0eb7acb997b989a089e5f6aa6e,2024-11-21T01:30:48.157000 +CVE-2011-3587,0,0,da0527a404b05365add24e4a7c9975a272989a0eb7acb997b989a089e5f6aa6e,2024-11-21T01:30:48.157000 CVE-2011-3588,0,0,29df2772ab1422adc9a3309dc3ae929631aa2fb89950f92887d261c470a91ca2,2014-03-06T04:32:08.867000 CVE-2011-3589,0,0,3e955710b11cb22e00a03278c3f0b50f7e444bbbaa695b4c16b1d02094f13b78,2014-03-06T04:32:08.960000 CVE-2011-3590,0,0,f8be3813a9364f8cfd3a04e99f91342de98d12bdd49c3af7487e73f156c407fc,2014-03-06T04:32:09.037000 CVE-2011-3591,0,0,9fb3884f388a42cea64910f1f87aef6d832969d9cc7dd4fc852da706300efeb7,2014-12-29T22:47:32.067000 CVE-2011-3592,0,0,e429a683e42658b3c8040b6819ec8f49ef81ba2a66408f18ee6155701ee0e705,2014-12-29T22:48:01.693000 CVE-2011-3593,0,0,fb4905ba31fea4678eaae596e1b850b58671994ace607988bddd16143fe59791,2023-02-13T01:20:51.897000 -CVE-2011-3594,0,1,76153e3837796009dd77cb8cdcb34da4f141d545734f643e86dfca4a90f50940,2024-11-21T01:30:48.927000 +CVE-2011-3594,0,0,76153e3837796009dd77cb8cdcb34da4f141d545734f643e86dfca4a90f50940,2024-11-21T01:30:48.927000 CVE-2011-3595,0,0,a1a89919f911664a02daa6715bceb07003a9636880b21239128b80be7dc734d4,2020-01-24T16:55:29.397000 CVE-2011-3596,0,0,48a513e06136f8eb6ded6eeec274da5477992f61e3e6cb5722336744685817b4,2020-08-18T15:05:58.063000 -CVE-2011-3597,0,1,8659d8ef470e250cb99179ee21547b132bd569cefb49e2754dc862dfd1cbce2b,2024-11-21T01:30:49.317000 -CVE-2011-3598,0,1,ffbe3471868f6da61eb861655e6aa0077ce0fc8da4102dea4d8c461bfb691b37,2024-11-21T01:30:49.437000 -CVE-2011-3599,0,1,3a9556f7c51b99b95eaf3ea86c211206714226ad88632ce1df3ab38ed3a94efa,2024-11-21T01:30:49.563000 +CVE-2011-3597,0,0,8659d8ef470e250cb99179ee21547b132bd569cefb49e2754dc862dfd1cbce2b,2024-11-21T01:30:49.317000 +CVE-2011-3598,0,0,ffbe3471868f6da61eb861655e6aa0077ce0fc8da4102dea4d8c461bfb691b37,2024-11-21T01:30:49.437000 +CVE-2011-3599,0,0,3a9556f7c51b99b95eaf3ea86c211206714226ad88632ce1df3ab38ed3a94efa,2024-11-21T01:30:49.563000 CVE-2011-3600,0,0,1ee88f5a4b88397310f9a2df858cb1293a506474346aeba6bbacfeda16adb6f0,2023-02-13T04:32:39.690000 CVE-2011-3601,0,0,7ece898fb49009670328ad888dfbc7434bafe612ae6eab1e5bead2c53f084a1d,2014-02-21T02:19:20.750000 CVE-2011-3602,0,0,d75191480b5ebc7aa50443745853f2804bbf960fbbd44df3ffd0b8ae821e7b49,2023-11-07T02:08:36.673000 @@ -50256,7 +50256,7 @@ CVE-2011-3603,0,0,f4d91bbae154523c5141628165c1d33d412ae9428476a03edf1406734e9dad CVE-2011-3604,0,0,ced8459c7ee29afa08e6f4d08ec72f479d41924d229ceced1f5e8a49d05631ec,2014-02-18T18:54:52.727000 CVE-2011-3605,0,0,dae0bc61c168a232284419abb36ecf6362b1171eee6e0a950212093f47d8796d,2014-02-18T18:55:36.040000 CVE-2011-3606,0,0,0cbf4c56d5dd8e74e78a533459e180e5da87d757798cf91d2bdcf050c0170f4a,2023-02-13T01:21:06.327000 -CVE-2011-3607,0,1,cd362cd9f77b6d565ce8164cc3aa92e9ffe5e6373230cadb27d828f7f716d476,2024-11-21T01:30:50.460000 +CVE-2011-3607,0,0,cd362cd9f77b6d565ce8164cc3aa92e9ffe5e6373230cadb27d828f7f716d476,2024-11-21T01:30:50.460000 CVE-2011-3608,0,0,7b1dd5eb835416a1f4a4746e75cdb4340fc0c7e1eba2d5955917cfe4bf138c68,2023-11-07T02:08:36.963000 CVE-2011-3609,0,0,09e833aabc60eeb0e625baf5d0e03bb4eb53b4421dda6ad48cd113aff0f544ed,2023-02-13T04:32:40.207000 CVE-2011-3610,0,0,0dfad75b1b08e930ce5253128336f6383d9a1b0f4c9a003651e808ffdb2f5389,2020-06-23T13:16:20.527000 @@ -50264,8 +50264,8 @@ CVE-2011-3611,0,0,5ac38171ec9c9b980849e90a930b68a9e82e84da9fa1f8a90b32e7abc70a68 CVE-2011-3612,0,0,dd16c4494c38fa561bb780de030ca11e5b5ad9c12926659d940b9c95162536ca,2020-01-24T23:16:38.813000 CVE-2011-3613,0,0,414c92c24af2457d9851d357a810c077ccd33a7ab58bef0c242ff749f5b9f092,2020-01-28T16:53:38.617000 CVE-2011-3614,0,0,54bc1b2d281ad28c26daaf1d26fc17498946bcf37a1da0513207b6c4c861369e,2020-01-28T16:50:16.343000 -CVE-2011-3615,0,1,73a728c89132a3168ee0040951a9f4eda8257bd60cb7792926c2f9469b82fb47,2024-11-21T01:30:51.303000 -CVE-2011-3616,0,1,45a62c690c53a4ad47b4b6ffa1ffbfed10a8752c979d56d3f8294c635f038cea,2024-11-21T01:30:51.433000 +CVE-2011-3615,0,0,73a728c89132a3168ee0040951a9f4eda8257bd60cb7792926c2f9469b82fb47,2024-11-21T01:30:51.303000 +CVE-2011-3616,0,0,45a62c690c53a4ad47b4b6ffa1ffbfed10a8752c979d56d3f8294c635f038cea,2024-11-21T01:30:51.433000 CVE-2011-3617,0,0,67f4c772d064de82bdfa9651fc4714ccdc33056d884c54bd9d2c321e3b4df95b,2019-12-11T16:22:34.113000 CVE-2011-3618,0,0,f7d03dd2d8ccdc10bd1f8edeec4686db326a54a5116f165f6d3532a9b98f3a2a,2020-08-18T15:05:57.563000 CVE-2011-3619,0,0,bfeaa6da90398a1cc8dc816c121cb7b4538a7bfd80408d575d2c129ebccc2c98,2023-02-13T04:32:40.383000 @@ -50275,8 +50275,8 @@ CVE-2011-3622,0,0,dad36e1a5fe536863f9caea75121f92d89988e3f8113dd9fda9239a0dbf632 CVE-2011-3623,0,0,e78234262e1ce62f603f7d005f30fcee0631299e69721f8875426ccf47f145d2,2023-11-07T02:08:37.387000 CVE-2011-3624,0,0,4ba6913e646ea40e886d028ba0d594b6c93290c8ad2e7a6aed1196c77d703af2,2019-12-11T22:15:11.177000 CVE-2011-3625,0,0,755f303704e0621eac462de4738e1ee7a8b3308efc83a2b8afdcff0b424d0f8d,2014-06-12T13:27:03.337000 -CVE-2011-3626,0,1,ea6836ff3ad3972c0598063ef3c11c44159df19028f39220a952f4e91bebdc80,2024-11-21T01:30:52.607000 -CVE-2011-3627,0,1,3cd4849d2c59aaefb278833eccf66aff25095dce7d2d6a691d643302b22d01ac,2024-11-21T01:30:52.730000 +CVE-2011-3626,0,0,ea6836ff3ad3972c0598063ef3c11c44159df19028f39220a952f4e91bebdc80,2024-11-21T01:30:52.607000 +CVE-2011-3627,0,0,3cd4849d2c59aaefb278833eccf66aff25095dce7d2d6a691d643302b22d01ac,2024-11-21T01:30:52.730000 CVE-2011-3628,0,0,9b7e0f818e3435cf56661062415dcb1622149eddcfb5e9f9c7aea61df05dbab8,2014-04-16T15:04:35.687000 CVE-2011-3629,0,0,0ab388ac835ee1de626fe79679e042c8326a5b6065ef5a50ae3e515535404b6e,2020-02-05T13:14:10.363000 CVE-2011-3630,0,0,9cb2eb17ba5c84ea5eea69e4c0fabaf66e636016de461a3872eb8c619d03074c,2020-08-18T15:05:57.937000 @@ -50284,38 +50284,38 @@ CVE-2011-3631,0,0,e72c4a117252a60baf4f8bd8882ec2be492c1919a5da62db873cabbfef2b39 CVE-2011-3632,0,0,70fce3d92be99a0da9371f91afc7f5cbb3c2bd0d07243966e89d4ca44206b981,2020-08-18T15:05:57.813000 CVE-2011-3633,0,0,1bed113783c093383e6e31cd1b7b271297dda1c42304cf589065692d37ec841b,2023-11-07T02:08:37.530000 CVE-2011-3634,0,0,75b7e2da2e5e6e9521f50ac53ee98152ef5492c7c270f64b2ca3574543cdd4ec,2023-02-13T00:20:08.807000 -CVE-2011-3635,0,1,23199ddfc9d6f4518dcd8aa9867d70da1dd25095f6a8af09ffcb468b2fc9e118,2024-11-21T01:30:53.573000 -CVE-2011-3636,0,1,31ec1a04c2684e9702148e40354197a7b0e32f7b5b531109dd23bd75714871fd,2024-11-21T01:30:53.707000 +CVE-2011-3635,0,0,23199ddfc9d6f4518dcd8aa9867d70da1dd25095f6a8af09ffcb468b2fc9e118,2024-11-21T01:30:53.573000 +CVE-2011-3636,0,0,31ec1a04c2684e9702148e40354197a7b0e32f7b5b531109dd23bd75714871fd,2024-11-21T01:30:53.707000 CVE-2011-3637,0,0,abf3b4c2de63f618c3b6cbb4647470b1452ea4535113be02e8e7d4fbe22f9c7f,2023-02-13T01:21:15.217000 CVE-2011-3638,0,0,58c5f03a760de1351269beb3c035f506c90fbb53b4f4b3cc9768a25534c43912,2023-02-13T04:32:40.607000 -CVE-2011-3639,0,1,b4809fe29bb4ac8a4b9d9e3164806ee4b5d4e5fc766334e45929b912c196c969,2024-11-21T01:30:54.037000 -CVE-2011-3640,0,1,09f2e82c4361b54b18b26f2e59e814191f9ae623e040d692040b4adeea5f8ab0,2024-11-21T01:30:54.153000 +CVE-2011-3639,0,0,b4809fe29bb4ac8a4b9d9e3164806ee4b5d4e5fc766334e45929b912c196c969,2024-11-21T01:30:54.037000 +CVE-2011-3640,0,0,09f2e82c4361b54b18b26f2e59e814191f9ae623e040d692040b4adeea5f8ab0,2024-11-21T01:30:54.153000 CVE-2011-3642,0,0,b68d78e6cb8410de4c5ab0dfc2d0b35b5006ef7f1f7b857f7e04a6dae0540c51,2020-02-12T16:54:36.443000 -CVE-2011-3645,0,1,834d97adb05fd9d6b1c164414eb365f85afff7f14d11005fe55fd55d4fc30cc4,2024-11-21T01:30:54.490000 -CVE-2011-3646,0,1,a085b205a0b47bab7a31dff567be20e53bd6eab906c922f6c85c2eb44bf6a985,2024-11-21T01:30:54.623000 -CVE-2011-3647,0,1,5ed82c928a407b308efc71f41535c2feb893903dee15e0ee768c19735d213099,2024-11-21T01:30:54.777000 -CVE-2011-3648,0,1,99faaadc0b362c52eed6f0a62b65643b9671b64975ae3bd9c47b075903adf57f,2024-11-21T01:30:54.957000 -CVE-2011-3649,0,1,4e7e3f3901b8bc5d6f68485b7c87ec26d16275ff6efe46b7fd25f2b7c3fedceb,2024-11-21T01:30:55.130000 -CVE-2011-3650,0,1,401b3bb89a87c229b5df41b927653ecf45e3f2271e0cdb573aa36975a3a9ba69,2024-11-21T01:30:55.270000 -CVE-2011-3651,0,1,7dec78b73ebc42652b3cbf0f7b8d138251a83227461cef1f316f0bea52f13be7,2024-11-21T01:30:55.450000 -CVE-2011-3652,0,1,7af60197e5bc6a81affb3a498cc59ecf964c548ecca0c55bda9c47516552c09d,2024-11-21T01:30:55.603000 -CVE-2011-3653,0,1,79ffd6121a266b59fb321ba487adc7f2e576717f2e6babe0d6247fb8069dd7df,2024-11-21T01:30:55.810000 -CVE-2011-3654,0,1,86c1a0347c7b450ba78df5d3ba4d37d4fea7cd744cf017a35677a097ffc14f83,2024-11-21T01:30:55.993000 -CVE-2011-3655,0,1,71f2c10fe33dbcd256e4fa201c23d828a7ced00d06bcd1a965dffde59ddde111,2024-11-21T01:30:56.197000 +CVE-2011-3645,0,0,834d97adb05fd9d6b1c164414eb365f85afff7f14d11005fe55fd55d4fc30cc4,2024-11-21T01:30:54.490000 +CVE-2011-3646,0,0,a085b205a0b47bab7a31dff567be20e53bd6eab906c922f6c85c2eb44bf6a985,2024-11-21T01:30:54.623000 +CVE-2011-3647,0,0,5ed82c928a407b308efc71f41535c2feb893903dee15e0ee768c19735d213099,2024-11-21T01:30:54.777000 +CVE-2011-3648,0,0,99faaadc0b362c52eed6f0a62b65643b9671b64975ae3bd9c47b075903adf57f,2024-11-21T01:30:54.957000 +CVE-2011-3649,0,0,4e7e3f3901b8bc5d6f68485b7c87ec26d16275ff6efe46b7fd25f2b7c3fedceb,2024-11-21T01:30:55.130000 +CVE-2011-3650,0,0,401b3bb89a87c229b5df41b927653ecf45e3f2271e0cdb573aa36975a3a9ba69,2024-11-21T01:30:55.270000 +CVE-2011-3651,0,0,7dec78b73ebc42652b3cbf0f7b8d138251a83227461cef1f316f0bea52f13be7,2024-11-21T01:30:55.450000 +CVE-2011-3652,0,0,7af60197e5bc6a81affb3a498cc59ecf964c548ecca0c55bda9c47516552c09d,2024-11-21T01:30:55.603000 +CVE-2011-3653,0,0,79ffd6121a266b59fb321ba487adc7f2e576717f2e6babe0d6247fb8069dd7df,2024-11-21T01:30:55.810000 +CVE-2011-3654,0,0,86c1a0347c7b450ba78df5d3ba4d37d4fea7cd744cf017a35677a097ffc14f83,2024-11-21T01:30:55.993000 +CVE-2011-3655,0,0,71f2c10fe33dbcd256e4fa201c23d828a7ced00d06bcd1a965dffde59ddde111,2024-11-21T01:30:56.197000 CVE-2011-3656,0,0,a091ed02ef95bc75310cc4f6be8031cc487c6276cb0aa6276759a42557da2658,2021-06-10T16:17:45.023000 -CVE-2011-3657,0,1,e847ee543a1f8419d648b8cbc37e0588f2c927cc60f6116ed11ad6990bd131f2,2024-11-21T01:30:56.517000 -CVE-2011-3658,0,1,93f7df483d509e304b7255be2ec628e32a1e278fa8eddf2a00eb8e390a6cd025,2024-11-21T01:30:56.690000 -CVE-2011-3659,0,1,3875296e500d32c32e593bb1b91461a69986cdab8ed46a66dea397d42a313d86,2024-11-21T01:30:56.863000 -CVE-2011-3660,0,1,70bba88c82f76ad15d0eed38a4ef122f31800ddb748f9bb91ba39b8e4ef627a6,2024-11-21T01:30:57.030000 -CVE-2011-3661,0,1,adf8d4034379d972b7e5930a36b5e995e7e4bf7e73907a1c704bd37da21bdf1b,2024-11-21T01:30:57.223000 -CVE-2011-3663,0,1,dc625c049b7dbdf2bf7e90f6c3ac835ed1d68491fdd3e7025108e303e2b3c503,2024-11-21T01:30:57.390000 -CVE-2011-3664,0,1,a5efa164b4e21809891605400ea8e007525a0329d6c9cb016a7b6cb191b2efb4,2024-11-21T01:30:57.560000 -CVE-2011-3665,0,1,ccc3419d713e0e566c863ade579ca3819d82f657f0ace773903a7bb5760a16ba,2024-11-21T01:30:57.740000 -CVE-2011-3666,0,1,023ed627fd548f7a9f359c0471a9e82a79309d65594690b6995d191f8aee34d9,2024-11-21T01:30:57.910000 -CVE-2011-3667,0,1,3fe4d61602ef4abc28307272733eba5d9cd8d7b73117f07de3b0b314b2b74c69,2024-11-21T01:30:58.080000 -CVE-2011-3668,0,1,e1f911dca02349c707303aead462ea07ed31ac5ea6ce958e5f4458c21ac3c07b,2024-11-21T01:30:58.243000 -CVE-2011-3669,0,1,ef0f99dff20bd2e6e8d18792622535693513fdee27460d712ad544585db97034,2024-11-21T01:30:58.410000 -CVE-2011-3670,0,1,d4f095e8df65a094ef6edd1c149338f20e71364246f9067ae41213ac50b92d23,2024-11-21T01:30:58.583000 +CVE-2011-3657,0,0,e847ee543a1f8419d648b8cbc37e0588f2c927cc60f6116ed11ad6990bd131f2,2024-11-21T01:30:56.517000 +CVE-2011-3658,0,0,93f7df483d509e304b7255be2ec628e32a1e278fa8eddf2a00eb8e390a6cd025,2024-11-21T01:30:56.690000 +CVE-2011-3659,0,0,3875296e500d32c32e593bb1b91461a69986cdab8ed46a66dea397d42a313d86,2024-11-21T01:30:56.863000 +CVE-2011-3660,0,0,70bba88c82f76ad15d0eed38a4ef122f31800ddb748f9bb91ba39b8e4ef627a6,2024-11-21T01:30:57.030000 +CVE-2011-3661,0,0,adf8d4034379d972b7e5930a36b5e995e7e4bf7e73907a1c704bd37da21bdf1b,2024-11-21T01:30:57.223000 +CVE-2011-3663,0,0,dc625c049b7dbdf2bf7e90f6c3ac835ed1d68491fdd3e7025108e303e2b3c503,2024-11-21T01:30:57.390000 +CVE-2011-3664,0,0,a5efa164b4e21809891605400ea8e007525a0329d6c9cb016a7b6cb191b2efb4,2024-11-21T01:30:57.560000 +CVE-2011-3665,0,0,ccc3419d713e0e566c863ade579ca3819d82f657f0ace773903a7bb5760a16ba,2024-11-21T01:30:57.740000 +CVE-2011-3666,0,0,023ed627fd548f7a9f359c0471a9e82a79309d65594690b6995d191f8aee34d9,2024-11-21T01:30:57.910000 +CVE-2011-3667,0,0,3fe4d61602ef4abc28307272733eba5d9cd8d7b73117f07de3b0b314b2b74c69,2024-11-21T01:30:58.080000 +CVE-2011-3668,0,0,e1f911dca02349c707303aead462ea07ed31ac5ea6ce958e5f4458c21ac3c07b,2024-11-21T01:30:58.243000 +CVE-2011-3669,0,0,ef0f99dff20bd2e6e8d18792622535693513fdee27460d712ad544585db97034,2024-11-21T01:30:58.410000 +CVE-2011-3670,0,0,d4f095e8df65a094ef6edd1c149338f20e71364246f9067ae41213ac50b92d23,2024-11-21T01:30:58.583000 CVE-2011-3671,0,0,d1f8f173d53fa885be075f13347759394f77826dcd3a1e2c1b8688a0db985814,2012-06-19T04:00:00 CVE-2011-3672,0,0,cc35d8ffd23b6193569b12aeecd766359fde60f9925b56c58188eaa272b8a2ca,2023-11-07T02:08:38.290000 CVE-2011-3673,0,0,54612f195a2ff53614d5ce8e4e3312192b82fec8c9a9edec499be866bcea8f7e,2023-11-07T02:08:38.503000 @@ -50327,244 +50327,244 @@ CVE-2011-3678,0,0,1c29e1d193c608fa49808eb28449fed9e58d7fe599a2f267c11e34baccf49d CVE-2011-3679,0,0,ee64404dcb9427229a02f693a65106535d9e1a24cc0d19a6909586f93b6fbb5d,2023-11-07T02:08:39.837000 CVE-2011-3680,0,0,b24da9a36fe6cbac4c95a40bb2889bd0c54e6456bf91bdba770a3ecc90f56097,2023-11-07T02:08:40.083000 CVE-2011-3681,0,0,f5e1b2f3bc91cedb7c1318db826c3beed9eee3de15511b08b4bf41ae295a1e75,2023-11-07T02:08:40.303000 -CVE-2011-3684,0,1,9c8d951df398d529cf16d9a22137651c4ffbbdffaf5a490711bdce41fa1a1395,2024-11-21T01:30:59.083000 -CVE-2011-3685,0,1,2fc442885b110be01f9ffa8d0f982da763a369748f00c59ad14658308c22e887,2024-11-21T01:30:59.230000 -CVE-2011-3686,0,1,e506b18ccf45a07cf196ea7a911f6f8be7386168612e7e7dd2994489725bf7f0,2024-11-21T01:30:59.363000 -CVE-2011-3687,0,1,6c53653fd89df28fb4b2cc834bc521e1d6d2d9709111400852f0f3a1124ba456,2024-11-21T01:30:59.523000 -CVE-2011-3688,0,1,70f706e043d708099bf387827c9f73918055e5e274013f9880133fa3cf0454e5,2024-11-21T01:30:59.687000 -CVE-2011-3689,0,1,3d81a4d473f542b9921388c31ef8c16a3f7e5671c521e91135953d86221cdfaf,2024-11-21T01:30:59.843000 -CVE-2011-3690,0,1,c2627e092197f33cdcab983df785128accdf534c8f857acc7b3069fff846ad59,2024-11-21T01:31:00.050000 -CVE-2011-3691,0,1,5f4b954025b00b83ab0862701ef6082388b5d85de8f17da362b81523027fa405,2024-11-21T01:31:00.190000 -CVE-2011-3692,0,1,210272d65ec44294530ca661873df90b13bd6a5ddc9901c7751c9221d738a143,2024-11-21T01:31:00.333000 -CVE-2011-3693,0,1,bd9c9b0ff6ca7e86a0b49c9a2399532b067fc422ae65a3d0774b063f15a6d3a5,2024-11-21T01:31:00.473000 -CVE-2011-3694,0,1,f243b4c68ebbfeb634fcc7c2ee4d6b5b3789d245384d98663edf7c417a8b6226,2024-11-21T01:31:00.613000 -CVE-2011-3695,0,1,e04882c6f6d6fa637f998ca3405ef73f4cfd4100c6010a65e27371435161a7b0,2024-11-21T01:31:00.757000 -CVE-2011-3696,0,1,1967c751e51e165b2826c404bb27590886089982054e509171e8106c661d37c5,2024-11-21T01:31:00.907000 -CVE-2011-3697,0,1,9e58e76ea771d2406dd3845b0ae24bd24a838d504673e5bc06fc8e06b1ad173b,2024-11-21T01:31:01.083000 -CVE-2011-3698,0,1,812f5feda3ee9d22f21885cd4e0fac26a4986e72e0a4fe801f95ab8337170e9f,2024-11-21T01:31:01.233000 -CVE-2011-3699,0,1,18dd5d5a841bb36a876b4bd8cf4084c013abbde1fd41dae13429effa489e0c93,2024-11-21T01:31:01.387000 -CVE-2011-3700,0,1,542747793d5e36346264db6ff1a3a15d4a9ce67e29629f666f90a75e1020a582,2024-11-21T01:31:01.547000 -CVE-2011-3701,0,1,76e4ca96733b1f8e98f46dfeee9c24f41c77d4bd1ab1b8ffab5c2ac9032a0eaf,2024-11-21T01:31:01.703000 -CVE-2011-3702,0,1,da5b1986e47c9a6b389e90f4a5a3eedbe55cf30677275015dfd69801d4b8000b,2024-11-21T01:31:01.867000 -CVE-2011-3703,0,1,a41437398a1127db4eb247b63164dabb9e6faef6aa66db431e0600c5f98da537,2024-11-21T01:31:02.020000 -CVE-2011-3704,0,1,9701e894e4c247d5a0c7b9ec5cbd0235c70f9e88fa66c4bdf87977eac3b7ebf7,2024-11-21T01:31:02.170000 -CVE-2011-3705,0,1,5f6e271657ed03048ba250ecb66428c90f9d641502a466425a1c8db7a32bb302,2024-11-21T01:31:02.310000 -CVE-2011-3706,0,1,a5485d745484eeec7460d181a778991d278c1f6e7d7600135bd0ecab10828a40,2024-11-21T01:31:02.470000 -CVE-2011-3707,0,1,ecc390e8330b988669318ba78bbaba034e32422721970cc4bab6b280aa4b1a72,2024-11-21T01:31:02.630000 -CVE-2011-3708,0,1,ba69559e3f2392a8a235b3a9b0212863b9bc258d17a876f65cf68b0fd74d5ac8,2024-11-21T01:31:02.790000 -CVE-2011-3709,0,1,409167ef7447d960fb4994dbb4f37111bc0305443aeb76ea5f97eec1721d0b67,2024-11-21T01:31:02.940000 -CVE-2011-3710,0,1,01737ec0d1eb16bcf22a821105f270ac96100de21ec0898f3db6fc471ae92a22,2024-11-21T01:31:03.093000 -CVE-2011-3711,0,1,8f6cfa9dc0b4c5c65eaaf1fdb50733ce8816f4ac613d7389dc74934e8d2fa14d,2024-11-21T01:31:03.247000 -CVE-2011-3712,0,1,36db33eee075a6105636eae7b1a66009e8a9e7017943313e92e3f88dc2c97cb5,2024-11-21T01:31:03.407000 -CVE-2011-3713,0,1,d417896bc8e377e71b5ad68fd1b77f183529dda22a95137599630df8aabf8bbd,2024-11-21T01:31:03.560000 -CVE-2011-3714,0,1,c3f8ac1389a0a462916f77d413df703c1a9a51bdd4d88567961ac08a39a90548,2024-11-21T01:31:03.713000 -CVE-2011-3715,0,1,4ceb92426c9cda729d56ba7702634c51eec7cc5d867ab1bde0d4cf591c3ad161,2024-11-21T01:31:03.873000 -CVE-2011-3716,0,1,b5224c5b9661b3fb99e09991fab6ee50d586673aa123ed39ea8e364741ac9ef1,2024-11-21T01:31:04.043000 -CVE-2011-3717,0,1,38224bf344753efd88e70d7c96e9d351b6459655c07c139861bb8f5b3f6c5965,2024-11-21T01:31:04.203000 -CVE-2011-3718,0,1,b0cc635630e77344cd2899fffaaa8a77ac9f2907b8965574a8a8ffb3250319e9,2024-11-21T01:31:04.367000 -CVE-2011-3719,0,1,dd03b9a9e2c92bfccc92deb5749ea0cc80d630b091c627dc73bcfa3d77cb8447,2024-11-21T01:31:04.510000 -CVE-2011-3720,0,1,69eb04b5b111357f84751fd9aa2a0b88e96501e103c78c7a98ade74ebe95cc15,2024-11-21T01:31:04.667000 -CVE-2011-3721,0,1,ee374eadc4b86cf1cd01d5b8a3b0d4c27a0be24762d7b3d6555f61c0c9d57140,2024-11-21T01:31:04.820000 -CVE-2011-3722,0,1,e16fdf9732dde57e790a19f4663d32cfcf9184662dfbc06a8391f393f4474601,2024-11-21T01:31:04.980000 -CVE-2011-3723,0,1,015590bf8d7355c31718b472af6ddc8d913c557d13a2f30f76f8b1f25c83c683,2024-11-21T01:31:05.140000 -CVE-2011-3724,0,1,a0f3c2f0017026c93325d00129cfe3af5a1c2029ef19d4f9cfec1924ad3fdd5f,2024-11-21T01:31:05.293000 -CVE-2011-3725,0,1,fea2cae4391142f81bfd6a878e1fe5b7cd453b5cda80a3277b13bb2072c3534b,2024-11-21T01:31:05.427000 -CVE-2011-3726,0,1,d269d3cc868dee4f3cdef068f0bcd9580e9928d245d573031e8442ed6f2eaf57,2024-11-21T01:31:05.573000 -CVE-2011-3727,0,1,3f2b5574ad92294d351853c1c11b8569cc730cb65110992b9dbfcf540e442381,2024-11-21T01:31:05.713000 -CVE-2011-3728,0,1,fe4cbcfc5b31e397772f5409d1c87339bbf7f0d3116ea98d29a82f1baef8b0e6,2024-11-21T01:31:05.870000 -CVE-2011-3729,0,1,ba5749b07af22cb556a5642bfed356d934b33bb429d90b72901f181a39946eb8,2024-11-21T01:31:06.013000 -CVE-2011-3730,0,1,11e9a88582941e090498d9c48c898a4d88890f185fc3dbba0bacec63b5a014d8,2024-11-21T01:31:06.167000 -CVE-2011-3731,0,1,06e81b905f1c81888b8e6fe67d74174242bd4859909e8e13af5ca4f73564e4de,2024-11-21T01:31:06.320000 -CVE-2011-3732,0,1,6341352d4fd2dc91a3978b3376e1f4746f3f9adc715a39efca7c957fe4d8eedb,2024-11-21T01:31:06.473000 -CVE-2011-3733,0,1,3387c0e2e399c63525161588afd6f9858661a90d1285f10f5382c04f67b34003,2024-11-21T01:31:06.610000 -CVE-2011-3734,0,1,6a3e8fd442df43a001470abef5c3faf94c6f1a1340eaa352e331949359ca84a0,2024-11-21T01:31:06.757000 -CVE-2011-3735,0,1,176fa17d6a62759be450af3743d6c219d5964efc5b59a5310d6fbad807f19272,2024-11-21T01:31:06.940000 -CVE-2011-3736,0,1,06e62ae80e0380b5edba800256b59184549e6b21fa8617d81c838d55c6e218f9,2024-11-21T01:31:07.823000 -CVE-2011-3737,0,1,996fdd5d286d3e44f3e454665d1af34f078b2b3190870dc18f58d948b8479bec,2024-11-21T01:31:08.290000 -CVE-2011-3738,0,1,3520e3559e6ea8b77b65fb78677e24ef78053fe2857703e7510e7ae530678622,2024-11-21T01:31:08.610000 -CVE-2011-3739,0,1,2a899c2c4913a776062e057d5f6db8a60678878f2dacdeb0c74c97a49ed6e388,2024-11-21T01:31:08.777000 -CVE-2011-3740,0,1,06449494475a3b1ac223a6fb610a78fb8dfce90176922fa379f1b01b0e0b2211,2024-11-21T01:31:08.923000 -CVE-2011-3741,0,1,601fbaaee3abdf462adf2b3d95a38788f5f0a7b3038cc673c243b02d91c9019c,2024-11-21T01:31:09.073000 -CVE-2011-3742,0,1,b346dcc0ea1b561b17b23133d5a2cec98eff532ab03142f023a6778f379d445d,2024-11-21T01:31:09.223000 -CVE-2011-3743,0,1,34e26034a881a786791270678e06caf805f3442154d02da3cf3c4adbeaf08e54,2024-11-21T01:31:09.380000 -CVE-2011-3744,0,1,a1df1efa9e0e5c9db92e88b992c2b9f74ffe1d1d19dd519cf69e14028e2b233c,2024-11-21T01:31:09.527000 -CVE-2011-3745,0,1,a843fd4a2f626ea1d0c0abd10616bfbb6e079021795d84f23635907b02e32130,2024-11-21T01:31:09.677000 -CVE-2011-3746,0,1,729cdd76d5d22f4bb45e32e6af22e2a69f5bf127e462e2404292e8120b9a8f7d,2024-11-21T01:31:09.837000 -CVE-2011-3747,0,1,155040ec4d47fbfe1cd9d59856beda8160b73abc03b0fb8d8998d918aa0b1b3f,2024-11-21T01:31:10.030000 -CVE-2011-3748,0,1,bc8cf2954f64721d8f65e37a37cd6e58e9bbc00e752fe8fd139c299c4d8ebae0,2024-11-21T01:31:10.193000 -CVE-2011-3749,0,1,7774d1491359965e5947e5362db8d92ea814e7ba8031176672b7fd4106707a18,2024-11-21T01:31:10.340000 -CVE-2011-3750,0,1,ae4d91dcab3e8e6da3acf98e48491fe03f4bf41f71a83092304db660e21e5060,2024-11-21T01:31:10.483000 -CVE-2011-3751,0,1,c5f7b6011634fe9eb93655eb13966cd4fd751e9f63a1e61ce3e16edf7ae61ebe,2024-11-21T01:31:10.637000 -CVE-2011-3752,0,1,ddffbbb7b40db5a4e6b4d31b73b2ca9d80608386d2dcf0690a294ecb4bcc73d5,2024-11-21T01:31:10.783000 -CVE-2011-3753,0,1,10bbd5da53abdb3f73b7308949f23e37e11b97048f1b4ed146a93627484e6f41,2024-11-21T01:31:10.933000 -CVE-2011-3754,0,1,95c04a2eaf04a0f12ed0b0f34dc24b18092877d00422ec27bb22378e019a8b27,2024-11-21T01:31:11.077000 -CVE-2011-3755,0,1,39c5a6d3a1a3508ac1b81309a0e56ffcfe3378800e71b3bbbd18d2cc472fd59e,2024-11-21T01:31:11.220000 -CVE-2011-3756,0,1,a1d82404b314c98fcd75a7205f4d71042e73e99e78b32c85cf3199487d5f7bb1,2024-11-21T01:31:11.370000 -CVE-2011-3757,0,1,b2713677abbded55db5cac27c88deaf04230a63c08056a53fc8bab0c154e4968,2024-11-21T01:31:11.517000 -CVE-2011-3758,0,1,c956deeb9b1e2ca705debccacd07505e8f157615bbaa1b497f2d986e182dec01,2024-11-21T01:31:11.667000 -CVE-2011-3759,0,1,e7e4b9f5aec734a4828cb6493a701be24524cd217a72562b2da2de0e3824d9a1,2024-11-21T01:31:11.813000 -CVE-2011-3760,0,1,e9e3e6bcd3667bc946657ffde950e4ad6f49599ca1fbb8017dc89a1458a3c434,2024-11-21T01:31:11.963000 -CVE-2011-3761,0,1,0af20a8f676992b6785c8205aa0ea0e2736b8a042a61de7f0c18e8e2b4d6588e,2024-11-21T01:31:12.117000 -CVE-2011-3762,0,1,8986584f2b8e0205380a1a51d4c0a2ac502015d881b0856d5d3a3552b55bc74b,2024-11-21T01:31:12.280000 -CVE-2011-3763,0,1,e08ae7f53bcf5b437d583949fba9d939ff8ab68d75e132eee7e77d4fa833196f,2024-11-21T01:31:12.430000 -CVE-2011-3764,0,1,f5a34d998cd23eb07fdbc950c3b3cdbdeb239320078a0db809361ce63428aa43,2024-11-21T01:31:12.583000 -CVE-2011-3765,0,1,ecb88c8c1f7201ff8a1597726c0f3f8577c39e2d4cd15cad6c60ad9559f9657d,2024-11-21T01:31:12.740000 -CVE-2011-3766,0,1,5cf2cd55fc49524914af1b28a2e64e89d21724d6b0827461e9dfc533125101c1,2024-11-21T01:31:12.890000 -CVE-2011-3767,0,1,8792958d756a340afd1a7e4332aa333b27def6b1dc068c0ff399b79355396dd9,2024-11-21T01:31:13.033000 -CVE-2011-3768,0,1,7e0df7a725dcacc6f4db4826cdb1bf5a4782d92035ec08fda4d72d283f04e251,2024-11-21T01:31:13.183000 -CVE-2011-3769,0,1,1aeb27796755dc44ed72e7fc6fbba3a4fd7a00c0dccf4535a71c7d9204d59c2a,2024-11-21T01:31:13.327000 -CVE-2011-3770,0,1,2a9a23c1494b569200ac1e3069742ade20a0aa477c443261ebde13e1a9d5deef,2024-11-21T01:31:13.470000 -CVE-2011-3771,0,1,30e46e686cb03f09cefcc34dfee4d9f34d1e826a3b00c1f01489ab6f4bc0db70,2024-11-21T01:31:13.620000 -CVE-2011-3772,0,1,77c1cbc85d07c23e50d2a4746978a57cc332a0ee2b027a6e00056be6739da097,2024-11-21T01:31:13.757000 -CVE-2011-3773,0,1,fafefac98969a105bd5c0e1d4120ee78987d74c191a60a02d789c3d6595cece7,2024-11-21T01:31:13.893000 -CVE-2011-3774,0,1,e493a7720a8a4687b9ca97ae95b9225616aff719c8cea6ca7f4bb56017d6e4cd,2024-11-21T01:31:14.033000 -CVE-2011-3775,0,1,d746e9cacfcb607235c6822aabc8c194f33c75ee4bca822df73406a29bae8da4,2024-11-21T01:31:14.173000 -CVE-2011-3776,0,1,fbad4642176750e9dff89e97b57f39c4f98c7963bedd513760ce4d0219263f05,2024-11-21T01:31:14.313000 -CVE-2011-3777,0,1,b776651393f5ff6c6969d8f2b03ab3dfc059ea8b02dee862fef3d64497575285,2024-11-21T01:31:14.450000 -CVE-2011-3778,0,1,589778c26e18e5687525039425b0f8c8701adc27ab62768fe27ea69c699fd85f,2024-11-21T01:31:14.587000 -CVE-2011-3779,0,1,52cd7024b252777c53e14d21c5a62cbed0032156ab53a28ea46ffa4fc2d9e616,2024-11-21T01:31:14.727000 -CVE-2011-3780,0,1,7ddca6a80b50ecc5daa454844e34e1c1335418e0ede50939de3d465f0703a71b,2024-11-21T01:31:14.870000 -CVE-2011-3781,0,1,7b7102cdd26955bbe941f78a1f520ed98daeb84f5ec527f2d9a7d6e5ad5d0666,2024-11-21T01:31:15 -CVE-2011-3782,0,1,2d502bcc5ea9f9331f2cb97e6e206e914696388c323aef337c3f3b9ad73a8f12,2024-11-21T01:31:15.140000 -CVE-2011-3783,0,1,0dde1a425581e2293c0ac30f518081c851793c68ce81292ef6db6bcfe90f5d4f,2024-11-21T01:31:15.280000 -CVE-2011-3784,0,1,2943a4b5db97ebcb530a56c19c3f89d8da108f679e62391df60703c8254ac614,2024-11-21T01:31:15.417000 -CVE-2011-3785,0,1,66d5880dfc7feb5f7ea58d290a2b6de7fb850255fae7579621bb83957c5a5213,2024-11-21T01:31:15.557000 -CVE-2011-3786,0,1,940750e77e44ef41ea8bd2aea4995a50e17cf125c137f2093e70863e7fb5d4d6,2024-11-21T01:31:15.693000 -CVE-2011-3787,0,1,d893a51d3c8ce5da1fd95a48e394893c23b42399e42342ced5aca3dd258d573e,2024-11-21T01:31:15.830000 -CVE-2011-3788,0,1,c497d3b4c6bd9d544287c11e0469613c37861495da5fdf4e69ada8149b23a2c9,2024-11-21T01:31:15.967000 -CVE-2011-3789,0,1,3ad9dbc53e2832cf7120f5cf50ddfaf5dfaece9129d4f40798b36aaa05ab4fae,2024-11-21T01:31:16.100000 -CVE-2011-3790,0,1,ff4b002ac3409699f6d25b61c4ba664ca675b415be72a1a34cdda71e2c28ec98,2024-11-21T01:31:16.233000 -CVE-2011-3791,0,1,c595a9117cfb6e32af35abb0aa43a550426ffc348d90132514ef8801d5b8eb7d,2024-11-21T01:31:16.377000 -CVE-2011-3792,0,1,b5e28ba068033c52716c816612ee1d4d487f600fcec83a465210a8e30f168ee3,2024-11-21T01:31:16.493000 -CVE-2011-3793,0,1,e08da2b251cb201fd9488ae363b3f3f25281d1c40c69c52b6f3ae40fb9621380,2024-11-21T01:31:16.630000 -CVE-2011-3794,0,1,0d491c0ca4d1a7c5a1043c4edcaf729a2a6fdb200d83652e0a5fd4cb43dbbc3b,2024-11-21T01:31:16.767000 -CVE-2011-3795,0,1,3fed177f0af89140d30ee78a5f276fdb0d41f68238e84d104b3dfb2277b95a08,2024-11-21T01:31:16.907000 -CVE-2011-3796,0,1,e853d22c0c5deea1696185274840b679d505e87a68b33c928abfb8e9605ef58e,2024-11-21T01:31:17.043000 -CVE-2011-3797,0,1,46d74bda5ad6b90ab5d98c1d7aa242493fe43e7cfa8a91f5af415325715c6a8c,2024-11-21T01:31:17.187000 -CVE-2011-3798,0,1,fbec4307caf336df6f0650692f7f8645cdf7f757942bed8e5b6a5fa591d4fcb0,2024-11-21T01:31:17.337000 -CVE-2011-3799,0,1,536af1bce7a9bb1c4c3271b8be8d8c21db0795e3106b4e29b42b282891ac644b,2024-11-21T01:31:17.493000 -CVE-2011-3800,0,1,185a88f1d0b71ff32951f02670c880994117412fd855734f03662b08bd535eb5,2024-11-21T01:31:17.630000 -CVE-2011-3801,0,1,130a39fe3bf226f85fbbc09461dd3a5fe0ed55e806cc55be836355b898aa2801,2024-11-21T01:31:17.767000 -CVE-2011-3802,0,1,f63d1273ded2b3bbc8662dd91761a85a577442591e1fd4fb440b0b716ef2205f,2024-11-21T01:31:17.907000 -CVE-2011-3803,0,1,b75763cd2b80c769ed2d66e931bfe0c493a53fbdff0ab249313785df5b149524,2024-11-21T01:31:18.047000 -CVE-2011-3804,0,1,1acdc4d1cc039b3192d38bef35d5a67fc266f42da3cc535c05526333bfc5fb04,2024-11-21T01:31:18.190000 -CVE-2011-3805,0,1,19e586f14b73a8d5bef7e22555d209656ad2262a8a4fed561ee85ea354275e35,2024-11-21T01:31:18.327000 -CVE-2011-3806,0,1,fcb0685eb9684c63a9dc259cb581a45d85cc707df1ba800a9dbdf4fb24a27062,2024-11-21T01:31:18.460000 -CVE-2011-3807,0,1,36d75db7826f1a849fa602c95fd90632e940acd2c5ed8b3e013f2da8769a6873,2024-11-21T01:31:18.607000 -CVE-2011-3808,0,1,630a60a95bf9d6d3a3af6804fed1427f6aac79a0181b24b7255f9b5e30f941e6,2024-11-21T01:31:18.743000 -CVE-2011-3809,0,1,1c2f903c7fa8b3d0c397e09bf70d3a35cb5b24e753efeebb7db17ae3fab981ba,2024-11-21T01:31:18.883000 -CVE-2011-3810,0,1,7677f1e15a97d49f2eaf873174c5da3fcdc30e414c2d37c878f345c275d01b05,2024-11-21T01:31:19.017000 -CVE-2011-3811,0,1,06a7a4be54edcedbc80e7e03e65ed755554f9c27cf016e94b7d23496673cce63,2024-11-21T01:31:19.167000 -CVE-2011-3812,0,1,3dc4b41c4a51e468d68e6127b95122d4c2551bf13aafb8cb59d2df10a9fdc467,2024-11-21T01:31:19.310000 -CVE-2011-3813,0,1,263d48aea905b6dc9777e86dffff153e86b94a11a7e360417c4e5b608241084f,2024-11-21T01:31:19.460000 -CVE-2011-3814,0,1,8b6bc25ef35b808b28b178f63264399b7dee2cce0652d4b1c266a275cc385833,2024-11-21T01:31:19.607000 -CVE-2011-3815,0,1,f57d39fff56fff5616e7bd2b4da8a5fef5709da6203819de6d1563e30b7b79c1,2024-11-21T01:31:19.753000 -CVE-2011-3816,0,1,71d9d1fe6fc104e20ed4721f35d9db053fb5672f770efe558a5648ea2d7a75f7,2024-11-21T01:31:19.900000 -CVE-2011-3817,0,1,18dc0b856065ce1217bd2c2c518f211a48079bd4239985c8e60466c80cb3d433,2024-11-21T01:31:20.040000 -CVE-2011-3818,0,1,b3220d9f64740d3e8ce33d868d45e55f0bce18971e40ceeda62530423698ce42,2024-11-21T01:31:20.207000 -CVE-2011-3819,0,1,fb88a6b09563eec6626f34613e0b96434ed956207986f7c307c77ccdcbd32d78,2024-11-21T01:31:20.363000 -CVE-2011-3820,0,1,58cf758940ac6cf8cf4ae50eb2da1f8df43e213e4c9785b51cab7ec80d9af28e,2024-11-21T01:31:20.490000 -CVE-2011-3821,0,1,03a2f33ca0a86033abd45cfe64d88ddf226cf9cea8aadda2223461c75540e980,2024-11-21T01:31:20.627000 -CVE-2011-3822,0,1,95b08a696a09a1fbd631ce7a71493fad67060114211dd0a778c5ab5fb5841b52,2024-11-21T01:31:20.767000 -CVE-2011-3823,0,1,d5adae641a3c23afa1092e121e5a04e614878bc3d69948a92aebf4439f35306d,2024-11-21T01:31:20.910000 -CVE-2011-3824,0,1,1f27cf1af4a549b9b0603cb46779b73fbb14f9c0d9b1bba3a1b08c6e2bab9fc7,2024-11-21T01:31:21.053000 -CVE-2011-3825,0,1,8a995fda569cc301fa26bf8479dc7bd287ab8c6432cf4a354ed5eaf65dca5fdf,2024-11-21T01:31:21.277000 -CVE-2011-3826,0,1,de091cd47ef30ba08fc37fc76cbcb2489fc3251ea2c799eebfeff6472fbd76e7,2024-11-21T01:31:21.420000 +CVE-2011-3684,0,0,9c8d951df398d529cf16d9a22137651c4ffbbdffaf5a490711bdce41fa1a1395,2024-11-21T01:30:59.083000 +CVE-2011-3685,0,0,2fc442885b110be01f9ffa8d0f982da763a369748f00c59ad14658308c22e887,2024-11-21T01:30:59.230000 +CVE-2011-3686,0,0,e506b18ccf45a07cf196ea7a911f6f8be7386168612e7e7dd2994489725bf7f0,2024-11-21T01:30:59.363000 +CVE-2011-3687,0,0,6c53653fd89df28fb4b2cc834bc521e1d6d2d9709111400852f0f3a1124ba456,2024-11-21T01:30:59.523000 +CVE-2011-3688,0,0,70f706e043d708099bf387827c9f73918055e5e274013f9880133fa3cf0454e5,2024-11-21T01:30:59.687000 +CVE-2011-3689,0,0,3d81a4d473f542b9921388c31ef8c16a3f7e5671c521e91135953d86221cdfaf,2024-11-21T01:30:59.843000 +CVE-2011-3690,0,0,c2627e092197f33cdcab983df785128accdf534c8f857acc7b3069fff846ad59,2024-11-21T01:31:00.050000 +CVE-2011-3691,0,0,5f4b954025b00b83ab0862701ef6082388b5d85de8f17da362b81523027fa405,2024-11-21T01:31:00.190000 +CVE-2011-3692,0,0,210272d65ec44294530ca661873df90b13bd6a5ddc9901c7751c9221d738a143,2024-11-21T01:31:00.333000 +CVE-2011-3693,0,0,bd9c9b0ff6ca7e86a0b49c9a2399532b067fc422ae65a3d0774b063f15a6d3a5,2024-11-21T01:31:00.473000 +CVE-2011-3694,0,0,f243b4c68ebbfeb634fcc7c2ee4d6b5b3789d245384d98663edf7c417a8b6226,2024-11-21T01:31:00.613000 +CVE-2011-3695,0,0,e04882c6f6d6fa637f998ca3405ef73f4cfd4100c6010a65e27371435161a7b0,2024-11-21T01:31:00.757000 +CVE-2011-3696,0,0,1967c751e51e165b2826c404bb27590886089982054e509171e8106c661d37c5,2024-11-21T01:31:00.907000 +CVE-2011-3697,0,0,9e58e76ea771d2406dd3845b0ae24bd24a838d504673e5bc06fc8e06b1ad173b,2024-11-21T01:31:01.083000 +CVE-2011-3698,0,0,812f5feda3ee9d22f21885cd4e0fac26a4986e72e0a4fe801f95ab8337170e9f,2024-11-21T01:31:01.233000 +CVE-2011-3699,0,0,18dd5d5a841bb36a876b4bd8cf4084c013abbde1fd41dae13429effa489e0c93,2024-11-21T01:31:01.387000 +CVE-2011-3700,0,0,542747793d5e36346264db6ff1a3a15d4a9ce67e29629f666f90a75e1020a582,2024-11-21T01:31:01.547000 +CVE-2011-3701,0,0,76e4ca96733b1f8e98f46dfeee9c24f41c77d4bd1ab1b8ffab5c2ac9032a0eaf,2024-11-21T01:31:01.703000 +CVE-2011-3702,0,0,da5b1986e47c9a6b389e90f4a5a3eedbe55cf30677275015dfd69801d4b8000b,2024-11-21T01:31:01.867000 +CVE-2011-3703,0,0,a41437398a1127db4eb247b63164dabb9e6faef6aa66db431e0600c5f98da537,2024-11-21T01:31:02.020000 +CVE-2011-3704,0,0,9701e894e4c247d5a0c7b9ec5cbd0235c70f9e88fa66c4bdf87977eac3b7ebf7,2024-11-21T01:31:02.170000 +CVE-2011-3705,0,0,5f6e271657ed03048ba250ecb66428c90f9d641502a466425a1c8db7a32bb302,2024-11-21T01:31:02.310000 +CVE-2011-3706,0,0,a5485d745484eeec7460d181a778991d278c1f6e7d7600135bd0ecab10828a40,2024-11-21T01:31:02.470000 +CVE-2011-3707,0,0,ecc390e8330b988669318ba78bbaba034e32422721970cc4bab6b280aa4b1a72,2024-11-21T01:31:02.630000 +CVE-2011-3708,0,0,ba69559e3f2392a8a235b3a9b0212863b9bc258d17a876f65cf68b0fd74d5ac8,2024-11-21T01:31:02.790000 +CVE-2011-3709,0,0,409167ef7447d960fb4994dbb4f37111bc0305443aeb76ea5f97eec1721d0b67,2024-11-21T01:31:02.940000 +CVE-2011-3710,0,0,01737ec0d1eb16bcf22a821105f270ac96100de21ec0898f3db6fc471ae92a22,2024-11-21T01:31:03.093000 +CVE-2011-3711,0,0,8f6cfa9dc0b4c5c65eaaf1fdb50733ce8816f4ac613d7389dc74934e8d2fa14d,2024-11-21T01:31:03.247000 +CVE-2011-3712,0,0,36db33eee075a6105636eae7b1a66009e8a9e7017943313e92e3f88dc2c97cb5,2024-11-21T01:31:03.407000 +CVE-2011-3713,0,0,d417896bc8e377e71b5ad68fd1b77f183529dda22a95137599630df8aabf8bbd,2024-11-21T01:31:03.560000 +CVE-2011-3714,0,0,c3f8ac1389a0a462916f77d413df703c1a9a51bdd4d88567961ac08a39a90548,2024-11-21T01:31:03.713000 +CVE-2011-3715,0,0,4ceb92426c9cda729d56ba7702634c51eec7cc5d867ab1bde0d4cf591c3ad161,2024-11-21T01:31:03.873000 +CVE-2011-3716,0,0,b5224c5b9661b3fb99e09991fab6ee50d586673aa123ed39ea8e364741ac9ef1,2024-11-21T01:31:04.043000 +CVE-2011-3717,0,0,38224bf344753efd88e70d7c96e9d351b6459655c07c139861bb8f5b3f6c5965,2024-11-21T01:31:04.203000 +CVE-2011-3718,0,0,b0cc635630e77344cd2899fffaaa8a77ac9f2907b8965574a8a8ffb3250319e9,2024-11-21T01:31:04.367000 +CVE-2011-3719,0,0,dd03b9a9e2c92bfccc92deb5749ea0cc80d630b091c627dc73bcfa3d77cb8447,2024-11-21T01:31:04.510000 +CVE-2011-3720,0,0,69eb04b5b111357f84751fd9aa2a0b88e96501e103c78c7a98ade74ebe95cc15,2024-11-21T01:31:04.667000 +CVE-2011-3721,0,0,ee374eadc4b86cf1cd01d5b8a3b0d4c27a0be24762d7b3d6555f61c0c9d57140,2024-11-21T01:31:04.820000 +CVE-2011-3722,0,0,e16fdf9732dde57e790a19f4663d32cfcf9184662dfbc06a8391f393f4474601,2024-11-21T01:31:04.980000 +CVE-2011-3723,0,0,015590bf8d7355c31718b472af6ddc8d913c557d13a2f30f76f8b1f25c83c683,2024-11-21T01:31:05.140000 +CVE-2011-3724,0,0,a0f3c2f0017026c93325d00129cfe3af5a1c2029ef19d4f9cfec1924ad3fdd5f,2024-11-21T01:31:05.293000 +CVE-2011-3725,0,0,fea2cae4391142f81bfd6a878e1fe5b7cd453b5cda80a3277b13bb2072c3534b,2024-11-21T01:31:05.427000 +CVE-2011-3726,0,0,d269d3cc868dee4f3cdef068f0bcd9580e9928d245d573031e8442ed6f2eaf57,2024-11-21T01:31:05.573000 +CVE-2011-3727,0,0,3f2b5574ad92294d351853c1c11b8569cc730cb65110992b9dbfcf540e442381,2024-11-21T01:31:05.713000 +CVE-2011-3728,0,0,fe4cbcfc5b31e397772f5409d1c87339bbf7f0d3116ea98d29a82f1baef8b0e6,2024-11-21T01:31:05.870000 +CVE-2011-3729,0,0,ba5749b07af22cb556a5642bfed356d934b33bb429d90b72901f181a39946eb8,2024-11-21T01:31:06.013000 +CVE-2011-3730,0,0,11e9a88582941e090498d9c48c898a4d88890f185fc3dbba0bacec63b5a014d8,2024-11-21T01:31:06.167000 +CVE-2011-3731,0,0,06e81b905f1c81888b8e6fe67d74174242bd4859909e8e13af5ca4f73564e4de,2024-11-21T01:31:06.320000 +CVE-2011-3732,0,0,6341352d4fd2dc91a3978b3376e1f4746f3f9adc715a39efca7c957fe4d8eedb,2024-11-21T01:31:06.473000 +CVE-2011-3733,0,0,3387c0e2e399c63525161588afd6f9858661a90d1285f10f5382c04f67b34003,2024-11-21T01:31:06.610000 +CVE-2011-3734,0,0,6a3e8fd442df43a001470abef5c3faf94c6f1a1340eaa352e331949359ca84a0,2024-11-21T01:31:06.757000 +CVE-2011-3735,0,0,176fa17d6a62759be450af3743d6c219d5964efc5b59a5310d6fbad807f19272,2024-11-21T01:31:06.940000 +CVE-2011-3736,0,0,06e62ae80e0380b5edba800256b59184549e6b21fa8617d81c838d55c6e218f9,2024-11-21T01:31:07.823000 +CVE-2011-3737,0,0,996fdd5d286d3e44f3e454665d1af34f078b2b3190870dc18f58d948b8479bec,2024-11-21T01:31:08.290000 +CVE-2011-3738,0,0,3520e3559e6ea8b77b65fb78677e24ef78053fe2857703e7510e7ae530678622,2024-11-21T01:31:08.610000 +CVE-2011-3739,0,0,2a899c2c4913a776062e057d5f6db8a60678878f2dacdeb0c74c97a49ed6e388,2024-11-21T01:31:08.777000 +CVE-2011-3740,0,0,06449494475a3b1ac223a6fb610a78fb8dfce90176922fa379f1b01b0e0b2211,2024-11-21T01:31:08.923000 +CVE-2011-3741,0,0,601fbaaee3abdf462adf2b3d95a38788f5f0a7b3038cc673c243b02d91c9019c,2024-11-21T01:31:09.073000 +CVE-2011-3742,0,0,b346dcc0ea1b561b17b23133d5a2cec98eff532ab03142f023a6778f379d445d,2024-11-21T01:31:09.223000 +CVE-2011-3743,0,0,34e26034a881a786791270678e06caf805f3442154d02da3cf3c4adbeaf08e54,2024-11-21T01:31:09.380000 +CVE-2011-3744,0,0,a1df1efa9e0e5c9db92e88b992c2b9f74ffe1d1d19dd519cf69e14028e2b233c,2024-11-21T01:31:09.527000 +CVE-2011-3745,0,0,a843fd4a2f626ea1d0c0abd10616bfbb6e079021795d84f23635907b02e32130,2024-11-21T01:31:09.677000 +CVE-2011-3746,0,0,729cdd76d5d22f4bb45e32e6af22e2a69f5bf127e462e2404292e8120b9a8f7d,2024-11-21T01:31:09.837000 +CVE-2011-3747,0,0,155040ec4d47fbfe1cd9d59856beda8160b73abc03b0fb8d8998d918aa0b1b3f,2024-11-21T01:31:10.030000 +CVE-2011-3748,0,0,bc8cf2954f64721d8f65e37a37cd6e58e9bbc00e752fe8fd139c299c4d8ebae0,2024-11-21T01:31:10.193000 +CVE-2011-3749,0,0,7774d1491359965e5947e5362db8d92ea814e7ba8031176672b7fd4106707a18,2024-11-21T01:31:10.340000 +CVE-2011-3750,0,0,ae4d91dcab3e8e6da3acf98e48491fe03f4bf41f71a83092304db660e21e5060,2024-11-21T01:31:10.483000 +CVE-2011-3751,0,0,c5f7b6011634fe9eb93655eb13966cd4fd751e9f63a1e61ce3e16edf7ae61ebe,2024-11-21T01:31:10.637000 +CVE-2011-3752,0,0,ddffbbb7b40db5a4e6b4d31b73b2ca9d80608386d2dcf0690a294ecb4bcc73d5,2024-11-21T01:31:10.783000 +CVE-2011-3753,0,0,10bbd5da53abdb3f73b7308949f23e37e11b97048f1b4ed146a93627484e6f41,2024-11-21T01:31:10.933000 +CVE-2011-3754,0,0,95c04a2eaf04a0f12ed0b0f34dc24b18092877d00422ec27bb22378e019a8b27,2024-11-21T01:31:11.077000 +CVE-2011-3755,0,0,39c5a6d3a1a3508ac1b81309a0e56ffcfe3378800e71b3bbbd18d2cc472fd59e,2024-11-21T01:31:11.220000 +CVE-2011-3756,0,0,a1d82404b314c98fcd75a7205f4d71042e73e99e78b32c85cf3199487d5f7bb1,2024-11-21T01:31:11.370000 +CVE-2011-3757,0,0,b2713677abbded55db5cac27c88deaf04230a63c08056a53fc8bab0c154e4968,2024-11-21T01:31:11.517000 +CVE-2011-3758,0,0,c956deeb9b1e2ca705debccacd07505e8f157615bbaa1b497f2d986e182dec01,2024-11-21T01:31:11.667000 +CVE-2011-3759,0,0,e7e4b9f5aec734a4828cb6493a701be24524cd217a72562b2da2de0e3824d9a1,2024-11-21T01:31:11.813000 +CVE-2011-3760,0,0,e9e3e6bcd3667bc946657ffde950e4ad6f49599ca1fbb8017dc89a1458a3c434,2024-11-21T01:31:11.963000 +CVE-2011-3761,0,0,0af20a8f676992b6785c8205aa0ea0e2736b8a042a61de7f0c18e8e2b4d6588e,2024-11-21T01:31:12.117000 +CVE-2011-3762,0,0,8986584f2b8e0205380a1a51d4c0a2ac502015d881b0856d5d3a3552b55bc74b,2024-11-21T01:31:12.280000 +CVE-2011-3763,0,0,e08ae7f53bcf5b437d583949fba9d939ff8ab68d75e132eee7e77d4fa833196f,2024-11-21T01:31:12.430000 +CVE-2011-3764,0,0,f5a34d998cd23eb07fdbc950c3b3cdbdeb239320078a0db809361ce63428aa43,2024-11-21T01:31:12.583000 +CVE-2011-3765,0,0,ecb88c8c1f7201ff8a1597726c0f3f8577c39e2d4cd15cad6c60ad9559f9657d,2024-11-21T01:31:12.740000 +CVE-2011-3766,0,0,5cf2cd55fc49524914af1b28a2e64e89d21724d6b0827461e9dfc533125101c1,2024-11-21T01:31:12.890000 +CVE-2011-3767,0,0,8792958d756a340afd1a7e4332aa333b27def6b1dc068c0ff399b79355396dd9,2024-11-21T01:31:13.033000 +CVE-2011-3768,0,0,7e0df7a725dcacc6f4db4826cdb1bf5a4782d92035ec08fda4d72d283f04e251,2024-11-21T01:31:13.183000 +CVE-2011-3769,0,0,1aeb27796755dc44ed72e7fc6fbba3a4fd7a00c0dccf4535a71c7d9204d59c2a,2024-11-21T01:31:13.327000 +CVE-2011-3770,0,0,2a9a23c1494b569200ac1e3069742ade20a0aa477c443261ebde13e1a9d5deef,2024-11-21T01:31:13.470000 +CVE-2011-3771,0,0,30e46e686cb03f09cefcc34dfee4d9f34d1e826a3b00c1f01489ab6f4bc0db70,2024-11-21T01:31:13.620000 +CVE-2011-3772,0,0,77c1cbc85d07c23e50d2a4746978a57cc332a0ee2b027a6e00056be6739da097,2024-11-21T01:31:13.757000 +CVE-2011-3773,0,0,fafefac98969a105bd5c0e1d4120ee78987d74c191a60a02d789c3d6595cece7,2024-11-21T01:31:13.893000 +CVE-2011-3774,0,0,e493a7720a8a4687b9ca97ae95b9225616aff719c8cea6ca7f4bb56017d6e4cd,2024-11-21T01:31:14.033000 +CVE-2011-3775,0,0,d746e9cacfcb607235c6822aabc8c194f33c75ee4bca822df73406a29bae8da4,2024-11-21T01:31:14.173000 +CVE-2011-3776,0,0,fbad4642176750e9dff89e97b57f39c4f98c7963bedd513760ce4d0219263f05,2024-11-21T01:31:14.313000 +CVE-2011-3777,0,0,b776651393f5ff6c6969d8f2b03ab3dfc059ea8b02dee862fef3d64497575285,2024-11-21T01:31:14.450000 +CVE-2011-3778,0,0,589778c26e18e5687525039425b0f8c8701adc27ab62768fe27ea69c699fd85f,2024-11-21T01:31:14.587000 +CVE-2011-3779,0,0,52cd7024b252777c53e14d21c5a62cbed0032156ab53a28ea46ffa4fc2d9e616,2024-11-21T01:31:14.727000 +CVE-2011-3780,0,0,7ddca6a80b50ecc5daa454844e34e1c1335418e0ede50939de3d465f0703a71b,2024-11-21T01:31:14.870000 +CVE-2011-3781,0,0,7b7102cdd26955bbe941f78a1f520ed98daeb84f5ec527f2d9a7d6e5ad5d0666,2024-11-21T01:31:15 +CVE-2011-3782,0,0,2d502bcc5ea9f9331f2cb97e6e206e914696388c323aef337c3f3b9ad73a8f12,2024-11-21T01:31:15.140000 +CVE-2011-3783,0,0,0dde1a425581e2293c0ac30f518081c851793c68ce81292ef6db6bcfe90f5d4f,2024-11-21T01:31:15.280000 +CVE-2011-3784,0,0,2943a4b5db97ebcb530a56c19c3f89d8da108f679e62391df60703c8254ac614,2024-11-21T01:31:15.417000 +CVE-2011-3785,0,0,66d5880dfc7feb5f7ea58d290a2b6de7fb850255fae7579621bb83957c5a5213,2024-11-21T01:31:15.557000 +CVE-2011-3786,0,0,940750e77e44ef41ea8bd2aea4995a50e17cf125c137f2093e70863e7fb5d4d6,2024-11-21T01:31:15.693000 +CVE-2011-3787,0,0,d893a51d3c8ce5da1fd95a48e394893c23b42399e42342ced5aca3dd258d573e,2024-11-21T01:31:15.830000 +CVE-2011-3788,0,0,c497d3b4c6bd9d544287c11e0469613c37861495da5fdf4e69ada8149b23a2c9,2024-11-21T01:31:15.967000 +CVE-2011-3789,0,0,3ad9dbc53e2832cf7120f5cf50ddfaf5dfaece9129d4f40798b36aaa05ab4fae,2024-11-21T01:31:16.100000 +CVE-2011-3790,0,0,ff4b002ac3409699f6d25b61c4ba664ca675b415be72a1a34cdda71e2c28ec98,2024-11-21T01:31:16.233000 +CVE-2011-3791,0,0,c595a9117cfb6e32af35abb0aa43a550426ffc348d90132514ef8801d5b8eb7d,2024-11-21T01:31:16.377000 +CVE-2011-3792,0,0,b5e28ba068033c52716c816612ee1d4d487f600fcec83a465210a8e30f168ee3,2024-11-21T01:31:16.493000 +CVE-2011-3793,0,0,e08da2b251cb201fd9488ae363b3f3f25281d1c40c69c52b6f3ae40fb9621380,2024-11-21T01:31:16.630000 +CVE-2011-3794,0,0,0d491c0ca4d1a7c5a1043c4edcaf729a2a6fdb200d83652e0a5fd4cb43dbbc3b,2024-11-21T01:31:16.767000 +CVE-2011-3795,0,0,3fed177f0af89140d30ee78a5f276fdb0d41f68238e84d104b3dfb2277b95a08,2024-11-21T01:31:16.907000 +CVE-2011-3796,0,0,e853d22c0c5deea1696185274840b679d505e87a68b33c928abfb8e9605ef58e,2024-11-21T01:31:17.043000 +CVE-2011-3797,0,0,46d74bda5ad6b90ab5d98c1d7aa242493fe43e7cfa8a91f5af415325715c6a8c,2024-11-21T01:31:17.187000 +CVE-2011-3798,0,0,fbec4307caf336df6f0650692f7f8645cdf7f757942bed8e5b6a5fa591d4fcb0,2024-11-21T01:31:17.337000 +CVE-2011-3799,0,0,536af1bce7a9bb1c4c3271b8be8d8c21db0795e3106b4e29b42b282891ac644b,2024-11-21T01:31:17.493000 +CVE-2011-3800,0,0,185a88f1d0b71ff32951f02670c880994117412fd855734f03662b08bd535eb5,2024-11-21T01:31:17.630000 +CVE-2011-3801,0,0,130a39fe3bf226f85fbbc09461dd3a5fe0ed55e806cc55be836355b898aa2801,2024-11-21T01:31:17.767000 +CVE-2011-3802,0,0,f63d1273ded2b3bbc8662dd91761a85a577442591e1fd4fb440b0b716ef2205f,2024-11-21T01:31:17.907000 +CVE-2011-3803,0,0,b75763cd2b80c769ed2d66e931bfe0c493a53fbdff0ab249313785df5b149524,2024-11-21T01:31:18.047000 +CVE-2011-3804,0,0,1acdc4d1cc039b3192d38bef35d5a67fc266f42da3cc535c05526333bfc5fb04,2024-11-21T01:31:18.190000 +CVE-2011-3805,0,0,19e586f14b73a8d5bef7e22555d209656ad2262a8a4fed561ee85ea354275e35,2024-11-21T01:31:18.327000 +CVE-2011-3806,0,0,fcb0685eb9684c63a9dc259cb581a45d85cc707df1ba800a9dbdf4fb24a27062,2024-11-21T01:31:18.460000 +CVE-2011-3807,0,0,36d75db7826f1a849fa602c95fd90632e940acd2c5ed8b3e013f2da8769a6873,2024-11-21T01:31:18.607000 +CVE-2011-3808,0,0,630a60a95bf9d6d3a3af6804fed1427f6aac79a0181b24b7255f9b5e30f941e6,2024-11-21T01:31:18.743000 +CVE-2011-3809,0,0,1c2f903c7fa8b3d0c397e09bf70d3a35cb5b24e753efeebb7db17ae3fab981ba,2024-11-21T01:31:18.883000 +CVE-2011-3810,0,0,7677f1e15a97d49f2eaf873174c5da3fcdc30e414c2d37c878f345c275d01b05,2024-11-21T01:31:19.017000 +CVE-2011-3811,0,0,06a7a4be54edcedbc80e7e03e65ed755554f9c27cf016e94b7d23496673cce63,2024-11-21T01:31:19.167000 +CVE-2011-3812,0,0,3dc4b41c4a51e468d68e6127b95122d4c2551bf13aafb8cb59d2df10a9fdc467,2024-11-21T01:31:19.310000 +CVE-2011-3813,0,0,263d48aea905b6dc9777e86dffff153e86b94a11a7e360417c4e5b608241084f,2024-11-21T01:31:19.460000 +CVE-2011-3814,0,0,8b6bc25ef35b808b28b178f63264399b7dee2cce0652d4b1c266a275cc385833,2024-11-21T01:31:19.607000 +CVE-2011-3815,0,0,f57d39fff56fff5616e7bd2b4da8a5fef5709da6203819de6d1563e30b7b79c1,2024-11-21T01:31:19.753000 +CVE-2011-3816,0,0,71d9d1fe6fc104e20ed4721f35d9db053fb5672f770efe558a5648ea2d7a75f7,2024-11-21T01:31:19.900000 +CVE-2011-3817,0,0,18dc0b856065ce1217bd2c2c518f211a48079bd4239985c8e60466c80cb3d433,2024-11-21T01:31:20.040000 +CVE-2011-3818,0,0,b3220d9f64740d3e8ce33d868d45e55f0bce18971e40ceeda62530423698ce42,2024-11-21T01:31:20.207000 +CVE-2011-3819,0,0,fb88a6b09563eec6626f34613e0b96434ed956207986f7c307c77ccdcbd32d78,2024-11-21T01:31:20.363000 +CVE-2011-3820,0,0,58cf758940ac6cf8cf4ae50eb2da1f8df43e213e4c9785b51cab7ec80d9af28e,2024-11-21T01:31:20.490000 +CVE-2011-3821,0,0,03a2f33ca0a86033abd45cfe64d88ddf226cf9cea8aadda2223461c75540e980,2024-11-21T01:31:20.627000 +CVE-2011-3822,0,0,95b08a696a09a1fbd631ce7a71493fad67060114211dd0a778c5ab5fb5841b52,2024-11-21T01:31:20.767000 +CVE-2011-3823,0,0,d5adae641a3c23afa1092e121e5a04e614878bc3d69948a92aebf4439f35306d,2024-11-21T01:31:20.910000 +CVE-2011-3824,0,0,1f27cf1af4a549b9b0603cb46779b73fbb14f9c0d9b1bba3a1b08c6e2bab9fc7,2024-11-21T01:31:21.053000 +CVE-2011-3825,0,0,8a995fda569cc301fa26bf8479dc7bd287ab8c6432cf4a354ed5eaf65dca5fdf,2024-11-21T01:31:21.277000 +CVE-2011-3826,0,0,de091cd47ef30ba08fc37fc76cbcb2489fc3251ea2c799eebfeff6472fbd76e7,2024-11-21T01:31:21.420000 CVE-2011-3827,0,0,87e4a35d923242a380bda70a1f9f7a2948361301c859278ba4f18824de2c0144,2013-04-05T03:05:33.610000 -CVE-2011-3828,0,1,4fb3ab02f6383b8fe8aefe79f29745147fbb08c0291b9c3b1762c9091507e54f,2024-11-21T01:31:21.700000 -CVE-2011-3829,0,1,bae86a682ee5bd88cf191f3826edddaa4a1d2703bab159f33b0e7bb433dd0796,2024-11-21T01:31:21.820000 -CVE-2011-3830,0,1,442f752afcaf2dba140c0d8582484c093a3c2ac3f0b768986150f770e15d9aeb,2024-11-21T01:31:21.940000 -CVE-2011-3831,0,1,08a1d36e1966a742fa83c82f746b9ea8ae02420bdeec1ba5496adc4a1a0ea30e,2024-11-21T01:31:22.060000 -CVE-2011-3832,0,1,492dff3143d68204159f269b6b30002622b44d9282503053912319cc0ecd11ef,2024-11-21T01:31:22.183000 -CVE-2011-3833,0,1,cd3d9024caf5ca46cb2c3b44750b688be2e1a4ec2b70b5d4a12ff9bf697a6757,2024-11-21T01:31:22.307000 -CVE-2011-3834,0,1,76a06e6f4734c645615802dc1677bb697406b14da0e996248a3a089c07fccbec,2024-11-21T01:31:22.433000 -CVE-2011-3835,0,1,2ae7c10dcc17c15528c772460904d3075d2a8899563d38c8a441cb9da600d455,2024-11-21T01:31:22.567000 -CVE-2011-3836,0,1,d36d65739c15a63e849c2d8999e012c14bc22a74126820f1f1815837458466ae,2024-11-21T01:31:22.713000 -CVE-2011-3837,0,1,0dd01953a7a269888c4807b92649fca216a950ea6b480c21893fe58cc2d65e9f,2024-11-21T01:31:22.830000 -CVE-2011-3838,0,1,905c9ed4e6427891929ac1874197a2fdfab121c06ca2efbfea8ea9984dbe6232,2024-11-21T01:31:22.937000 -CVE-2011-3839,0,1,2ba3b92d2fd8e01ae00630c02038ca92a14c7d6f5c1e4a18bb75d32be62e1aaf,2024-11-21T01:31:23.057000 -CVE-2011-3841,0,1,8bc108558d7055e40435ac28448f3243adac1929606e960ce832257ca7cd4301,2024-11-21T01:31:23.170000 +CVE-2011-3828,0,0,4fb3ab02f6383b8fe8aefe79f29745147fbb08c0291b9c3b1762c9091507e54f,2024-11-21T01:31:21.700000 +CVE-2011-3829,0,0,bae86a682ee5bd88cf191f3826edddaa4a1d2703bab159f33b0e7bb433dd0796,2024-11-21T01:31:21.820000 +CVE-2011-3830,0,0,442f752afcaf2dba140c0d8582484c093a3c2ac3f0b768986150f770e15d9aeb,2024-11-21T01:31:21.940000 +CVE-2011-3831,0,0,08a1d36e1966a742fa83c82f746b9ea8ae02420bdeec1ba5496adc4a1a0ea30e,2024-11-21T01:31:22.060000 +CVE-2011-3832,0,0,492dff3143d68204159f269b6b30002622b44d9282503053912319cc0ecd11ef,2024-11-21T01:31:22.183000 +CVE-2011-3833,0,0,cd3d9024caf5ca46cb2c3b44750b688be2e1a4ec2b70b5d4a12ff9bf697a6757,2024-11-21T01:31:22.307000 +CVE-2011-3834,0,0,76a06e6f4734c645615802dc1677bb697406b14da0e996248a3a089c07fccbec,2024-11-21T01:31:22.433000 +CVE-2011-3835,0,0,2ae7c10dcc17c15528c772460904d3075d2a8899563d38c8a441cb9da600d455,2024-11-21T01:31:22.567000 +CVE-2011-3836,0,0,d36d65739c15a63e849c2d8999e012c14bc22a74126820f1f1815837458466ae,2024-11-21T01:31:22.713000 +CVE-2011-3837,0,0,0dd01953a7a269888c4807b92649fca216a950ea6b480c21893fe58cc2d65e9f,2024-11-21T01:31:22.830000 +CVE-2011-3838,0,0,905c9ed4e6427891929ac1874197a2fdfab121c06ca2efbfea8ea9984dbe6232,2024-11-21T01:31:22.937000 +CVE-2011-3839,0,0,2ba3b92d2fd8e01ae00630c02038ca92a14c7d6f5c1e4a18bb75d32be62e1aaf,2024-11-21T01:31:23.057000 +CVE-2011-3841,0,0,8bc108558d7055e40435ac28448f3243adac1929606e960ce832257ca7cd4301,2024-11-21T01:31:23.170000 CVE-2011-3844,0,0,83ed7e9113225ccbdd6b442fa987b2141308c144c80c0a1d639a38088d31841e,2018-01-06T02:29:21.487000 CVE-2011-3845,0,0,885ced2cb0bfc381ea08fbed366d709d5d1c7a6c53fb7e18a1a599bd54c6944f,2018-01-05T02:29:11.240000 CVE-2011-3846,0,0,400ab41379ea12a2627c676b22dec53d7a1d605a53bdeac1e4092880a38e8d7e,2012-04-12T10:45:13.877000 -CVE-2011-3848,0,1,205c02c6fac8f8a5782e6185fa138e2ef4e11e68ead4501875d32eb464f48ae1,2024-11-21T01:31:23.630000 -CVE-2011-3849,0,1,db86dac05097a434b26bb0e3c8a5184749b9581938db35bd6ed613c6a5993e3c,2024-11-21T01:31:23.787000 -CVE-2011-3850,0,1,72b06fa6c3b6b66abc976fd9c90910744ca67ef22cf72c1335b0a4185ce25405,2024-11-21T01:31:23.937000 -CVE-2011-3851,0,1,724001b9eaf9786006286b2456745b0ebab5bf6f2753ceb2fc0dbdde25b07118,2024-11-21T01:31:24.097000 -CVE-2011-3852,0,1,3aee458bc83336cde810e0e0aca28ce26567a3f43de40a0ce39abe9578bda6b7,2024-11-21T01:31:24.240000 -CVE-2011-3853,0,1,6e144db0011739a39e8d29a51aa681907bd278ebdb5feab95836a94702cc84f6,2024-11-21T01:31:24.397000 -CVE-2011-3854,0,1,8923e5c073392a20c9056c1f21fa7948969d6bd3ad341968a006259edbf84344,2024-11-21T01:31:24.547000 -CVE-2011-3855,0,1,ccbbe1668b845e911dac59e61618487a166c0ffbcff63131fcf5ae2b1118fc96,2024-11-21T01:31:24.707000 -CVE-2011-3856,0,1,f3ea63a6a6eebbc3ba30644b73064e8205426444fd8be373f494aabdd0d4094c,2024-11-21T01:31:24.843000 -CVE-2011-3857,0,1,979dfd9321ae3106d22862b0c28a178c3c98eb1a33180e37fa56ae345e8dbc36,2024-11-21T01:31:24.987000 -CVE-2011-3858,0,1,99cef917384c04b8b96c51522f4899a1897c3932e2b317f71cef3f66b8b4b076,2024-11-21T01:31:25.133000 -CVE-2011-3859,0,1,13c7d3e786f5a16bce7fe011f3fffc42c60e1938a34c6b81501be3b30092d29c,2024-11-21T01:31:25.293000 -CVE-2011-3860,0,1,a85d4cd29645d727e6b6bb64e697b5dea092c38c46bef8e632570a3c655f46e4,2024-11-21T01:31:25.450000 -CVE-2011-3861,0,1,6ff2b3a5a9ffa929f7e5b74ec25ffd5a9933f59ca48a798c7386f7c297c5830f,2024-11-21T01:31:25.610000 -CVE-2011-3862,0,1,c1d2862d2cf5ef1ca18d084883eeb3523f18b543016948de7a8a366a9fd4d3f2,2024-11-21T01:31:25.750000 -CVE-2011-3863,0,1,9108c00af7f9d1b632205ec8d43ea430833ffe3b1331623850c48ec354d2ac89,2024-11-21T01:31:25.897000 -CVE-2011-3864,0,1,06ba6054411e1de3f4b37aad50e54c2b63a1db852c3b585d954661933f806fa7,2024-11-21T01:31:26.050000 -CVE-2011-3865,0,1,465d1af31d5612f27149ea35d0082c81cbe07b21c1f9d87325521e136b25dda1,2024-11-21T01:31:26.197000 -CVE-2011-3866,0,1,97e465eff82b61ce43bad0e62eb264719412d956ab9ee864fd90bd078086473d,2024-11-21T01:31:26.340000 +CVE-2011-3848,0,0,205c02c6fac8f8a5782e6185fa138e2ef4e11e68ead4501875d32eb464f48ae1,2024-11-21T01:31:23.630000 +CVE-2011-3849,0,0,db86dac05097a434b26bb0e3c8a5184749b9581938db35bd6ed613c6a5993e3c,2024-11-21T01:31:23.787000 +CVE-2011-3850,0,0,72b06fa6c3b6b66abc976fd9c90910744ca67ef22cf72c1335b0a4185ce25405,2024-11-21T01:31:23.937000 +CVE-2011-3851,0,0,724001b9eaf9786006286b2456745b0ebab5bf6f2753ceb2fc0dbdde25b07118,2024-11-21T01:31:24.097000 +CVE-2011-3852,0,0,3aee458bc83336cde810e0e0aca28ce26567a3f43de40a0ce39abe9578bda6b7,2024-11-21T01:31:24.240000 +CVE-2011-3853,0,0,6e144db0011739a39e8d29a51aa681907bd278ebdb5feab95836a94702cc84f6,2024-11-21T01:31:24.397000 +CVE-2011-3854,0,0,8923e5c073392a20c9056c1f21fa7948969d6bd3ad341968a006259edbf84344,2024-11-21T01:31:24.547000 +CVE-2011-3855,0,0,ccbbe1668b845e911dac59e61618487a166c0ffbcff63131fcf5ae2b1118fc96,2024-11-21T01:31:24.707000 +CVE-2011-3856,0,0,f3ea63a6a6eebbc3ba30644b73064e8205426444fd8be373f494aabdd0d4094c,2024-11-21T01:31:24.843000 +CVE-2011-3857,0,0,979dfd9321ae3106d22862b0c28a178c3c98eb1a33180e37fa56ae345e8dbc36,2024-11-21T01:31:24.987000 +CVE-2011-3858,0,0,99cef917384c04b8b96c51522f4899a1897c3932e2b317f71cef3f66b8b4b076,2024-11-21T01:31:25.133000 +CVE-2011-3859,0,0,13c7d3e786f5a16bce7fe011f3fffc42c60e1938a34c6b81501be3b30092d29c,2024-11-21T01:31:25.293000 +CVE-2011-3860,0,0,a85d4cd29645d727e6b6bb64e697b5dea092c38c46bef8e632570a3c655f46e4,2024-11-21T01:31:25.450000 +CVE-2011-3861,0,0,6ff2b3a5a9ffa929f7e5b74ec25ffd5a9933f59ca48a798c7386f7c297c5830f,2024-11-21T01:31:25.610000 +CVE-2011-3862,0,0,c1d2862d2cf5ef1ca18d084883eeb3523f18b543016948de7a8a366a9fd4d3f2,2024-11-21T01:31:25.750000 +CVE-2011-3863,0,0,9108c00af7f9d1b632205ec8d43ea430833ffe3b1331623850c48ec354d2ac89,2024-11-21T01:31:25.897000 +CVE-2011-3864,0,0,06ba6054411e1de3f4b37aad50e54c2b63a1db852c3b585d954661933f806fa7,2024-11-21T01:31:26.050000 +CVE-2011-3865,0,0,465d1af31d5612f27149ea35d0082c81cbe07b21c1f9d87325521e136b25dda1,2024-11-21T01:31:26.197000 +CVE-2011-3866,0,0,97e465eff82b61ce43bad0e62eb264719412d956ab9ee864fd90bd078086473d,2024-11-21T01:31:26.340000 CVE-2011-3867,0,0,5cdaf55b4421fba0453cbbc2935fe919b22384e56dbf43ae356bc47833d0c433,2023-11-07T02:08:41.750000 -CVE-2011-3868,0,1,52abc6b0748f3cd56948707cd353670fd861f7523bdc4fc8c15086c665331084,2024-11-21T01:31:26.507000 -CVE-2011-3869,0,1,4409b481af6d0d4a1eb838ba2f816a701fb41082bd20938ae6bdef74ea9749b8,2024-11-21T01:31:26.660000 -CVE-2011-3870,0,1,b9c971a7c6f1310cef35bd776f6a2c2f9b4165aaae98e531363d09769e713a71,2024-11-21T01:31:26.827000 -CVE-2011-3871,0,1,3fea58ba92e16de0871afa2089d2db797cc34503018ab000e55a616bef4b2fb2,2024-11-21T01:31:26.990000 -CVE-2011-3872,0,1,0e968c8b41718f4cf32924dc5c7388bc1e43265fc9693ecfe9074acee1b405e4,2024-11-21T01:31:27.150000 -CVE-2011-3873,0,1,d4bef9d2225ecf98d0def95de034ba4bbc8ff9a5f0b6e56a919e2580e949fbd2,2024-11-21T01:31:27.320000 -CVE-2011-3874,0,1,5382aed250d4e4319385fb2e9b58ab2782dbb97016587441cfc77282f9785cbf,2024-11-21T01:31:27.440000 -CVE-2011-3875,0,1,755d974f1bc05d88f7c09b8198c239b3d1acd0aea8ac0484dac16252e84c5a91,2024-11-21T01:31:27.540000 -CVE-2011-3876,0,1,a148047ef9404ce06505ced411b01b2bec093c929a98c4559048bf853271f141,2024-11-21T01:31:27.653000 -CVE-2011-3877,0,1,1faa77128b484337533ba70167ba89df67bad22aaa71346f0c7f07ca454df2f5,2024-11-21T01:31:27.763000 -CVE-2011-3878,0,1,1c0f46067f0f6b98181d9d921818e26a8630d99d4f038498a39d1e246a934e50,2024-11-21T01:31:27.877000 -CVE-2011-3879,0,1,e02b0d61822d5adf691711df64989d9d5c4f02f7ce3293d367be3b5182b0ce95,2024-11-21T01:31:27.987000 -CVE-2011-3880,0,1,46694ea2ecb12b09dcef26258e46bc708fad063311b209be898aa5ead7010c6e,2024-11-21T01:31:28.097000 -CVE-2011-3881,0,1,c13f14f69caa88cbc30023319b4abb902deedfe5004b83b8d6a7c1b5cf49e126,2024-11-21T01:31:28.207000 -CVE-2011-3882,0,1,c1770f9ead861a67f250b79921cfed0620a35a104450a50e7a356a06b33a9436,2024-11-21T01:31:28.337000 -CVE-2011-3883,0,1,8e3149059cc870bd5e87eb0d0f9b56ab44652b143d859628b47ee9cf48ea0357,2024-11-21T01:31:28.447000 -CVE-2011-3884,0,1,527312cdc37b12f4055e1aaf90f65813be16acb10289e5783d307ed07fd4acfc,2024-11-21T01:31:28.553000 -CVE-2011-3885,0,1,42ac7120674021116b2cc43c86dd3f5ede38e5d23d1c3ec7a012dc8b90cea1b9,2024-11-21T01:31:28.663000 -CVE-2011-3886,0,1,2cfe36410b1acdfd468bee47bfc38039d463c4be64cc8fe42ef3d5fa232d1da5,2024-11-21T01:31:28.813000 -CVE-2011-3887,0,1,c7b6b7fce5ab88ff0646c3b25c334d3367a86cf66ab187a47c892b53a0cb61d6,2024-11-21T01:31:28.927000 -CVE-2011-3888,0,1,343a9fab9748f87c0ff9fb00434eb0cc1ab2460bc4197ef3e04f63289ee2587e,2024-11-21T01:31:29.047000 -CVE-2011-3889,0,1,07c37ef5129de864dab11c121aeceb864a37039f774e5768f104983eb779a0ab,2024-11-21T01:31:29.160000 -CVE-2011-3890,0,1,711fb0b2b131eb86a262856ef046cb172d5102d32c699da67fbc3c6de1f189f6,2024-11-21T01:31:29.263000 -CVE-2011-3891,0,1,a8d7f13b04cd13fbe7fa7ea746bbf0fcc6fcb18bbaee8bc2c1538cadfe8c6fb5,2024-11-21T01:31:29.367000 -CVE-2011-3892,0,1,06cfe58933914ac61fd0690ca6dc7227dabb7627078ab39dd329a9b6d809bb9d,2024-11-21T01:31:29.470000 -CVE-2011-3893,0,1,d7b4e3d7aa59d7734f36e303668bb06e49418ae88e4b3c96594131e9286300d6,2024-11-21T01:31:29.593000 -CVE-2011-3894,0,1,b303484b11ee9e0a7c5dab3b05f0f98909b22a604ba3b46efb22ae6a442a2aac,2024-11-21T01:31:29.700000 -CVE-2011-3895,0,1,b374751ae05df9ac58c4d31872d9573ad76e50714ae13dc2f12fbeb1abf81d7c,2024-11-21T01:31:29.810000 -CVE-2011-3896,0,1,ff2b295ff4ca1e188795f5d5f1ebf9407cf1078f9232efc5325e921c1044bdae,2024-11-21T01:31:29.920000 -CVE-2011-3897,0,1,7317e1394ac0376abc0ff18cc9cdf74710e43a1f196758aebde5ee303ae38957,2024-11-21T01:31:30.023000 -CVE-2011-3898,0,1,9a96de61b851aa987ee40752d20fddbef69553807fa8645645a5ce7906eb9397,2024-11-21T01:31:30.140000 -CVE-2011-3900,0,1,4611c0a9b98c08f63dc90b211a6bc93c4786fcf05ff329cc701a20e6260c4106,2024-11-21T01:31:30.247000 +CVE-2011-3868,0,0,52abc6b0748f3cd56948707cd353670fd861f7523bdc4fc8c15086c665331084,2024-11-21T01:31:26.507000 +CVE-2011-3869,0,0,4409b481af6d0d4a1eb838ba2f816a701fb41082bd20938ae6bdef74ea9749b8,2024-11-21T01:31:26.660000 +CVE-2011-3870,0,0,b9c971a7c6f1310cef35bd776f6a2c2f9b4165aaae98e531363d09769e713a71,2024-11-21T01:31:26.827000 +CVE-2011-3871,0,0,3fea58ba92e16de0871afa2089d2db797cc34503018ab000e55a616bef4b2fb2,2024-11-21T01:31:26.990000 +CVE-2011-3872,0,0,0e968c8b41718f4cf32924dc5c7388bc1e43265fc9693ecfe9074acee1b405e4,2024-11-21T01:31:27.150000 +CVE-2011-3873,0,0,d4bef9d2225ecf98d0def95de034ba4bbc8ff9a5f0b6e56a919e2580e949fbd2,2024-11-21T01:31:27.320000 +CVE-2011-3874,0,0,5382aed250d4e4319385fb2e9b58ab2782dbb97016587441cfc77282f9785cbf,2024-11-21T01:31:27.440000 +CVE-2011-3875,0,0,755d974f1bc05d88f7c09b8198c239b3d1acd0aea8ac0484dac16252e84c5a91,2024-11-21T01:31:27.540000 +CVE-2011-3876,0,0,a148047ef9404ce06505ced411b01b2bec093c929a98c4559048bf853271f141,2024-11-21T01:31:27.653000 +CVE-2011-3877,0,0,1faa77128b484337533ba70167ba89df67bad22aaa71346f0c7f07ca454df2f5,2024-11-21T01:31:27.763000 +CVE-2011-3878,0,0,1c0f46067f0f6b98181d9d921818e26a8630d99d4f038498a39d1e246a934e50,2024-11-21T01:31:27.877000 +CVE-2011-3879,0,0,e02b0d61822d5adf691711df64989d9d5c4f02f7ce3293d367be3b5182b0ce95,2024-11-21T01:31:27.987000 +CVE-2011-3880,0,0,46694ea2ecb12b09dcef26258e46bc708fad063311b209be898aa5ead7010c6e,2024-11-21T01:31:28.097000 +CVE-2011-3881,0,0,c13f14f69caa88cbc30023319b4abb902deedfe5004b83b8d6a7c1b5cf49e126,2024-11-21T01:31:28.207000 +CVE-2011-3882,0,0,c1770f9ead861a67f250b79921cfed0620a35a104450a50e7a356a06b33a9436,2024-11-21T01:31:28.337000 +CVE-2011-3883,0,0,8e3149059cc870bd5e87eb0d0f9b56ab44652b143d859628b47ee9cf48ea0357,2024-11-21T01:31:28.447000 +CVE-2011-3884,0,0,527312cdc37b12f4055e1aaf90f65813be16acb10289e5783d307ed07fd4acfc,2024-11-21T01:31:28.553000 +CVE-2011-3885,0,0,42ac7120674021116b2cc43c86dd3f5ede38e5d23d1c3ec7a012dc8b90cea1b9,2024-11-21T01:31:28.663000 +CVE-2011-3886,0,0,2cfe36410b1acdfd468bee47bfc38039d463c4be64cc8fe42ef3d5fa232d1da5,2024-11-21T01:31:28.813000 +CVE-2011-3887,0,0,c7b6b7fce5ab88ff0646c3b25c334d3367a86cf66ab187a47c892b53a0cb61d6,2024-11-21T01:31:28.927000 +CVE-2011-3888,0,0,343a9fab9748f87c0ff9fb00434eb0cc1ab2460bc4197ef3e04f63289ee2587e,2024-11-21T01:31:29.047000 +CVE-2011-3889,0,0,07c37ef5129de864dab11c121aeceb864a37039f774e5768f104983eb779a0ab,2024-11-21T01:31:29.160000 +CVE-2011-3890,0,0,711fb0b2b131eb86a262856ef046cb172d5102d32c699da67fbc3c6de1f189f6,2024-11-21T01:31:29.263000 +CVE-2011-3891,0,0,a8d7f13b04cd13fbe7fa7ea746bbf0fcc6fcb18bbaee8bc2c1538cadfe8c6fb5,2024-11-21T01:31:29.367000 +CVE-2011-3892,0,0,06cfe58933914ac61fd0690ca6dc7227dabb7627078ab39dd329a9b6d809bb9d,2024-11-21T01:31:29.470000 +CVE-2011-3893,0,0,d7b4e3d7aa59d7734f36e303668bb06e49418ae88e4b3c96594131e9286300d6,2024-11-21T01:31:29.593000 +CVE-2011-3894,0,0,b303484b11ee9e0a7c5dab3b05f0f98909b22a604ba3b46efb22ae6a442a2aac,2024-11-21T01:31:29.700000 +CVE-2011-3895,0,0,b374751ae05df9ac58c4d31872d9573ad76e50714ae13dc2f12fbeb1abf81d7c,2024-11-21T01:31:29.810000 +CVE-2011-3896,0,0,ff2b295ff4ca1e188795f5d5f1ebf9407cf1078f9232efc5325e921c1044bdae,2024-11-21T01:31:29.920000 +CVE-2011-3897,0,0,7317e1394ac0376abc0ff18cc9cdf74710e43a1f196758aebde5ee303ae38957,2024-11-21T01:31:30.023000 +CVE-2011-3898,0,0,9a96de61b851aa987ee40752d20fddbef69553807fa8645645a5ce7906eb9397,2024-11-21T01:31:30.140000 +CVE-2011-3900,0,0,4611c0a9b98c08f63dc90b211a6bc93c4786fcf05ff329cc701a20e6260c4106,2024-11-21T01:31:30.247000 CVE-2011-3901,0,0,a16cd074d4f6d0c9b84702044f2d3b3e57d9b9ac9c10125b76c4dc36580507d5,2020-02-25T14:45:33.297000 -CVE-2011-3903,0,1,b653ee6e998f57ba6abe11d4234b140a7fe96d1176da409d1a20172190b0c66b,2024-11-21T01:31:30.480000 -CVE-2011-3904,0,1,4c8d27d275533ee3edfd1b41838ccabc3f4ec2bff007c4082ae0992f71a159e6,2024-11-21T01:31:30.610000 -CVE-2011-3905,0,1,f84db9e3eac4d6717f089a4601e46b82f4c80c489e276c730c41c1dd3e966fd8,2024-11-21T01:31:30.717000 -CVE-2011-3906,0,1,b450d4ee2b72b9f73c2a95c373e8120f5f882aa0b7cbf3d4372d5a9c99e26af2,2024-11-21T01:31:30.830000 -CVE-2011-3907,0,1,948228ae1daa95b6dd874270129cf732c0333a18545f552feb2d103f3eb4a0cc,2024-11-21T01:31:30.940000 -CVE-2011-3908,0,1,1a2def7ef032575204cc4f691b4854e839553e227063412ea78785a128e683ed,2024-11-21T01:31:31.053000 -CVE-2011-3909,0,1,4170f9c643dc01094041d9cd4dd94a1c7734fdd26b7d797d5b1dfc0761c06725,2024-11-21T01:31:31.183000 -CVE-2011-3910,0,1,10db30745523c4a40884ddffa1fc8c47e64a9c32f07805af807c6945cfc93ce4,2024-11-21T01:31:31.313000 -CVE-2011-3911,0,1,b489d7bbbcf467b7b6a682a217b2fac163276f196e70cea665e41bbb0617781b,2024-11-21T01:31:31.430000 -CVE-2011-3912,0,1,6033fb48b23910579600117705e26a2d915e4e00907e235483b53616a15c8158,2024-11-21T01:31:31.553000 -CVE-2011-3913,0,1,907af85b2876f74b69b32a7dc1e0b72911324e73457b2882ff0105d2ee83c6ca,2024-11-21T01:31:31.663000 -CVE-2011-3914,0,1,d15322888bc9306d929c231065a68c85769325b7f57000ecbdc27ccc16193683,2024-11-21T01:31:31.783000 -CVE-2011-3915,0,1,509f5a8b693eb47624dd7942176eee14378ad89312cef27b147f3e7e55923235,2024-11-21T01:31:31.897000 -CVE-2011-3916,0,1,fe2c558ec72b72acbebb4022a336ec45366658965738179eb5547672772f4f61,2024-11-21T01:31:32.017000 -CVE-2011-3917,0,1,fa32a9cfad391cad664ac802f15b689414fc5ec6a28a55f33174a0c3808234f5,2024-11-21T01:31:32.127000 +CVE-2011-3903,0,0,b653ee6e998f57ba6abe11d4234b140a7fe96d1176da409d1a20172190b0c66b,2024-11-21T01:31:30.480000 +CVE-2011-3904,0,0,4c8d27d275533ee3edfd1b41838ccabc3f4ec2bff007c4082ae0992f71a159e6,2024-11-21T01:31:30.610000 +CVE-2011-3905,0,0,f84db9e3eac4d6717f089a4601e46b82f4c80c489e276c730c41c1dd3e966fd8,2024-11-21T01:31:30.717000 +CVE-2011-3906,0,0,b450d4ee2b72b9f73c2a95c373e8120f5f882aa0b7cbf3d4372d5a9c99e26af2,2024-11-21T01:31:30.830000 +CVE-2011-3907,0,0,948228ae1daa95b6dd874270129cf732c0333a18545f552feb2d103f3eb4a0cc,2024-11-21T01:31:30.940000 +CVE-2011-3908,0,0,1a2def7ef032575204cc4f691b4854e839553e227063412ea78785a128e683ed,2024-11-21T01:31:31.053000 +CVE-2011-3909,0,0,4170f9c643dc01094041d9cd4dd94a1c7734fdd26b7d797d5b1dfc0761c06725,2024-11-21T01:31:31.183000 +CVE-2011-3910,0,0,10db30745523c4a40884ddffa1fc8c47e64a9c32f07805af807c6945cfc93ce4,2024-11-21T01:31:31.313000 +CVE-2011-3911,0,0,b489d7bbbcf467b7b6a682a217b2fac163276f196e70cea665e41bbb0617781b,2024-11-21T01:31:31.430000 +CVE-2011-3912,0,0,6033fb48b23910579600117705e26a2d915e4e00907e235483b53616a15c8158,2024-11-21T01:31:31.553000 +CVE-2011-3913,0,0,907af85b2876f74b69b32a7dc1e0b72911324e73457b2882ff0105d2ee83c6ca,2024-11-21T01:31:31.663000 +CVE-2011-3914,0,0,d15322888bc9306d929c231065a68c85769325b7f57000ecbdc27ccc16193683,2024-11-21T01:31:31.783000 +CVE-2011-3915,0,0,509f5a8b693eb47624dd7942176eee14378ad89312cef27b147f3e7e55923235,2024-11-21T01:31:31.897000 +CVE-2011-3916,0,0,fe2c558ec72b72acbebb4022a336ec45366658965738179eb5547672772f4f61,2024-11-21T01:31:32.017000 +CVE-2011-3917,0,0,fa32a9cfad391cad664ac802f15b689414fc5ec6a28a55f33174a0c3808234f5,2024-11-21T01:31:32.127000 CVE-2011-3918,0,0,35fe01e0f61e81143dce798a8ad64227081a6ae1af86a3b91b9d411a5bdbc5b3,2023-11-07T02:08:58.230000 -CVE-2011-3919,0,1,d72e3e31f93b521136b032e2a36ab24d3f33347193b919835fa2ab729cf1a80d,2024-11-21T01:31:32.370000 -CVE-2011-3921,0,1,9f40aa6bef3bccdbf6adf4295c1470bf67fbf830103eb032d589a047c49441a4,2024-11-21T01:31:32.527000 -CVE-2011-3922,0,1,290961e27596be6605002386a8954cfdb594a1b77433ab1a0deb44d1d159521d,2024-11-21T01:31:32.653000 +CVE-2011-3919,0,0,d72e3e31f93b521136b032e2a36ab24d3f33347193b919835fa2ab729cf1a80d,2024-11-21T01:31:32.370000 +CVE-2011-3921,0,0,9f40aa6bef3bccdbf6adf4295c1470bf67fbf830103eb032d589a047c49441a4,2024-11-21T01:31:32.527000 +CVE-2011-3922,0,0,290961e27596be6605002386a8954cfdb594a1b77433ab1a0deb44d1d159521d,2024-11-21T01:31:32.653000 CVE-2011-3923,0,0,600ce298ff2bf854b7054587f2ef163884b35dff40a6bd108eb98228bd115dc5,2023-11-07T02:08:59.567000 -CVE-2011-3924,0,1,5c5823ea67f7bc53674a1e626de0905d6b6c38c34b56a96c139c5fe7b8dac847,2024-11-21T01:31:32.907000 -CVE-2011-3925,0,1,5fe11a4893fe2f34888a721c44db32788257104e2bce26eddac1863092569fba,2024-11-21T01:31:33.043000 -CVE-2011-3926,0,1,cfdd4d06b016b25c6475724de18c8c152acf59807ea5524fdf678e98adf1d219,2024-11-21T01:31:33.160000 -CVE-2011-3927,0,1,5ba6c74778ea4f12d4f78f0436d898000392a369867ae0c1f98eb01a043ec6ab,2024-11-21T01:31:33.290000 -CVE-2011-3928,0,1,b426bfdd59872bb34474ad67e91d7e1bc8da7952ed64261e35bc92c7fee13186,2024-11-21T01:31:33.407000 +CVE-2011-3924,0,0,5c5823ea67f7bc53674a1e626de0905d6b6c38c34b56a96c139c5fe7b8dac847,2024-11-21T01:31:32.907000 +CVE-2011-3925,0,0,5fe11a4893fe2f34888a721c44db32788257104e2bce26eddac1863092569fba,2024-11-21T01:31:33.043000 +CVE-2011-3926,0,0,cfdd4d06b016b25c6475724de18c8c152acf59807ea5524fdf678e98adf1d219,2024-11-21T01:31:33.160000 +CVE-2011-3927,0,0,5ba6c74778ea4f12d4f78f0436d898000392a369867ae0c1f98eb01a043ec6ab,2024-11-21T01:31:33.290000 +CVE-2011-3928,0,0,b426bfdd59872bb34474ad67e91d7e1bc8da7952ed64261e35bc92c7fee13186,2024-11-21T01:31:33.407000 CVE-2011-3929,0,0,dabfeb8e9cd6a4f485d0bc16f8db2e457857053946064282ab88375b7ebc3333,2023-11-07T02:09:01.777000 CVE-2011-3934,0,0,3d00b1d6d8db6c72401decf096e6c5eca3bb8342af93f8ebd4a924096f8d4a35,2023-11-07T02:09:02.233000 CVE-2011-3935,0,0,074dd10ad0dfd7cdbbdd6c8c05adee079c33739cd902d87774d8624f4637e306,2023-11-07T02:09:02.577000 @@ -50600,38 +50600,38 @@ CVE-2011-3969,0,0,c57438e7387cf9e0b9ee2d20ae84c03e49ea0572205beca6ab0d8f6d2a7b27 CVE-2011-3970,0,0,814b551b7e410a64733e8dd834b436f9f0639c22837277532f204f434c524f2e,2023-11-07T02:09:12.720000 CVE-2011-3971,0,0,b34b4bad6e8ad638e3272712741ea3ce0d44482b80a0a8fb6691f62289dca624,2023-11-07T02:09:13.107000 CVE-2011-3972,0,0,40739db55e84f489556937f425144dc520c0ba731b86a11d4ade6e3be636cdaf,2023-11-07T02:09:13.497000 -CVE-2011-3973,0,1,462d1ff7f6fdb03ecd6b3cf8c57c05197be9459d3790d99b767df2ffc4ccc815,2024-11-21T01:31:37.863000 -CVE-2011-3974,0,1,8a53f69b98251614814b22f9a4c98e662dcfa6f54597d10f16f8b769dcec6205,2024-11-21T01:31:38.013000 -CVE-2011-3975,0,1,2d84017d76dad3384af48574b0ba1b5ac352e135710e2eed591dfda1e8679431,2024-11-21T01:31:38.170000 -CVE-2011-3976,0,1,4c134cfa1744d2bbd6867132d2cf9795701528ca98c985bf53dbfa92342b4347,2024-11-21T01:31:38.330000 -CVE-2011-3977,0,1,926d21698767a0b653cced188042ad8cbc035fea0b94562e5ad39b85f6cda9f1,2024-11-21T01:31:38.477000 -CVE-2011-3978,0,1,8866cae9285bbf3d514d602b10800de283508879d555f60cc32e0db1d98829f8,2024-11-21T01:31:38.620000 -CVE-2011-3979,0,1,aebeaff40f0997ad088b46d686e54cc1ee3610924c5b2dcdba2904c5e67b9571,2024-11-21T01:31:38.770000 -CVE-2011-3980,0,1,1dca6cca9ae3bc0f63f5f6c4aa39860a3375009dd67a943c2ccfd2ffc5b89f35,2024-11-21T01:31:38.913000 -CVE-2011-3981,0,1,a1c7a3a52b1a4017f3b8724523628f52d7f21cdf810d8010e6e1d1f4dba3c071,2024-11-21T01:31:39.053000 -CVE-2011-3982,0,1,654cf0a8df2cbb36e7a9c5fb1855cdb6c81bc9834b69a0fee4b3faf67e12d052,2024-11-21T01:31:39.200000 -CVE-2011-3983,0,1,45f835b99bd118238fcf4b0b37571c99112951e5d841a88dff3d9af343cc28c9,2024-11-21T01:31:39.350000 -CVE-2011-3984,0,1,77c337b596b33e7d59aa831ef048fefe1708abf48263d7b749703c9a5689d657,2024-11-21T01:31:39.460000 -CVE-2011-3985,0,1,8179e65b168d60cc6fac18d8c3da15a957fbfbe18e2ce099959724e9b9a6d480,2024-11-21T01:31:39.580000 -CVE-2011-3986,0,1,32f39fe259fc44b8a6b5fb8b1c6997d38a82c6c6be3e38990ef0bd555caadc1a,2024-11-21T01:31:39.687000 -CVE-2011-3987,0,1,bd5104ba00311893931f7e8e9ac81ea1d383a9128bb997eb45b312967655d6e7,2024-11-21T01:31:39.800000 -CVE-2011-3988,0,1,a26b0fad34e71883d00a4f3f6b61cc5fb43b096cc59d7d251beb938e3acef07a,2024-11-21T01:31:39.927000 -CVE-2011-3989,0,1,df16bb1f68ca5351ab0b555190565572ccd98474fdc3ce4bdca8d2372899d0b7,2024-11-21T01:31:40.043000 -CVE-2011-3990,0,1,fe958589f292796e0927fdd07256987bbee2c64fa4b2ad66b5d9196ce2cc25b4,2024-11-21T01:31:40.153000 -CVE-2011-3991,0,1,7e98ced10febdb670d3e4bdf8c9bb218e9a3066a156a28adf73c988b907a890d,2024-11-21T01:31:40.267000 -CVE-2011-3992,0,1,4b81124c2d6e06b5304a6c9bc7af83764c21ad00d74fe4f03c6aedfc8deb4e45,2024-11-21T01:31:40.380000 -CVE-2011-3993,0,1,d98ab8384174389331c0ae471859406830058fc6a9a863b2a5c4b39aaa32c945,2024-11-21T01:31:40.507000 -CVE-2011-3994,0,1,ce2dfcf5d4502ec97a6d931f9de37b3f32326dd0298c2d144962dadb93ea6ce7,2024-11-21T01:31:40.630000 -CVE-2011-3995,0,1,6da81a194a2d83a27a95ebc610328cea88e81ca1790ce3281d15275b65036d05,2024-11-21T01:31:40.757000 -CVE-2011-3996,0,1,01b9f53faa885144635f00fe748b1be3ef712a79013f3d755be50400f5349ed2,2024-11-21T01:31:40.887000 -CVE-2011-3997,0,1,08e91b8f059a4d655f4c4c9cb2e3d015b8037f1afbacf957ee816e68c9edc4ec,2024-11-21T01:31:41.020000 -CVE-2011-3998,0,1,49f8516b03006ae5c7e7e354e59b03bd596fd1f6c717c559669b651ce0b0aafc,2024-11-21T01:31:41.130000 -CVE-2011-3999,0,1,ec562da7f657637b8baf6d808c85324281b5f1dfdb435e90cfe19e5e969801dc,2024-11-21T01:31:41.237000 -CVE-2011-4000,0,1,b4a63fe868cb1e19aed104eb753d0eb9757a65b0819c74724cfaeadde6b961da,2024-11-21T01:31:41.347000 -CVE-2011-4001,0,1,fc28a5a0bc6808fd207e1273e6933ac6e0d34dec7ca8cba034a97a200d37724c,2024-11-21T01:31:41.457000 -CVE-2011-4002,0,1,a28296c4a80f3fddca4a6cbb078536a0605f7f7256e8dc9d0b92b9a66b2b9357,2024-11-21T01:31:41.577000 -CVE-2011-4004,0,1,27a9698931e3604816f95fd5f8b0a9e31e70fba93a77081e2d46cd3a3ef692f7,2024-11-21T01:31:41.710000 -CVE-2011-4005,0,1,92d0fa8b3ad373bec8d755f96faa2f384601f106eacc7fd9a3d29ee16759971c,2024-11-21T01:31:41.820000 +CVE-2011-3973,0,0,462d1ff7f6fdb03ecd6b3cf8c57c05197be9459d3790d99b767df2ffc4ccc815,2024-11-21T01:31:37.863000 +CVE-2011-3974,0,0,8a53f69b98251614814b22f9a4c98e662dcfa6f54597d10f16f8b769dcec6205,2024-11-21T01:31:38.013000 +CVE-2011-3975,0,0,2d84017d76dad3384af48574b0ba1b5ac352e135710e2eed591dfda1e8679431,2024-11-21T01:31:38.170000 +CVE-2011-3976,0,0,4c134cfa1744d2bbd6867132d2cf9795701528ca98c985bf53dbfa92342b4347,2024-11-21T01:31:38.330000 +CVE-2011-3977,0,0,926d21698767a0b653cced188042ad8cbc035fea0b94562e5ad39b85f6cda9f1,2024-11-21T01:31:38.477000 +CVE-2011-3978,0,0,8866cae9285bbf3d514d602b10800de283508879d555f60cc32e0db1d98829f8,2024-11-21T01:31:38.620000 +CVE-2011-3979,0,0,aebeaff40f0997ad088b46d686e54cc1ee3610924c5b2dcdba2904c5e67b9571,2024-11-21T01:31:38.770000 +CVE-2011-3980,0,0,1dca6cca9ae3bc0f63f5f6c4aa39860a3375009dd67a943c2ccfd2ffc5b89f35,2024-11-21T01:31:38.913000 +CVE-2011-3981,0,0,a1c7a3a52b1a4017f3b8724523628f52d7f21cdf810d8010e6e1d1f4dba3c071,2024-11-21T01:31:39.053000 +CVE-2011-3982,0,0,654cf0a8df2cbb36e7a9c5fb1855cdb6c81bc9834b69a0fee4b3faf67e12d052,2024-11-21T01:31:39.200000 +CVE-2011-3983,0,0,45f835b99bd118238fcf4b0b37571c99112951e5d841a88dff3d9af343cc28c9,2024-11-21T01:31:39.350000 +CVE-2011-3984,0,0,77c337b596b33e7d59aa831ef048fefe1708abf48263d7b749703c9a5689d657,2024-11-21T01:31:39.460000 +CVE-2011-3985,0,0,8179e65b168d60cc6fac18d8c3da15a957fbfbe18e2ce099959724e9b9a6d480,2024-11-21T01:31:39.580000 +CVE-2011-3986,0,0,32f39fe259fc44b8a6b5fb8b1c6997d38a82c6c6be3e38990ef0bd555caadc1a,2024-11-21T01:31:39.687000 +CVE-2011-3987,0,0,bd5104ba00311893931f7e8e9ac81ea1d383a9128bb997eb45b312967655d6e7,2024-11-21T01:31:39.800000 +CVE-2011-3988,0,0,a26b0fad34e71883d00a4f3f6b61cc5fb43b096cc59d7d251beb938e3acef07a,2024-11-21T01:31:39.927000 +CVE-2011-3989,0,0,df16bb1f68ca5351ab0b555190565572ccd98474fdc3ce4bdca8d2372899d0b7,2024-11-21T01:31:40.043000 +CVE-2011-3990,0,0,fe958589f292796e0927fdd07256987bbee2c64fa4b2ad66b5d9196ce2cc25b4,2024-11-21T01:31:40.153000 +CVE-2011-3991,0,0,7e98ced10febdb670d3e4bdf8c9bb218e9a3066a156a28adf73c988b907a890d,2024-11-21T01:31:40.267000 +CVE-2011-3992,0,0,4b81124c2d6e06b5304a6c9bc7af83764c21ad00d74fe4f03c6aedfc8deb4e45,2024-11-21T01:31:40.380000 +CVE-2011-3993,0,0,d98ab8384174389331c0ae471859406830058fc6a9a863b2a5c4b39aaa32c945,2024-11-21T01:31:40.507000 +CVE-2011-3994,0,0,ce2dfcf5d4502ec97a6d931f9de37b3f32326dd0298c2d144962dadb93ea6ce7,2024-11-21T01:31:40.630000 +CVE-2011-3995,0,0,6da81a194a2d83a27a95ebc610328cea88e81ca1790ce3281d15275b65036d05,2024-11-21T01:31:40.757000 +CVE-2011-3996,0,0,01b9f53faa885144635f00fe748b1be3ef712a79013f3d755be50400f5349ed2,2024-11-21T01:31:40.887000 +CVE-2011-3997,0,0,08e91b8f059a4d655f4c4c9cb2e3d015b8037f1afbacf957ee816e68c9edc4ec,2024-11-21T01:31:41.020000 +CVE-2011-3998,0,0,49f8516b03006ae5c7e7e354e59b03bd596fd1f6c717c559669b651ce0b0aafc,2024-11-21T01:31:41.130000 +CVE-2011-3999,0,0,ec562da7f657637b8baf6d808c85324281b5f1dfdb435e90cfe19e5e969801dc,2024-11-21T01:31:41.237000 +CVE-2011-4000,0,0,b4a63fe868cb1e19aed104eb753d0eb9757a65b0819c74724cfaeadde6b961da,2024-11-21T01:31:41.347000 +CVE-2011-4001,0,0,fc28a5a0bc6808fd207e1273e6933ac6e0d34dec7ca8cba034a97a200d37724c,2024-11-21T01:31:41.457000 +CVE-2011-4002,0,0,a28296c4a80f3fddca4a6cbb078536a0605f7f7256e8dc9d0b92b9a66b2b9357,2024-11-21T01:31:41.577000 +CVE-2011-4004,0,0,27a9698931e3604816f95fd5f8b0a9e31e70fba93a77081e2d46cd3a3ef692f7,2024-11-21T01:31:41.710000 +CVE-2011-4005,0,0,92d0fa8b3ad373bec8d755f96faa2f384601f106eacc7fd9a3d29ee16759971c,2024-11-21T01:31:41.820000 CVE-2011-4006,0,0,ba29250d224ce7ab7261bf859df48cbcb0ac005465c4f4508a349a8e991cbd4f,2023-08-15T14:41:35.310000 CVE-2011-4007,0,0,9cbce0a22e02b2eccb642f4f17f2104e4906a4469b580e0718c315ec25beb41a,2012-10-30T03:57:18.097000 CVE-2011-4012,0,0,fe4389eef78f62b0900a7e3eceb8f8d66dd6441e6691484c276acd568954510f,2012-10-30T03:57:18.250000 @@ -50641,52 +50641,52 @@ CVE-2011-4016,0,0,c2ac915c04b34192a3dcc826e26900542b79ccff808a28609022d3944e0527 CVE-2011-4019,0,0,f1711e39a6b2b585af0987fd4bd4c0d3535c0156bf8cd9732a0ef6a8e38ea641,2012-05-30T04:00:00 CVE-2011-4022,0,0,3f2c595819e43ccd6fdcc3fe416e768b224ec3621b547f6ca188ab7424e521ae,2012-05-11T04:00:00 CVE-2011-4023,0,0,af77ee92f8b93320c6f6c9ec76d5154a5440c5fe2d155a559cb0ed86ba62d27f,2018-10-30T16:26:48.327000 -CVE-2011-4024,0,1,5a79e4145dee868345a574b70e8254a2567918a313d626db066615db306dc138,2024-11-21T01:31:42.933000 -CVE-2011-4026,0,1,5cc14bdc908b5f742e21c29f8778676034726f911d94124ff39ec21db1158ef5,2024-11-21T01:31:43.087000 +CVE-2011-4024,0,0,5a79e4145dee868345a574b70e8254a2567918a313d626db066615db306dc138,2024-11-21T01:31:42.933000 +CVE-2011-4026,0,0,5cc14bdc908b5f742e21c29f8778676034726f911d94124ff39ec21db1158ef5,2024-11-21T01:31:43.087000 CVE-2011-4028,0,0,f8faca603c41eb95b2e8ca7ea928d92044db914ee99eb6c333f387dacdc0c5a3,2020-08-24T17:14:32.020000 CVE-2011-4029,0,0,2763640934288b247a5d641fefce8e7eddd58f842e325e7ce35ddb631a618e04,2020-08-24T17:14:32.020000 -CVE-2011-4030,0,1,2eb1b12ddaec87b14634df0810c875f2e085195151da0fd479eb48c5fb24febd,2024-11-21T01:31:43.533000 +CVE-2011-4030,0,0,2eb1b12ddaec87b14634df0810c875f2e085195151da0fd479eb48c5fb24febd,2024-11-21T01:31:43.533000 CVE-2011-4031,0,0,685e43dd5980109fcfa7559d42b57b9ca64c8fdb64beb2e302eca8c32cddc8c3,2023-11-07T02:09:14.333000 -CVE-2011-4033,0,1,e212a2bf511029e1ceaf2ca9be328c7b2a30424adb485a7f7bca7378155abaa6,2024-11-21T01:31:43.830000 -CVE-2011-4034,0,1,e3a27e6cb941f0c0d6609af0040b784c8ebc31bc9a1f62a6e9640dfe6f50f4ba,2024-11-21T01:31:43.943000 -CVE-2011-4035,0,1,49aab2806227bc28c9178ecf4708b11059e8b2d0a382c4017506874ffecd02f6,2024-11-21T01:31:44.060000 -CVE-2011-4036,0,1,6a7b888ee1204cf171e4cc0f98ffe34b96ea9b7a66fee89216c1b96f15853699,2024-11-21T01:31:44.183000 -CVE-2011-4037,0,1,fbbddfe6cc8b5c4f1da9ce8c0eaf8986cea3b73e5b9863ccec14bbc3dacd076d,2024-11-21T01:31:44.290000 +CVE-2011-4033,0,0,e212a2bf511029e1ceaf2ca9be328c7b2a30424adb485a7f7bca7378155abaa6,2024-11-21T01:31:43.830000 +CVE-2011-4034,0,0,e3a27e6cb941f0c0d6609af0040b784c8ebc31bc9a1f62a6e9640dfe6f50f4ba,2024-11-21T01:31:43.943000 +CVE-2011-4035,0,0,49aab2806227bc28c9178ecf4708b11059e8b2d0a382c4017506874ffecd02f6,2024-11-21T01:31:44.060000 +CVE-2011-4036,0,0,6a7b888ee1204cf171e4cc0f98ffe34b96ea9b7a66fee89216c1b96f15853699,2024-11-21T01:31:44.183000 +CVE-2011-4037,0,0,fbbddfe6cc8b5c4f1da9ce8c0eaf8986cea3b73e5b9863ccec14bbc3dacd076d,2024-11-21T01:31:44.290000 CVE-2011-4038,0,0,f83d96c3a49dc5ca547256abb66236de6ae3c376bd8499d73ceac2b75405628f,2012-02-14T05:00:00 CVE-2011-4039,0,0,e0a39a2619fcce2a0a3e39e14459671b9cc023b61b7a199f193f85b72a02b7b2,2012-02-14T05:00:00 -CVE-2011-4040,0,1,c545b40b64aeda4b2e409b97c1ec7e369c360248ed65695c669efa2958869d22,2024-11-21T01:31:44.633000 +CVE-2011-4040,0,0,c545b40b64aeda4b2e409b97c1ec7e369c360248ed65695c669efa2958869d22,2024-11-21T01:31:44.633000 CVE-2011-4041,0,0,bd6a587fd776a116aeed0c782669df9b6ed19ec533b66bdc8d387f9552dc42fe,2012-12-11T04:27:10.967000 CVE-2011-4042,0,0,f1a4ddd86841357f9bee67cae36474d509f549c95b14c0fb5396225761033522,2012-04-03T04:00:00 CVE-2011-4043,0,0,8f2805acafa0026c783709d8bd3c160e6f7838bb4464dab4d56e08f7ff106b38,2012-04-03T04:00:00 CVE-2011-4044,0,0,a0a3c79c00c0703e32d6d444f593f5e6721b8fa0e81912d8d2a1f4d3710dda3f,2012-04-03T04:00:00 CVE-2011-4045,0,0,2f8e407aba02b25e913c6ba0df5d7ad63bfcb4d26c7250653b0a5f37a4ec4ba4,2012-04-03T04:00:00 -CVE-2011-4046,0,1,4adc6ac82cd1c08240943a0a9eea15b6b64b334e69a2542e3ad74fc4047fd025,2024-11-21T01:31:45.270000 -CVE-2011-4047,0,1,b073c6f8e291e6bf99a7cba8abd358701f023ac44c11edce9a71d270a1d9f318,2024-11-21T01:31:45.373000 -CVE-2011-4048,0,1,cbe9fe8099ab810a1d5e3781a1553e1a2c2495a40a028bbe6afa0f5171ccb385,2024-11-21T01:31:45.480000 -CVE-2011-4050,0,1,00540ba1b6d007854f2e16dfc64b82c40305df94f0ddb40834659361a09bfdd6,2024-11-21T01:31:45.593000 -CVE-2011-4051,0,1,8f7a000f5a4ba24bcb09964e6bb433b297a1b28e307fb67604022a1d812b59f8,2024-11-21T01:31:45.700000 -CVE-2011-4052,0,1,0ef1185da797707fd9bd2832eb02f02fc9a14ddc79ca80d31c0d7d2aea02a4ac,2024-11-21T01:31:45.807000 -CVE-2011-4053,0,1,804d15ed0c917d19c0eeaad5bd984fa49c94486f3dbc69c0959b9bf75ca4a413,2024-11-21T01:31:45.913000 -CVE-2011-4054,0,1,c7502cdbc186e34622d73a3d64b436725b39243a47867ddaa49cb983f1b13e60,2024-11-21T01:31:46.047000 -CVE-2011-4055,0,1,eea319cf1213b6c022cf4f7a016d3bdbd3bbb5a4a7d544f7c4c8f52fb13c5e45,2024-11-21T01:31:46.167000 -CVE-2011-4056,0,1,5c8e78d40ba65f5447df6cf605384a82b2c908a16baca90d3593db4f2246efc7,2024-11-21T01:31:46.283000 -CVE-2011-4057,0,1,32e74bd02bd175b7e4878f28922917e2e0f0b83f0dfb1112f4e5070e30db794d,2024-11-21T01:31:46.393000 -CVE-2011-4060,0,1,194ea4133ac62ada92fc1c570363366f926f6afacbe37ce9f340d8de7a575c89,2024-11-21T01:31:46.493000 -CVE-2011-4061,0,1,c3a00b07f1efac88279a9cfbe2f503c81c27df834c6af38301b5f3b35104bb58,2024-11-21T01:31:46.637000 -CVE-2011-4062,0,1,1bf3a80d60c563accd1b51b6f856a642a85e1b355667b171e33559e99c372ab3,2024-11-21T01:31:46.777000 -CVE-2011-4063,0,1,cb2d4a61d24092a7979fe0491afe958e0820e7a7d6256f90bb3ee40dc998b2ac,2024-11-21T01:31:46.887000 -CVE-2011-4064,0,1,0de297cac020e7fb33fd9c45704688b76e1d6d81541d140fe71fd350a896de67,2024-11-21T01:31:47.027000 -CVE-2011-4066,0,1,0a78f51ca6b68824fb74077068f3440734db51768a1c2c6dc4a989b653c8c516,2024-11-21T01:31:47.163000 +CVE-2011-4046,0,0,4adc6ac82cd1c08240943a0a9eea15b6b64b334e69a2542e3ad74fc4047fd025,2024-11-21T01:31:45.270000 +CVE-2011-4047,0,0,b073c6f8e291e6bf99a7cba8abd358701f023ac44c11edce9a71d270a1d9f318,2024-11-21T01:31:45.373000 +CVE-2011-4048,0,0,cbe9fe8099ab810a1d5e3781a1553e1a2c2495a40a028bbe6afa0f5171ccb385,2024-11-21T01:31:45.480000 +CVE-2011-4050,0,0,00540ba1b6d007854f2e16dfc64b82c40305df94f0ddb40834659361a09bfdd6,2024-11-21T01:31:45.593000 +CVE-2011-4051,0,0,8f7a000f5a4ba24bcb09964e6bb433b297a1b28e307fb67604022a1d812b59f8,2024-11-21T01:31:45.700000 +CVE-2011-4052,0,0,0ef1185da797707fd9bd2832eb02f02fc9a14ddc79ca80d31c0d7d2aea02a4ac,2024-11-21T01:31:45.807000 +CVE-2011-4053,0,0,804d15ed0c917d19c0eeaad5bd984fa49c94486f3dbc69c0959b9bf75ca4a413,2024-11-21T01:31:45.913000 +CVE-2011-4054,0,0,c7502cdbc186e34622d73a3d64b436725b39243a47867ddaa49cb983f1b13e60,2024-11-21T01:31:46.047000 +CVE-2011-4055,0,0,eea319cf1213b6c022cf4f7a016d3bdbd3bbb5a4a7d544f7c4c8f52fb13c5e45,2024-11-21T01:31:46.167000 +CVE-2011-4056,0,0,5c8e78d40ba65f5447df6cf605384a82b2c908a16baca90d3593db4f2246efc7,2024-11-21T01:31:46.283000 +CVE-2011-4057,0,0,32e74bd02bd175b7e4878f28922917e2e0f0b83f0dfb1112f4e5070e30db794d,2024-11-21T01:31:46.393000 +CVE-2011-4060,0,0,194ea4133ac62ada92fc1c570363366f926f6afacbe37ce9f340d8de7a575c89,2024-11-21T01:31:46.493000 +CVE-2011-4061,0,0,c3a00b07f1efac88279a9cfbe2f503c81c27df834c6af38301b5f3b35104bb58,2024-11-21T01:31:46.637000 +CVE-2011-4062,0,0,1bf3a80d60c563accd1b51b6f856a642a85e1b355667b171e33559e99c372ab3,2024-11-21T01:31:46.777000 +CVE-2011-4063,0,0,cb2d4a61d24092a7979fe0491afe958e0820e7a7d6256f90bb3ee40dc998b2ac,2024-11-21T01:31:46.887000 +CVE-2011-4064,0,0,0de297cac020e7fb33fd9c45704688b76e1d6d81541d140fe71fd350a896de67,2024-11-21T01:31:47.027000 +CVE-2011-4066,0,0,0a78f51ca6b68824fb74077068f3440734db51768a1c2c6dc4a989b653c8c516,2024-11-21T01:31:47.163000 CVE-2011-4068,0,0,eaeacbb642d2e2c6e95fa1cbf50976949649520dc23284ce1ff08efd85fb4aeb,2018-02-21T14:53:16.230000 CVE-2011-4069,0,0,e78eb3b124dd82aeb57eb9bdc67019132d980f9ec9db570cc857cd5be6545db5,2018-02-21T14:53:31.450000 CVE-2011-4072,0,0,817f4332b01c32b560e2f9fd01255523fb3e2bb5cae5d151cec877d009768c56,2023-11-07T02:09:14.630000 -CVE-2011-4073,0,1,28b7c6c7c780e10c2c98534aa3d20b879962ba8cf0956593aadd84b562852fa3,2024-11-21T01:31:47.587000 -CVE-2011-4074,0,1,9a8113e8e90a10cfa77ffb1535e99ed354be6b0fc750543cb83ae1af663e6787,2024-11-21T01:31:47.743000 -CVE-2011-4075,0,1,17b120931c127d57df3de6c48446e0de7cf7a6cc18a74c973798e38343a40d4c,2024-11-21T01:31:47.867000 +CVE-2011-4073,0,0,28b7c6c7c780e10c2c98534aa3d20b879962ba8cf0956593aadd84b562852fa3,2024-11-21T01:31:47.587000 +CVE-2011-4074,0,0,9a8113e8e90a10cfa77ffb1535e99ed354be6b0fc750543cb83ae1af663e6787,2024-11-21T01:31:47.743000 +CVE-2011-4075,0,0,17b120931c127d57df3de6c48446e0de7cf7a6cc18a74c973798e38343a40d4c,2024-11-21T01:31:47.867000 CVE-2011-4076,0,0,8a1adf6cdb4806ecf42df2e02c5ab8703e37f9449bf1f9778f88b60c98284e1a,2019-12-05T17:33:41.487000 -CVE-2011-4077,0,1,e5b7f73de5fedbc3679250dd256d83ab22a92f246d54aae91892784a2ccccaac,2024-11-21T01:31:48.110000 -CVE-2011-4078,0,1,551f0a8a97399b2b424ee7fc20fa8777edc47049252b57972e5def4d0067c6b1,2024-11-21T01:31:48.233000 -CVE-2011-4079,0,1,ca09a52988ed2809b51e58046282eaebe285d961dab78a2f1e78b1154c918b1a,2024-11-21T01:31:48.347000 +CVE-2011-4077,0,0,e5b7f73de5fedbc3679250dd256d83ab22a92f246d54aae91892784a2ccccaac,2024-11-21T01:31:48.110000 +CVE-2011-4078,0,0,551f0a8a97399b2b424ee7fc20fa8777edc47049252b57972e5def4d0067c6b1,2024-11-21T01:31:48.233000 +CVE-2011-4079,0,0,ca09a52988ed2809b51e58046282eaebe285d961dab78a2f1e78b1154c918b1a,2024-11-21T01:31:48.347000 CVE-2011-4080,0,0,e0a581e2a1df2e7550ced0a60e7eb9c78b82d2b6cb98587480b0f6e6f0e86740,2023-02-13T04:32:42.700000 CVE-2011-4081,0,0,712715d40ae48e5d5655f2caa368478e521699d8eda5a247fd7b5d1c2b33a17c,2023-02-13T04:32:43.337000 CVE-2011-4082,0,0,c65c08fde90ad4775d9106f6ccaa3cd0b58eed128c5bb7412153bbabcd8d26ec,2020-08-18T15:05:57.813000 @@ -50703,82 +50703,82 @@ CVE-2011-4092,0,0,c3291c02ce185290bf6f7287011074841b3001887a32626e433add6771fc8c CVE-2011-4093,0,0,656d52292aeffb4427db87d580947defe4a89a83ffc1ac57f495ba080dc87b33,2023-02-13T01:21:18.430000 CVE-2011-4094,0,0,318736248b5fe1c7f76bc3ebaaaaac78c0451da955feb3bc1e04b297f879092f,2020-01-23T21:34:23.680000 CVE-2011-4095,0,0,0b723fe01c06895bdd6dbb93c7e0a07d9b8c5817847335c5821aeb5c447c722f,2020-01-23T18:49:49.867000 -CVE-2011-4096,0,1,19747fc97d5f3c99eeed30fd2cc8a0ebe0b371fa911c5426a180e1fd2b1c3f45,2024-11-21T01:31:50.260000 +CVE-2011-4096,0,0,19747fc97d5f3c99eeed30fd2cc8a0ebe0b371fa911c5426a180e1fd2b1c3f45,2024-11-21T01:31:50.260000 CVE-2011-4097,0,0,6ee31e50e40f02c77c20918f6a7361116b5d45097b39f185d18e4883d90a0dae,2023-02-13T01:21:27.080000 CVE-2011-4098,0,0,826364bc60dac0fe5514feb879ef1a37b0b7c57d3f1bb267b98b8694c6f68f43,2023-11-07T02:09:15.210000 CVE-2011-4099,0,0,cdaa2cda792228403374498c3eb6d9078e562a9d6c3a13da70a6a865756362a7,2014-02-10T15:09:31.333000 -CVE-2011-4100,0,1,65a9ed91ff1c89c17994ed8bbaebfd226358c15675e7ec27ee0e2d915315aca9,2024-11-21T01:31:50.750000 -CVE-2011-4101,0,1,9d3b48d9894eaf4665f10c956ed9dbdd6cd7001b7259c2732948d2cb912a6da2,2024-11-21T01:31:50.867000 -CVE-2011-4102,0,1,22f3b999410b411c906c0d750fc892d29ae417afd7c5f1911560b572d6341491,2024-11-21T01:31:50.983000 +CVE-2011-4100,0,0,65a9ed91ff1c89c17994ed8bbaebfd226358c15675e7ec27ee0e2d915315aca9,2024-11-21T01:31:50.750000 +CVE-2011-4101,0,0,9d3b48d9894eaf4665f10c956ed9dbdd6cd7001b7259c2732948d2cb912a6da2,2024-11-21T01:31:50.867000 +CVE-2011-4102,0,0,22f3b999410b411c906c0d750fc892d29ae417afd7c5f1911560b572d6341491,2024-11-21T01:31:50.983000 CVE-2011-4103,0,0,a7cc0d2bcb36b2274b5e1d8568ebbc612f2d7bb2b59c0a9378e399e3f9fe533b,2014-12-18T15:35:53.143000 CVE-2011-4104,0,0,74e51ce64288936907413c7b45614ce42b087482c1b4261e3f804b8d61d21e0e,2023-11-07T02:09:15.320000 CVE-2011-4105,0,0,0e0bf6d54d19d1c5f21d45fac17a09311320ffcd4019d5948bed0f91d8ae6e1d,2014-03-08T04:51:25.447000 CVE-2011-4106,0,0,1cc7416f6af2d28246a02fa7f33be29baf4d58217f408eedb03b9ee3c1587441,2013-10-28T15:15:37.903000 -CVE-2011-4107,0,1,89fa02897264de019ea6d5663816292f731987ff972d31cf3b847d9f0c2ba133,2024-11-21T01:31:51.620000 -CVE-2011-4108,0,1,e5dc2d5b7ebba660041f8d7cb198d22f9452ac5234e987033754380992c26190,2024-11-21T01:31:51.760000 -CVE-2011-4109,0,1,6a798a244d496d720d937313561d180564fb9eada12febfcee5a73cc921a546a,2024-11-21T01:31:51.910000 -CVE-2011-4110,0,1,9b3f9c12463c3b4232c91d2f8e66b8737408dd122bc46d9c61ff97e26d20577b,2024-11-21T01:31:52.040000 +CVE-2011-4107,0,0,89fa02897264de019ea6d5663816292f731987ff972d31cf3b847d9f0c2ba133,2024-11-21T01:31:51.620000 +CVE-2011-4108,0,0,e5dc2d5b7ebba660041f8d7cb198d22f9452ac5234e987033754380992c26190,2024-11-21T01:31:51.760000 +CVE-2011-4109,0,0,6a798a244d496d720d937313561d180564fb9eada12febfcee5a73cc921a546a,2024-11-21T01:31:51.910000 +CVE-2011-4110,0,0,9b3f9c12463c3b4232c91d2f8e66b8737408dd122bc46d9c61ff97e26d20577b,2024-11-21T01:31:52.040000 CVE-2011-4111,0,0,ddcbebbea989e604044e93377c662fc3a6cb16785bde3d1335a201db70491e06,2023-02-13T04:32:44.790000 CVE-2011-4112,0,0,9a3ab31f36d9c325408638e607601ac0535600e5d7b9553dc9246df5dc1e937b,2023-02-13T01:21:27.810000 CVE-2011-4113,0,0,994985891a7470a399c8f4711c2070caf0e34801e3f3b885dc6f75f4145892dd,2017-08-29T01:30:27.583000 -CVE-2011-4114,0,1,773514ceddb53af527f5f9f190f349347bcca041f81f2ed00451c66dd7c76d40,2024-11-21T01:31:52.540000 +CVE-2011-4114,0,0,773514ceddb53af527f5f9f190f349347bcca041f81f2ed00451c66dd7c76d40,2024-11-21T01:31:52.540000 CVE-2011-4115,0,0,b4a2af7f1292bfc93f4ecff0391b56eea0659da36275b4830fbd4d7449cd920b,2020-02-05T22:18:36.477000 CVE-2011-4116,0,0,7a4e1b03e8941ed7bced60210f4d40951f2e9bf6d7130743b2dc7589e6832ef6,2020-02-05T22:10:26.290000 CVE-2011-4117,0,0,e058e4e562090b065a7a56e360dc6f452bacf1f04e19d9a6df10cd235203ffba,2020-02-05T22:05:54.730000 -CVE-2011-4118,0,1,6d8fa3eaf270dc2db2e57dfad6032a5ef244f668e46159028c1c8756d642db07,2024-11-21T01:31:53 +CVE-2011-4118,0,0,6d8fa3eaf270dc2db2e57dfad6032a5ef244f668e46159028c1c8756d642db07,2024-11-21T01:31:53 CVE-2011-4119,0,0,e0e2bc6b325eefe64d0dfe7834e27be25c5afdb3a715d8b3c67037552c7061fc,2021-10-29T01:14:12.953000 CVE-2011-4120,0,0,76a8f5fae2da300b3b12d0342fb494215b8ced4a7b20b30ae6fe59ef882dd763,2020-08-18T15:05:57.937000 CVE-2011-4121,0,0,ce6769b7b7b6a911d7097cd66116d59e3926fffa866810415ef04cdbaa5db88b,2020-04-30T14:44:12.197000 -CVE-2011-4122,0,1,1a55212f69dfdbece4e5622a054a0e4591da1dfcd0d7e63103032d8fc32ed8d6,2024-11-21T01:31:53.480000 +CVE-2011-4122,0,0,1a55212f69dfdbece4e5622a054a0e4591da1dfcd0d7e63103032d8fc32ed8d6,2024-11-21T01:31:53.480000 CVE-2011-4123,0,0,15fd219b07b2e120018b70ed513792f1cd0b1bd21bfcc35d3888bf132ad1a925,2023-11-07T02:09:15.623000 CVE-2011-4124,0,0,3e904610b67ea2d619e485ef2595456c8c95df00cb3e8dc78abc318b3409a1df,2021-11-01T15:41:57.657000 CVE-2011-4125,0,0,8e96731691a7509d63ed56c96f1ffcfde0f52433196cf49b78b2d88e88cc82da,2021-11-01T15:47:48.267000 CVE-2011-4126,0,0,77d955ecdca77d00e9d27f5e99cb94790ea876f0ae9351da6e81108d6183df5e,2021-11-01T15:51:20.380000 CVE-2011-4127,0,0,b2d3e7348d53685296994bd4b054caf3ee9a7b0d56be345a57515ff118274e07,2023-02-13T01:21:31.223000 -CVE-2011-4128,0,1,dc159f0ba2a844889cb9faae5c82f217b125b3954b66596acf5e9f0043293104,2024-11-21T01:31:54.120000 +CVE-2011-4128,0,0,dc159f0ba2a844889cb9faae5c82f217b125b3954b66596acf5e9f0043293104,2024-11-21T01:31:54.120000 CVE-2011-4129,0,0,d992b2732e9434fc8d83641a771490211e7507196bd92d7aebe1dda1617a4383,2017-01-05T14:20:15.913000 -CVE-2011-4130,0,1,ff8f30b9b35ddf948cabf261b64c718ffd84498b7530eedd5b303dce9c444c9d,2024-11-21T01:31:54.350000 +CVE-2011-4130,0,0,ff8f30b9b35ddf948cabf261b64c718ffd84498b7530eedd5b303dce9c444c9d,2024-11-21T01:31:54.350000 CVE-2011-4131,0,0,904370ead0b56ad4fea0a2d5e5ed5bcf58459b8b314547d4c4343d2e63b2d0ab,2023-02-13T04:32:45.313000 -CVE-2011-4132,0,1,ac27b798adc70e6d51f3233345ee8363cd57d5c0a05e9a419779c6f513464181,2024-11-21T01:31:54.557000 +CVE-2011-4132,0,0,ac27b798adc70e6d51f3233345ee8363cd57d5c0a05e9a419779c6f513464181,2024-11-21T01:31:54.557000 CVE-2011-4133,0,0,997c4dd2525d11e587d51e0e39ca3ce953f0acda5b6b5e43e9afb06a67825e55,2023-11-07T02:09:15.990000 -CVE-2011-4134,0,1,2532ab88bc647e47a7facc00ff17eeaa0149af665b80d0645e4c634c4e77bd68,2024-11-21T01:31:54.767000 -CVE-2011-4135,0,1,d13ccf8a73277dfd0bcc8f44056631d7852e892ec7390f75f2c4ee956342ec30,2024-11-21T01:31:54.890000 -CVE-2011-4136,0,1,7f36bb3c1fa23af30d40459cf79ad727482ad61f74f1c4935e7e4add6638cca3,2024-11-21T01:31:55.020000 -CVE-2011-4137,0,1,47eadf2d623e28b2a34806f2e8192850deecb4fee2830fe4ac8e24f2deec6b46,2024-11-21T01:31:55.160000 -CVE-2011-4138,0,1,8c620712bba7bc0ef30c6d5fe0245fa5ab0d7ca6e6de8ed017935f78869bcba1,2024-11-21T01:31:55.303000 -CVE-2011-4139,0,1,00ac8eac99e4aab47113b1f3d3a56f0c6399966c48d0f4cbbcd369e0c5a220d1,2024-11-21T01:31:55.443000 -CVE-2011-4140,0,1,9420dbe35593be15019c934ea27a01c206d0650467bf30ec6470b52ee8d07c8f,2024-11-21T01:31:55.587000 -CVE-2011-4141,0,1,6faa4d55ff297d976aed385b9bb4d7572591e9e91e299748d007af5249d47744,2024-11-21T01:31:55.730000 -CVE-2011-4142,0,1,3deade7847401b7a234b5db7f7bcf9d509bb71373d55fb8ae0fdd323b60669f3,2024-11-21T01:31:55.863000 -CVE-2011-4143,0,1,7efb04eebccf21fc388894ed89f0e5ef4ccb38e1053abee1a122fef0310be69e,2024-11-21T01:31:55.990000 -CVE-2011-4144,0,1,0f718e8497d626fdf555da3a64f1231c57fb9cb48e111a0d7cc94cedeb043cb8,2024-11-21T01:31:56.113000 +CVE-2011-4134,0,0,2532ab88bc647e47a7facc00ff17eeaa0149af665b80d0645e4c634c4e77bd68,2024-11-21T01:31:54.767000 +CVE-2011-4135,0,0,d13ccf8a73277dfd0bcc8f44056631d7852e892ec7390f75f2c4ee956342ec30,2024-11-21T01:31:54.890000 +CVE-2011-4136,0,0,7f36bb3c1fa23af30d40459cf79ad727482ad61f74f1c4935e7e4add6638cca3,2024-11-21T01:31:55.020000 +CVE-2011-4137,0,0,47eadf2d623e28b2a34806f2e8192850deecb4fee2830fe4ac8e24f2deec6b46,2024-11-21T01:31:55.160000 +CVE-2011-4138,0,0,8c620712bba7bc0ef30c6d5fe0245fa5ab0d7ca6e6de8ed017935f78869bcba1,2024-11-21T01:31:55.303000 +CVE-2011-4139,0,0,00ac8eac99e4aab47113b1f3d3a56f0c6399966c48d0f4cbbcd369e0c5a220d1,2024-11-21T01:31:55.443000 +CVE-2011-4140,0,0,9420dbe35593be15019c934ea27a01c206d0650467bf30ec6470b52ee8d07c8f,2024-11-21T01:31:55.587000 +CVE-2011-4141,0,0,6faa4d55ff297d976aed385b9bb4d7572591e9e91e299748d007af5249d47744,2024-11-21T01:31:55.730000 +CVE-2011-4142,0,0,3deade7847401b7a234b5db7f7bcf9d509bb71373d55fb8ae0fdd323b60669f3,2024-11-21T01:31:55.863000 +CVE-2011-4143,0,0,7efb04eebccf21fc388894ed89f0e5ef4ccb38e1053abee1a122fef0310be69e,2024-11-21T01:31:55.990000 +CVE-2011-4144,0,0,0f718e8497d626fdf555da3a64f1231c57fb9cb48e111a0d7cc94cedeb043cb8,2024-11-21T01:31:56.113000 CVE-2011-4145,0,0,83551f963d38a6516df3d1bb8fad7d61db4ce871d29bf6c1eaae0ac04fd44173,2023-11-07T02:09:16.137000 CVE-2011-4146,0,0,294949494695faa8105a55d926a56d9e363b3148ca1219c4b205b9033ea1d32c,2023-11-07T02:09:16.170000 CVE-2011-4147,0,0,562b5561c9bc0c5ee5d01792282db68ee3f1565d2a6bcc4aa28202f8b3ba1c86,2023-11-07T02:09:16.197000 CVE-2011-4148,0,0,20c13d24b022cf2834e6edb69ed2ed4772e37bf19e60975fc7190d2db66564f8,2023-11-07T02:09:16.227000 CVE-2011-4149,0,0,886eab1f2eac642d34e10c8b38d79aa7e1f18d55d5997e688cd4bba1b9e03b53,2023-11-07T02:09:16.260000 CVE-2011-4150,0,0,63abf2de503376f4482a6c15f4699db4fe183b1a366353c46b905d7841a2d28e,2023-11-07T02:09:16.283000 -CVE-2011-4151,0,1,50d427f35049a831cce51067635a24c2702e0429603344ae17bd4890651525eb,2024-11-21T01:31:56.340000 -CVE-2011-4153,0,1,5d69a690e1b40197a6a0e1f32f621a6779c5ea04d0c735bf5904dff560fe7398,2024-11-21T01:31:56.503000 -CVE-2011-4155,0,1,f92c15b0ba47c1090cd340b194aa8ede1406a4d3ca9a863f77c7f23b1f6c4606,2024-11-21T01:31:56.670000 -CVE-2011-4156,0,1,faf7299ae045d1bee2d1439890a7c4149ad4d603972960b2b3cdc0f1927cc50e,2024-11-21T01:31:56.780000 -CVE-2011-4157,0,1,3de5d18178a202859f1fc7b26f71e38257b0ee478e942f135e4ef2191f3b39f1,2024-11-21T01:31:56.887000 -CVE-2011-4158,0,1,4876ede8b8fa31f58eddacd66598d8cbeb84404a5324454cdc280df8b08ee1a6,2024-11-21T01:31:57 -CVE-2011-4159,0,1,c3c97dad42d86f426b29e22eb3097c64094ad3e8f961ea0fdfe92f16e4cda0ff,2024-11-21T01:31:57.103000 -CVE-2011-4160,0,1,ffa3ac9343cc7e001e986ccb3d6f1a100559a5460d6f19d375e5d0aae19529bc,2024-11-21T01:31:57.210000 -CVE-2011-4161,0,1,331acb85c20dd0250c2149a5eb9c38b33c26954a774ee4504de9c29e4810b1b0,2024-11-21T01:31:57.317000 -CVE-2011-4162,0,1,f52385c8ffd78e736edcad8f26879a5c25b34dc957785d869348236563304cba,2024-11-21T01:31:57.490000 -CVE-2011-4163,0,1,93989ee396083651ace52fa9af187c54b80eb4bc040a11cc834dc285f06d0c7b,2024-11-21T01:31:57.607000 -CVE-2011-4164,0,1,bd326027e6d2fa659002c9873e89b9ab4744c45a0b735a5ffabd5a48e7f634d2,2024-11-21T01:31:57.710000 -CVE-2011-4165,0,1,4a3e56bdf9f2024df24aa664e24616613fcb88055cf12ba09fc440c6b757876d,2024-11-21T01:31:57.810000 -CVE-2011-4166,0,1,1798ed5803575c5fa4c28b1f2984d494558337d14c97e8e2ea99ff9aff36ea4e,2024-11-21T01:31:57.910000 -CVE-2011-4167,0,1,68118ef8cd7d3c00e3611b225e0dc46dcdc944bf95443bfd58c1dd5f02efc19f,2024-11-21T01:31:58.013000 -CVE-2011-4168,0,1,c755294e29b1193e2a1c7ac4e21537c7f44297cc820e3b115c05e2166ce0b95b,2024-11-21T01:31:58.113000 -CVE-2011-4169,0,1,70d0ea49d53488353b5ac04a228b655e136048a859a03f482ef74f41c11a5a46,2024-11-21T01:31:58.210000 -CVE-2011-4170,0,1,ab7823d2c22cdad729d51df8e29f0f025a9dfcfb05f46cc7e60dad26adb85aed,2024-11-21T01:31:58.313000 -CVE-2011-4171,0,1,001a2c8c3ad46a50391720ef3277ca59ad06a990e6ce1e335628a150ee4c3886,2024-11-21T01:31:58.460000 -CVE-2011-4172,0,1,df2c92ee756969720a6edd203f03e349360cd24d3154a9586d276e34b8d8af00,2024-11-21T01:31:58.600000 -CVE-2011-4173,0,1,5338521ee073d7f7b18ac57a004aad0ae0b5fa5a089ea38fba77cf73a258f232,2024-11-21T01:31:58.727000 +CVE-2011-4151,0,0,50d427f35049a831cce51067635a24c2702e0429603344ae17bd4890651525eb,2024-11-21T01:31:56.340000 +CVE-2011-4153,0,0,5d69a690e1b40197a6a0e1f32f621a6779c5ea04d0c735bf5904dff560fe7398,2024-11-21T01:31:56.503000 +CVE-2011-4155,0,0,f92c15b0ba47c1090cd340b194aa8ede1406a4d3ca9a863f77c7f23b1f6c4606,2024-11-21T01:31:56.670000 +CVE-2011-4156,0,0,faf7299ae045d1bee2d1439890a7c4149ad4d603972960b2b3cdc0f1927cc50e,2024-11-21T01:31:56.780000 +CVE-2011-4157,0,0,3de5d18178a202859f1fc7b26f71e38257b0ee478e942f135e4ef2191f3b39f1,2024-11-21T01:31:56.887000 +CVE-2011-4158,0,0,4876ede8b8fa31f58eddacd66598d8cbeb84404a5324454cdc280df8b08ee1a6,2024-11-21T01:31:57 +CVE-2011-4159,0,0,c3c97dad42d86f426b29e22eb3097c64094ad3e8f961ea0fdfe92f16e4cda0ff,2024-11-21T01:31:57.103000 +CVE-2011-4160,0,0,ffa3ac9343cc7e001e986ccb3d6f1a100559a5460d6f19d375e5d0aae19529bc,2024-11-21T01:31:57.210000 +CVE-2011-4161,0,0,331acb85c20dd0250c2149a5eb9c38b33c26954a774ee4504de9c29e4810b1b0,2024-11-21T01:31:57.317000 +CVE-2011-4162,0,0,f52385c8ffd78e736edcad8f26879a5c25b34dc957785d869348236563304cba,2024-11-21T01:31:57.490000 +CVE-2011-4163,0,0,93989ee396083651ace52fa9af187c54b80eb4bc040a11cc834dc285f06d0c7b,2024-11-21T01:31:57.607000 +CVE-2011-4164,0,0,bd326027e6d2fa659002c9873e89b9ab4744c45a0b735a5ffabd5a48e7f634d2,2024-11-21T01:31:57.710000 +CVE-2011-4165,0,0,4a3e56bdf9f2024df24aa664e24616613fcb88055cf12ba09fc440c6b757876d,2024-11-21T01:31:57.810000 +CVE-2011-4166,0,0,1798ed5803575c5fa4c28b1f2984d494558337d14c97e8e2ea99ff9aff36ea4e,2024-11-21T01:31:57.910000 +CVE-2011-4167,0,0,68118ef8cd7d3c00e3611b225e0dc46dcdc944bf95443bfd58c1dd5f02efc19f,2024-11-21T01:31:58.013000 +CVE-2011-4168,0,0,c755294e29b1193e2a1c7ac4e21537c7f44297cc820e3b115c05e2166ce0b95b,2024-11-21T01:31:58.113000 +CVE-2011-4169,0,0,70d0ea49d53488353b5ac04a228b655e136048a859a03f482ef74f41c11a5a46,2024-11-21T01:31:58.210000 +CVE-2011-4170,0,0,ab7823d2c22cdad729d51df8e29f0f025a9dfcfb05f46cc7e60dad26adb85aed,2024-11-21T01:31:58.313000 +CVE-2011-4171,0,0,001a2c8c3ad46a50391720ef3277ca59ad06a990e6ce1e335628a150ee4c3886,2024-11-21T01:31:58.460000 +CVE-2011-4172,0,0,df2c92ee756969720a6edd203f03e349360cd24d3154a9586d276e34b8d8af00,2024-11-21T01:31:58.600000 +CVE-2011-4173,0,0,5338521ee073d7f7b18ac57a004aad0ae0b5fa5a089ea38fba77cf73a258f232,2024-11-21T01:31:58.727000 CVE-2011-4181,0,0,7ea392562589ebfc2df53adadf578199a55081ccd2c25d33b63fc2a73969e8e7,2023-11-07T02:09:16.473000 CVE-2011-4182,0,0,3efda20ea4ec47c34cc7aa3eecf45bc3642e4b6e484a9a8ebcb46e5976db84c5,2023-11-07T02:09:16.767000 CVE-2011-4183,0,0,7ac4b3eae8ad4d023e4610a33ebfc805cdb3127431908a2551630e2f09aa33ee,2023-11-07T02:09:17.060000 @@ -50788,65 +50788,65 @@ CVE-2011-4187,0,0,e884e4aea3c7d0a72aa941e30e6dde2fcb4c189322d607841c10ed7c20cfaa CVE-2011-4188,0,0,89726a0135da94530153414b019ea4ee11fa7c13b89d148ae1873ffd1dcdecb9,2017-12-29T02:29:04.860000 CVE-2011-4189,0,0,bfbc95432fd18892e8979fc263b5aa39112dccd28c05e3421015e376d4dcffb1,2018-01-11T02:29:00.577000 CVE-2011-4190,0,0,75b036438895ec1fe8b6c82ebb81066afd458b1e924247469e219e2d852b88f6,2023-11-07T02:09:17.390000 -CVE-2011-4191,0,1,3cb878f90ba748b388fb71beed2d5ed053098145d89aa6661821397beb21567f,2024-11-21T01:32:00.050000 +CVE-2011-4191,0,0,3cb878f90ba748b388fb71beed2d5ed053098145d89aa6661821397beb21567f,2024-11-21T01:32:00.050000 CVE-2011-4192,0,0,ac782b864a3ca8b90d0ce9a570287380c1714ba98e8dd097bbdb209332718474,2014-04-17T13:53:57.140000 CVE-2011-4193,0,0,a5b46ef7add85e5554f03bff774510ac2067c5a4eb768b93f98effb80ba045d5,2014-04-17T14:04:13.783000 -CVE-2011-4194,0,1,0f93f1f50a072ef31d13e675b819390b85e74c5e71d82f21778414aa85ad49dd,2024-11-21T01:32:00.457000 +CVE-2011-4194,0,0,0f93f1f50a072ef31d13e675b819390b85e74c5e71d82f21778414aa85ad49dd,2024-11-21T01:32:00.457000 CVE-2011-4195,0,0,63628e2d3a494faad905a53df309fe62a7db43f5efa64de564ac60286ee999bd,2014-04-17T14:20:13.387000 -CVE-2011-4197,0,1,5876319ba1f1f3579346b7be84ee3939cd07738cd557caebffc99c81e001252e,2024-11-21T01:32:00.727000 -CVE-2011-4201,0,1,fd226565bb5faee18a9aa422518692fee9ec553ebe04bd0b96da7147e81c88c4,2024-11-21T01:32:00.873000 -CVE-2011-4202,0,1,ad5a6fcdad686411a6df19ef82a526c9c9b912e68163e78652df9a031ff82051,2024-11-21T01:32:01.010000 -CVE-2011-4203,0,1,9e402fa7fe163615200b4b8cf2ac1af2b235e15e2e0bf141f5a78eec257c351a,2024-11-21T01:32:01.147000 -CVE-2011-4211,0,1,4f751a5d32c405165607e9cab861c3296d7892527f91a983cefbde4da02b6002,2024-11-21T01:32:01.293000 -CVE-2011-4212,0,1,f980451b4835efc9549517bf635f93117d91e224a3e222359465ab983f001d58,2024-11-21T01:32:01.450000 -CVE-2011-4213,0,1,da2e4a50e1ea6a837995368921c1d16fd2eb7e8193d7043b45269a85c0fa4b61,2024-11-21T01:32:01.633000 -CVE-2011-4214,0,1,a49f41b6aba1c37b7f1a33b70a5ca2007b32e75d99a283c226a356c0575ee03d,2024-11-21T01:32:01.807000 -CVE-2011-4215,0,1,4ae7124776c01a21425ed65189f7ccc29fbb4ded2edada5e6f522c5b148c2c78,2024-11-21T01:32:01.947000 -CVE-2011-4216,0,1,44eea5924f91880378aeb0ea139765084054827b2b32f976e2d55a8eb92c7b1a,2024-11-21T01:32:02.090000 -CVE-2011-4217,0,1,1411ecaf849d5213aad7d7df215600679c754b761661329be7e681b808066e60,2024-11-21T01:32:02.233000 -CVE-2011-4218,0,1,61b6c3406ffd7f734837422689161c48e1522d2194c321068c3c79dddbd4394c,2024-11-21T01:32:02.380000 -CVE-2011-4219,0,1,c9a1073c767635eda788d4890004b684a2ffc54f4caa0d5d7e7d8c8725036612,2024-11-21T01:32:02.530000 -CVE-2011-4220,0,1,2c73635d8eb1991e03e70c770447c6a04d9c8eeb9c2815e7f6979bd0afd0bdc8,2024-11-21T01:32:02.687000 -CVE-2011-4221,0,1,7010223a7ef03895339abe4594e7d48132486b5d7eb1b32fd15e1be3034f21fe,2024-11-21T01:32:02.827000 -CVE-2011-4222,0,1,0339448ca861c0ec15d8950c5e6bfd8df0bae18a7e14ec265aa6012d1d45bf22,2024-11-21T01:32:02.960000 -CVE-2011-4223,0,1,545cfdb1220b4366eabe0e4dfa2384e6e49bb5fca5ea2e103431654c7226795f,2024-11-21T01:32:03.103000 +CVE-2011-4197,0,0,5876319ba1f1f3579346b7be84ee3939cd07738cd557caebffc99c81e001252e,2024-11-21T01:32:00.727000 +CVE-2011-4201,0,0,fd226565bb5faee18a9aa422518692fee9ec553ebe04bd0b96da7147e81c88c4,2024-11-21T01:32:00.873000 +CVE-2011-4202,0,0,ad5a6fcdad686411a6df19ef82a526c9c9b912e68163e78652df9a031ff82051,2024-11-21T01:32:01.010000 +CVE-2011-4203,0,0,9e402fa7fe163615200b4b8cf2ac1af2b235e15e2e0bf141f5a78eec257c351a,2024-11-21T01:32:01.147000 +CVE-2011-4211,0,0,4f751a5d32c405165607e9cab861c3296d7892527f91a983cefbde4da02b6002,2024-11-21T01:32:01.293000 +CVE-2011-4212,0,0,f980451b4835efc9549517bf635f93117d91e224a3e222359465ab983f001d58,2024-11-21T01:32:01.450000 +CVE-2011-4213,0,0,da2e4a50e1ea6a837995368921c1d16fd2eb7e8193d7043b45269a85c0fa4b61,2024-11-21T01:32:01.633000 +CVE-2011-4214,0,0,a49f41b6aba1c37b7f1a33b70a5ca2007b32e75d99a283c226a356c0575ee03d,2024-11-21T01:32:01.807000 +CVE-2011-4215,0,0,4ae7124776c01a21425ed65189f7ccc29fbb4ded2edada5e6f522c5b148c2c78,2024-11-21T01:32:01.947000 +CVE-2011-4216,0,0,44eea5924f91880378aeb0ea139765084054827b2b32f976e2d55a8eb92c7b1a,2024-11-21T01:32:02.090000 +CVE-2011-4217,0,0,1411ecaf849d5213aad7d7df215600679c754b761661329be7e681b808066e60,2024-11-21T01:32:02.233000 +CVE-2011-4218,0,0,61b6c3406ffd7f734837422689161c48e1522d2194c321068c3c79dddbd4394c,2024-11-21T01:32:02.380000 +CVE-2011-4219,0,0,c9a1073c767635eda788d4890004b684a2ffc54f4caa0d5d7e7d8c8725036612,2024-11-21T01:32:02.530000 +CVE-2011-4220,0,0,2c73635d8eb1991e03e70c770447c6a04d9c8eeb9c2815e7f6979bd0afd0bdc8,2024-11-21T01:32:02.687000 +CVE-2011-4221,0,0,7010223a7ef03895339abe4594e7d48132486b5d7eb1b32fd15e1be3034f21fe,2024-11-21T01:32:02.827000 +CVE-2011-4222,0,0,0339448ca861c0ec15d8950c5e6bfd8df0bae18a7e14ec265aa6012d1d45bf22,2024-11-21T01:32:02.960000 +CVE-2011-4223,0,0,545cfdb1220b4366eabe0e4dfa2384e6e49bb5fca5ea2e103431654c7226795f,2024-11-21T01:32:03.103000 CVE-2011-4231,0,0,acdc5522f0bdd112deb50524e151086a0c8a82f77dfe142c14e44dad916d8a46,2012-05-11T04:00:00 CVE-2011-4232,0,0,c805c65535d40d17e0831a3ce74370294d82ad30856fc94efaf2a9967d2c0a6a,2012-05-30T03:40:16.883000 CVE-2011-4237,0,0,b6fcc9bd627981d496795e903d3d5bb2e9b4274b9717c517d6b6d85a5edd6c0e,2012-06-09T03:38:09.323000 -CVE-2011-4244,0,1,bcf31f6f8e19ddf2deef6ac120c680ccabd0e0a89db94e5dbe4faf42fbde10d6,2024-11-21T01:32:03.610000 -CVE-2011-4245,0,1,7025e320a14499c41e8a4de6043d0e4aa785b7b6d9e86e82b85d0cdc9e9321f1,2024-11-21T01:32:03.760000 -CVE-2011-4246,0,1,e671db6469f92809c5b1681daa661fb6d04fbd96c434c409fb14e20c4f5cb252,2024-11-21T01:32:03.913000 -CVE-2011-4247,0,1,d48b7bec766cb44d5c964b9493d49896ce865fb9d10ccfcd4ea764689817dd18,2024-11-21T01:32:04.063000 -CVE-2011-4248,0,1,7ce27ab91ad6745256596d838791e497838c4cd44c8b079ecc465a8c32571838,2024-11-21T01:32:04.217000 -CVE-2011-4249,0,1,aba4a0fb47db4e9a4ccc9487d19e78e2668cd9ed8bc0ab89952763fdb98cb6c4,2024-11-21T01:32:04.370000 -CVE-2011-4250,0,1,12417cda53211aa8f2b0d7e115bb976f77aa30546fa0ecda5f3017c39122d19d,2024-11-21T01:32:04.520000 -CVE-2011-4251,0,1,5cacc524971a0630e9165a361900d43e71989a0cc91df50f5c098010fa619ac1,2024-11-21T01:32:04.680000 -CVE-2011-4252,0,1,4a980311d19703ec1f837dcf77a86af19306ddc8e733eadaf6263cc3df1c831c,2024-11-21T01:32:04.840000 -CVE-2011-4253,0,1,5b76488b894671d3c5ff2b1ab72cd7f6b3610a6606ab050517311250f99ca452,2024-11-21T01:32:04.987000 -CVE-2011-4254,0,1,bb9022b45e8ed6a25ac9a82e7b0489dff613ddff29dda789284a66109922f81e,2024-11-21T01:32:05.123000 -CVE-2011-4255,0,1,55f8c7268794b7caf32656d107d08314cfcbcb8fcf7dd5fdabfae0cfb68a2f13,2024-11-21T01:32:05.267000 -CVE-2011-4256,0,1,8767fcac2c7ed39bded9c4c8fe0a8c31d55063303f5aee914d4d40a48a711e12,2024-11-21T01:32:05.420000 -CVE-2011-4257,0,1,5bac59a3b55d926d52fe792b711de2e057b9d64b299d205549a126b6fa3601b3,2024-11-21T01:32:05.560000 -CVE-2011-4258,0,1,ab7df93bf397c9b92373d93a7e9150f41f7592b448caef455fc439a2980eba53,2024-11-21T01:32:05.700000 -CVE-2011-4259,0,1,95cb52c32dd71b1d828c588dbb32c624b704fd5692ff6a528b9f7194329cf4a3,2024-11-21T01:32:05.850000 -CVE-2011-4260,0,1,59d022c8726ce5534dc7dca093056c62d1eb046720888479317987a181ceef57,2024-11-21T01:32:05.997000 -CVE-2011-4261,0,1,c378212e332861badce03eba227b3cf344cb015217f080c6c9edb678a60daf7c,2024-11-21T01:32:06.140000 -CVE-2011-4262,0,1,8f89e69adc15f42bf353e94a0197185d8628cf107cc3617c6c5a538497e9a969,2024-11-21T01:32:06.290000 -CVE-2011-4263,0,1,c8526afaad245af8ecc408022d00a8d29d4b7bb9bc0204c394b2cf2e1c232fa1,2024-11-21T01:32:06.440000 -CVE-2011-4264,0,1,f0674889fc45c2c3bac007d2fa0a0f8cd6029f497307d9fe7caad121a563b712,2024-11-21T01:32:06.573000 -CVE-2011-4265,0,1,46863e76cc002be5e3c452668f63e5a4e244fca6fe8c446aecff522c96bbdee0,2024-11-21T01:32:06.687000 -CVE-2011-4266,0,1,b235e3d50d7985477adb7daf4ba5baf63fab008a0d89be2eec3721bfb280cea1,2024-11-21T01:32:06.833000 +CVE-2011-4244,0,0,bcf31f6f8e19ddf2deef6ac120c680ccabd0e0a89db94e5dbe4faf42fbde10d6,2024-11-21T01:32:03.610000 +CVE-2011-4245,0,0,7025e320a14499c41e8a4de6043d0e4aa785b7b6d9e86e82b85d0cdc9e9321f1,2024-11-21T01:32:03.760000 +CVE-2011-4246,0,0,e671db6469f92809c5b1681daa661fb6d04fbd96c434c409fb14e20c4f5cb252,2024-11-21T01:32:03.913000 +CVE-2011-4247,0,0,d48b7bec766cb44d5c964b9493d49896ce865fb9d10ccfcd4ea764689817dd18,2024-11-21T01:32:04.063000 +CVE-2011-4248,0,0,7ce27ab91ad6745256596d838791e497838c4cd44c8b079ecc465a8c32571838,2024-11-21T01:32:04.217000 +CVE-2011-4249,0,0,aba4a0fb47db4e9a4ccc9487d19e78e2668cd9ed8bc0ab89952763fdb98cb6c4,2024-11-21T01:32:04.370000 +CVE-2011-4250,0,0,12417cda53211aa8f2b0d7e115bb976f77aa30546fa0ecda5f3017c39122d19d,2024-11-21T01:32:04.520000 +CVE-2011-4251,0,0,5cacc524971a0630e9165a361900d43e71989a0cc91df50f5c098010fa619ac1,2024-11-21T01:32:04.680000 +CVE-2011-4252,0,0,4a980311d19703ec1f837dcf77a86af19306ddc8e733eadaf6263cc3df1c831c,2024-11-21T01:32:04.840000 +CVE-2011-4253,0,0,5b76488b894671d3c5ff2b1ab72cd7f6b3610a6606ab050517311250f99ca452,2024-11-21T01:32:04.987000 +CVE-2011-4254,0,0,bb9022b45e8ed6a25ac9a82e7b0489dff613ddff29dda789284a66109922f81e,2024-11-21T01:32:05.123000 +CVE-2011-4255,0,0,55f8c7268794b7caf32656d107d08314cfcbcb8fcf7dd5fdabfae0cfb68a2f13,2024-11-21T01:32:05.267000 +CVE-2011-4256,0,0,8767fcac2c7ed39bded9c4c8fe0a8c31d55063303f5aee914d4d40a48a711e12,2024-11-21T01:32:05.420000 +CVE-2011-4257,0,0,5bac59a3b55d926d52fe792b711de2e057b9d64b299d205549a126b6fa3601b3,2024-11-21T01:32:05.560000 +CVE-2011-4258,0,0,ab7df93bf397c9b92373d93a7e9150f41f7592b448caef455fc439a2980eba53,2024-11-21T01:32:05.700000 +CVE-2011-4259,0,0,95cb52c32dd71b1d828c588dbb32c624b704fd5692ff6a528b9f7194329cf4a3,2024-11-21T01:32:05.850000 +CVE-2011-4260,0,0,59d022c8726ce5534dc7dca093056c62d1eb046720888479317987a181ceef57,2024-11-21T01:32:05.997000 +CVE-2011-4261,0,0,c378212e332861badce03eba227b3cf344cb015217f080c6c9edb678a60daf7c,2024-11-21T01:32:06.140000 +CVE-2011-4262,0,0,8f89e69adc15f42bf353e94a0197185d8628cf107cc3617c6c5a538497e9a969,2024-11-21T01:32:06.290000 +CVE-2011-4263,0,0,c8526afaad245af8ecc408022d00a8d29d4b7bb9bc0204c394b2cf2e1c232fa1,2024-11-21T01:32:06.440000 +CVE-2011-4264,0,0,f0674889fc45c2c3bac007d2fa0a0f8cd6029f497307d9fe7caad121a563b712,2024-11-21T01:32:06.573000 +CVE-2011-4265,0,0,46863e76cc002be5e3c452668f63e5a4e244fca6fe8c446aecff522c96bbdee0,2024-11-21T01:32:06.687000 +CVE-2011-4266,0,0,b235e3d50d7985477adb7daf4ba5baf63fab008a0d89be2eec3721bfb280cea1,2024-11-21T01:32:06.833000 CVE-2011-4267,0,0,2408147d2ee3de3229c919238b44799b5e4b5baf60c0ce08e9df0584223bb734,2023-11-07T02:09:18.030000 CVE-2011-4268,0,0,92225ba9751dbb1189fcf818b689fecbf1c11f432c79dd6df616f499f63e7b02,2023-11-07T02:09:18.317000 CVE-2011-4269,0,0,231409156d9ab4aa00bd174d5821b79a35e6a3c8f4d86789d6afb2be6e9dae83,2023-11-07T02:09:18.797000 CVE-2011-4270,0,0,6fa14224188cd739231acf285383cb196b6c045a82b366518396aa81e9eb4337,2023-11-07T02:09:19.027000 CVE-2011-4271,0,0,6fd8757137d1edc1a88cfc89e585604ab6797e55c7482910073c1c5412fb7517,2023-11-07T02:09:19.287000 CVE-2011-4272,0,0,b11b84620ba981b4de98bda1bcefca278d83e4622f1ba68566964b43a8d3e453,2023-11-07T02:09:19.510000 -CVE-2011-4273,0,1,ce5f50b1924bfbc23f102d71b090cf8c1e45b52033eda13c09b3f2b5cbd17022,2024-11-21T01:32:07.040000 -CVE-2011-4274,0,1,74f0cb3e96c9380c8ec7a8ae0079737b846578c80b1cc63e4e67b5daf1a39355,2024-11-21T01:32:07.177000 -CVE-2011-4275,0,1,92732be9537a01f38f1bd0ae34a45e43c6fea30abf437e496570807a7c9a2fe6,2024-11-21T01:32:07.323000 -CVE-2011-4276,0,1,600ed81aab5269bfff367b846c0642daa56f970021a78b5a2e4df5bc473ba46c,2024-11-21T01:32:07.477000 -CVE-2011-4277,0,1,7f3f6d281a23a76d9d9b33b985680f178cc1e334be163c212a8b50a2005167e9,2024-11-21T01:32:07.637000 +CVE-2011-4273,0,0,ce5f50b1924bfbc23f102d71b090cf8c1e45b52033eda13c09b3f2b5cbd17022,2024-11-21T01:32:07.040000 +CVE-2011-4274,0,0,74f0cb3e96c9380c8ec7a8ae0079737b846578c80b1cc63e4e67b5daf1a39355,2024-11-21T01:32:07.177000 +CVE-2011-4275,0,0,92732be9537a01f38f1bd0ae34a45e43c6fea30abf437e496570807a7c9a2fe6,2024-11-21T01:32:07.323000 +CVE-2011-4276,0,0,600ed81aab5269bfff367b846c0642daa56f970021a78b5a2e4df5bc473ba46c,2024-11-21T01:32:07.477000 +CVE-2011-4277,0,0,7f3f6d281a23a76d9d9b33b985680f178cc1e334be163c212a8b50a2005167e9,2024-11-21T01:32:07.637000 CVE-2011-4278,0,0,e69fd7cd5e04c4fd917d54ea14fb41e83b72ad211452417d592598dbf300203e,2023-11-07T02:09:19.770000 CVE-2011-4279,0,0,d0e5f836aaad300be1519570724dc6b652c331eea5bbc63344194b9faf5cb920,2023-11-07T02:09:19.833000 CVE-2011-4280,0,0,53ddc3fe78882caf20d9e7295f100874e0aead229c3ff3a6af455e316a629e61,2023-11-07T02:09:19.880000 @@ -50880,70 +50880,70 @@ CVE-2011-4307,0,0,3e8933bf181f7a47a54c0dfd7fa978232721165507d515a47ea26cd24c2ec4 CVE-2011-4308,0,0,4f3560883b5f23d8371ccd0a1908c830b66b0cd707b7fa633108d1684b23ac66,2020-12-01T14:43:53.067000 CVE-2011-4309,0,0,b7dd6c7548a7d90ee4f7396885104493a7187f7ca0ecefc784259aefa2359ef4,2023-02-13T04:32:48.720000 CVE-2011-4310,0,0,ea3b19e87bea969706beeb5e64845505fe5975c8857972387e6282460a1a5018,2019-12-04T17:28:02.523000 -CVE-2011-4311,0,1,414ad4dca2540205904a2b2b1b892f8d140aa7dcd6c12bf43e6623ec3079adb6,2024-11-21T01:32:12.710000 -CVE-2011-4312,0,1,e4c2fe95207a3524654630fdc83e80b2615b1dca4a47cf95b8c162c3f0371016,2024-11-21T01:32:12.820000 -CVE-2011-4313,0,1,be72c831565a19a3d0040d9af24152fc660591e207af9a62e4de7192879466b8,2024-11-21T01:32:12.947000 -CVE-2011-4314,0,1,7aad59d2c5e5bfbcb0b847bb79e92ff98297f2df7305177dffae295245775686,2024-11-21T01:32:13.117000 -CVE-2011-4315,0,1,5f13bb1db4160299605922a0c88d5da65163d929f099c3712ecd8c5e507acb43,2024-11-21T01:32:13.230000 +CVE-2011-4311,0,0,414ad4dca2540205904a2b2b1b892f8d140aa7dcd6c12bf43e6623ec3079adb6,2024-11-21T01:32:12.710000 +CVE-2011-4312,0,0,e4c2fe95207a3524654630fdc83e80b2615b1dca4a47cf95b8c162c3f0371016,2024-11-21T01:32:12.820000 +CVE-2011-4313,0,0,be72c831565a19a3d0040d9af24152fc660591e207af9a62e4de7192879466b8,2024-11-21T01:32:12.947000 +CVE-2011-4314,0,0,7aad59d2c5e5bfbcb0b847bb79e92ff98297f2df7305177dffae295245775686,2024-11-21T01:32:13.117000 +CVE-2011-4315,0,0,5f13bb1db4160299605922a0c88d5da65163d929f099c3712ecd8c5e507acb43,2024-11-21T01:32:13.230000 CVE-2011-4316,0,0,28d70ea7f86ea80f83eba9dbe7fd2b3d866b3d0a82340433b42a9fd5a8354038,2013-01-07T14:54:57.960000 -CVE-2011-4317,0,1,ea4c960f3850735c7690f8e899e76666b803042fde8242b58a4e66a38fb0c324,2024-11-21T01:32:13.477000 +CVE-2011-4317,0,0,ea4c960f3850735c7690f8e899e76666b803042fde8242b58a4e66a38fb0c324,2024-11-21T01:32:13.477000 CVE-2011-4318,0,0,f5136b2bebf20b3ab2ade990fc29ec99d3f8eb90e3b0a2bf99960ccb7eb5aa17,2013-03-07T05:00:00 -CVE-2011-4319,0,1,ceb2c3f49d6df607c70f1c7d0168f735625524e806e102677f6f2a59f60627dc,2024-11-21T01:32:13.767000 +CVE-2011-4319,0,0,ceb2c3f49d6df607c70f1c7d0168f735625524e806e102677f6f2a59f60627dc,2024-11-21T01:32:13.767000 CVE-2011-4320,0,0,bd8e12b5d73841c4c803539f5f57e6673706aabca10dcedb06ed7eb0358945a8,2012-02-29T05:00:00 -CVE-2011-4321,0,1,0bcdbb7e3bd8d3edf35bd407b836137759249b37ddac31f1a58ff2f73efce3de,2024-11-21T01:32:14.030000 +CVE-2011-4321,0,0,0bcdbb7e3bd8d3edf35bd407b836137759249b37ddac31f1a58ff2f73efce3de,2024-11-21T01:32:14.030000 CVE-2011-4322,0,0,ef9b0c56d8b7107f28d54e93e66a19e63e0e0b996efe7050b50af12c5dda8908,2020-01-29T15:09:46.927000 CVE-2011-4323,0,0,1660a9283eefbceea922fb71d81a8c3a901d7a11ffd526db8c53cf99ef044269,2023-11-07T02:09:21.213000 CVE-2011-4324,0,0,a802efe8f707954ffb7e5f6a21b2300b48690916bedad3a520bf339aa6184c63,2023-02-13T00:21:00.273000 -CVE-2011-4325,0,1,3375f126e1d8fee4085ccbf986e115d54d0d8ab4c160fc65a3c2a57be10612f0,2024-11-21T01:32:14.397000 +CVE-2011-4325,0,0,3375f126e1d8fee4085ccbf986e115d54d0d8ab4c160fc65a3c2a57be10612f0,2024-11-21T01:32:14.397000 CVE-2011-4326,0,0,964d8c6ab00f9e33061974fecfa538162a0d2ec53c70f3fa25ce1aa66b559314,2023-02-13T01:21:45.080000 CVE-2011-4327,0,0,c9bd86e6272e6594cddeeb8d55a90dc36c42c690c4f4efd92923fda072e75059,2014-02-21T18:12:30.890000 CVE-2011-4328,0,0,277230ed6cac529ba10d2e50ce4b8cadc160bc85ea10701690e6a44563788b46,2023-02-13T04:32:49.543000 -CVE-2011-4329,0,1,497b310e6b07285e7524926df508309cf674e5a82e9acccb02d691ede6660098,2024-11-21T01:32:14.923000 -CVE-2011-4330,0,1,5851800330d81ff57dbfb34d6c11e9472529d717dbbcd0ecdf7ddab400922a42,2024-11-21T01:32:15.047000 +CVE-2011-4329,0,0,497b310e6b07285e7524926df508309cf674e5a82e9acccb02d691ede6660098,2024-11-21T01:32:14.923000 +CVE-2011-4330,0,0,5851800330d81ff57dbfb34d6c11e9472529d717dbbcd0ecdf7ddab400922a42,2024-11-21T01:32:15.047000 CVE-2011-4331,0,0,4bf6f1e096c5c848522ecfe46cd2e52f4159fea6f8a75ba63e0955a236b819d6,2023-11-07T02:09:21.490000 -CVE-2011-4332,0,1,d0e366e4e462c3611ed1069ee971f60d81fa3590f53f60bb34c87e027696abc1,2024-11-21T01:32:15.177000 +CVE-2011-4332,0,0,d0e366e4e462c3611ed1069ee971f60d81fa3590f53f60bb34c87e027696abc1,2024-11-21T01:32:15.177000 CVE-2011-4333,0,0,86d0f70b9147b98e7a4ac850ea118f5652044c6e324085381b5cdeff5bdf5afa,2019-10-17T18:38:35.587000 CVE-2011-4334,0,0,023cb5636be241f997792e9158a88f00525c08f4036e2507340423ab3881388e,2017-10-25T11:57:51.070000 -CVE-2011-4335,0,1,a0727469ee26b1480f63640c5225b943c3c9006bc7a36211083889da206445b2,2024-11-21T01:32:15.513000 +CVE-2011-4335,0,0,a0727469ee26b1480f63640c5225b943c3c9006bc7a36211083889da206445b2,2024-11-21T01:32:15.513000 CVE-2011-4336,0,0,75f578294f118c3a6c1ca8582d122580ae24fa2aa86ce6baff6934f944103147,2020-01-21T16:05:22.730000 -CVE-2011-4337,0,1,4b2c3786ee33675a5e0a74ac8d87ae18c4eacd9f0ac6279d9dbd91af60e8f758,2024-11-21T01:32:15.770000 +CVE-2011-4337,0,0,4b2c3786ee33675a5e0a74ac8d87ae18c4eacd9f0ac6279d9dbd91af60e8f758,2024-11-21T01:32:15.770000 CVE-2011-4338,0,0,8a290d3b026b16806ade861ba4ee43f946eb2a28a7d56f296f110ca4a8c4b27e,2020-02-25T18:54:33.713000 -CVE-2011-4339,0,1,b29ec56bd15c8e181fa7450fb7ce261c5c8922f775b4cde3ae6e644b05768d77,2024-11-21T01:32:15.990000 +CVE-2011-4339,0,0,b29ec56bd15c8e181fa7450fb7ce261c5c8922f775b4cde3ae6e644b05768d77,2024-11-21T01:32:15.990000 CVE-2011-4340,0,0,deca3a3a8be61a9e6abdf2868b371cc68bbc5ad0e4ca8562ad2b8a21345bfabe,2017-08-29T01:30:29.317000 CVE-2011-4341,0,0,d174f22d23a6097aac1679710290739aee93801f63ecc0db78689ca0cbbe5e74,2017-08-29T01:30:29.380000 CVE-2011-4342,0,0,d1a5f93f3ca06c67267dd13c1f9641c04843548c4de7d35c932b08bf309eeb24,2024-02-14T01:17:43.863000 CVE-2011-4343,0,0,9c4f5154d240a533fdb2ee817acad790dd033fc9bb2cc64e4a67ff3d99a700b8,2017-11-02T01:29:00.403000 -CVE-2011-4344,0,1,ee1cb96f4a533a27811d8b6a29f74d901c9b2e187ba7076c3e90559eebc0c9ef,2024-11-21T01:32:16.640000 -CVE-2011-4345,0,1,a2eae60566a8956f8c25f95a35c083c2ec2c43db4ae11d3b132df7fee97a71b2,2024-11-21T01:32:16.767000 -CVE-2011-4346,0,1,756ffed413a38d4728eaee5d0ceb724834578ca3e4b261e91b6977c23bdfe174,2024-11-21T01:32:16.883000 +CVE-2011-4344,0,0,ee1cb96f4a533a27811d8b6a29f74d901c9b2e187ba7076c3e90559eebc0c9ef,2024-11-21T01:32:16.640000 +CVE-2011-4345,0,0,a2eae60566a8956f8c25f95a35c083c2ec2c43db4ae11d3b132df7fee97a71b2,2024-11-21T01:32:16.767000 +CVE-2011-4346,0,0,756ffed413a38d4728eaee5d0ceb724834578ca3e4b261e91b6977c23bdfe174,2024-11-21T01:32:16.883000 CVE-2011-4347,0,0,19b84dac5af8c580ba4f277ca35f921250b5ab1eb33a8e1341271798d40316a5,2013-06-10T17:30:03.237000 CVE-2011-4348,0,0,170b06bee659998ca33fe22bf756e53d97af1fa5f8fc2ee46d696ab3bde74e14,2023-11-07T02:09:21.850000 -CVE-2011-4349,0,1,aa11cd9adf79387316723122e84705d7a32d6ab52c7e0773d832cd814a24fe90,2024-11-21T01:32:17.287000 +CVE-2011-4349,0,0,aa11cd9adf79387316723122e84705d7a32d6ab52c7e0773d832cd814a24fe90,2024-11-21T01:32:17.287000 CVE-2011-4350,0,0,1f47395459f473a61374f94223e183f99b7afbbe5d2123be64baa3beaa8940e4,2020-08-18T15:05:57.937000 CVE-2011-4351,0,0,75e96512779c6f7acd834d85090f91f714d6cd726532b59f1c1da01e2a621215,2013-12-10T17:04:10.677000 CVE-2011-4352,0,0,7416e1aefe39b1d3229d65a384893814146fc4ae3bd04dc56a8b95ee5ec6b762,2023-11-07T02:09:21.927000 CVE-2011-4353,0,0,9fbfadc261341100fbb53b36740b294ad53ff794ae760b4af6d934f2556e4948,2012-08-21T04:00:00 -CVE-2011-4354,0,1,894cb67737f119596b2f386c56aec102809e775c65122b4658d38c3f132f3cf1,2024-11-21T01:32:17.897000 +CVE-2011-4354,0,0,894cb67737f119596b2f386c56aec102809e775c65122b4658d38c3f132f3cf1,2024-11-21T01:32:17.897000 CVE-2011-4355,0,0,13cb06015ff84bfc286fc3790a06b36549b4c003dcd41befd76b551143d0aa32,2023-02-13T00:21:22.620000 -CVE-2011-4356,0,1,2264923a77747dfec4adccbc154a0b09cdce95fd3807074199782e84cb9c8863,2024-11-21T01:32:18.143000 -CVE-2011-4357,0,1,def4b5ee3350de7b6adf1cf049050e65c308c1d0bd1282506231f5185a577329,2024-11-21T01:32:18.257000 +CVE-2011-4356,0,0,2264923a77747dfec4adccbc154a0b09cdce95fd3807074199782e84cb9c8863,2024-11-21T01:32:18.143000 +CVE-2011-4357,0,0,def4b5ee3350de7b6adf1cf049050e65c308c1d0bd1282506231f5185a577329,2024-11-21T01:32:18.257000 CVE-2011-4358,0,0,60d186a0c9256926dd083fe6cc2d3c78f124b082f193d3f6acef383aa0c35623,2014-10-10T04:43:56.443000 CVE-2011-4359,0,0,a4dc2800dd805b1caab894fcbe3608a596c9741d538caf5f8b50cafc1f3df487,2023-11-07T02:09:22.080000 -CVE-2011-4360,0,1,ae623ef992c82f7ec31e96f7269f4434b13af4a92fa4aacf1f1586d3744ced0e,2024-11-21T01:32:18.500000 -CVE-2011-4361,0,1,6da5634c3526cd7a3332bd8c9241be9795f8fe56a3793cef1af6e52092303c42,2024-11-21T01:32:18.617000 -CVE-2011-4362,0,1,6a803de1f6c181d1b7b585eccd553467ca3ff4bafe3690f87520d5a009ff7222,2024-11-21T01:32:18.747000 +CVE-2011-4360,0,0,ae623ef992c82f7ec31e96f7269f4434b13af4a92fa4aacf1f1586d3744ced0e,2024-11-21T01:32:18.500000 +CVE-2011-4361,0,0,6da5634c3526cd7a3332bd8c9241be9795f8fe56a3793cef1af6e52092303c42,2024-11-21T01:32:18.617000 +CVE-2011-4362,0,0,6a803de1f6c181d1b7b585eccd553467ca3ff4bafe3690f87520d5a009ff7222,2024-11-21T01:32:18.747000 CVE-2011-4363,0,0,502723a70fab92ffc49eb04622d325f7e6176a5149141b22ee520a0302a6d3f6,2012-10-08T04:00:00 CVE-2011-4364,0,0,55c4bdbe95d613ac899c5f5a82402c53e94a5971bfebcbf2ae4b6bf28e2a9a27,2023-11-07T02:09:22.337000 CVE-2011-4365,0,0,718b01e3c4f29cfda5b49106f70b76183427d38f68b48bea5129f1d75821fa13,2023-11-07T02:09:22.410000 CVE-2011-4366,0,0,d3cc1a3e5b6465f7343ad00709f9a4d73611a271210db3c01aaae9c8ba6c7981,2023-11-07T02:09:22.647000 CVE-2011-4367,0,0,2dd48e758200574f89320c66a0a1fe5efae55dd9861c450ef264bb9b1a99cb9c,2020-08-04T18:20:22.737000 -CVE-2011-4368,0,1,f37f8e82c567cea8938c8ca3330b17eaff80611579977cacbfde3b268a2830ee,2024-11-21T01:32:19.270000 -CVE-2011-4369,0,1,b5904118bc260efb40833f0acff97f70ea8916be24ec568a47b53d8eb19507ea,2024-11-21T01:32:19.380000 -CVE-2011-4370,0,1,1e0648e9852e060c32c0735e69224166fa129641e71376a4dd00d9cc5fa3f7d3,2024-11-21T01:32:19.513000 -CVE-2011-4371,0,1,2c7ff2cb1801c8d343e62280b7c70e249d4b242283f471aeea7db97fa565ba6e,2024-11-21T01:32:19.640000 -CVE-2011-4372,0,1,0952af9ce52e131213d4b59daabb7ea6a3350c0ea774df179d6a9b0e9f30252f,2024-11-21T01:32:19.760000 -CVE-2011-4373,0,1,35ffb20ed88da145d4aa44d00cfa495c8cfa691cf0b9e8f088292c8c7cb90945,2024-11-21T01:32:19.873000 -CVE-2011-4374,0,1,98c769e72ef5cacdc62ad2d41f700bb4a8bf2f6b55f52deb7553735a8b9e629e,2024-11-21T01:32:20 +CVE-2011-4368,0,0,f37f8e82c567cea8938c8ca3330b17eaff80611579977cacbfde3b268a2830ee,2024-11-21T01:32:19.270000 +CVE-2011-4369,0,0,b5904118bc260efb40833f0acff97f70ea8916be24ec568a47b53d8eb19507ea,2024-11-21T01:32:19.380000 +CVE-2011-4370,0,0,1e0648e9852e060c32c0735e69224166fa129641e71376a4dd00d9cc5fa3f7d3,2024-11-21T01:32:19.513000 +CVE-2011-4371,0,0,2c7ff2cb1801c8d343e62280b7c70e249d4b242283f471aeea7db97fa565ba6e,2024-11-21T01:32:19.640000 +CVE-2011-4372,0,0,0952af9ce52e131213d4b59daabb7ea6a3350c0ea774df179d6a9b0e9f30252f,2024-11-21T01:32:19.760000 +CVE-2011-4373,0,0,35ffb20ed88da145d4aa44d00cfa495c8cfa691cf0b9e8f088292c8c7cb90945,2024-11-21T01:32:19.873000 +CVE-2011-4374,0,0,98c769e72ef5cacdc62ad2d41f700bb4a8bf2f6b55f52deb7553735a8b9e629e,2024-11-21T01:32:20 CVE-2011-4375,0,0,92b1a774175257535a28b0ac69247314b80f58244317e686344abdd17c0e3422,2023-11-07T02:09:22.940000 CVE-2011-4376,0,0,05adec2e888f198634c6ae6a7356307b2a33473b1bd4f3b5f86fcdd590460dca,2023-11-07T02:09:23.177000 CVE-2011-4377,0,0,c0ec5937171eee91de32e9b7906661ecd9719481e92d7b4db2dfeea1db52f91a,2023-11-07T02:09:23.397000 @@ -50973,8 +50973,8 @@ CVE-2011-4400,0,0,31c3e58e996e27ab6c7eeb1ea0bea5da4028bf2e93e57780fb70dfa28431b6 CVE-2011-4401,0,0,c5e960e72dada5569f230c904319f8238ab2838da91797459215e6abc4df98bf,2023-11-07T02:09:28.760000 CVE-2011-4402,0,0,ff859a0cb0aed2fce17041c4e4f714298bc1beb95cd98268611896843816797a,2023-11-07T02:09:28.967000 CVE-2011-4403,0,0,221064e559aa01f6270714cf78965f75bc3e462c45aa1d5d80ff92575822b5a6,2015-04-27T14:28:13.333000 -CVE-2011-4404,0,1,7cd20bda1283b61f1fd6125e36de1def7af71a88b76be3c9fa66173c51978adc,2024-11-21T01:32:20.623000 -CVE-2011-4405,0,1,ad7a26ed9b21e2e01fb79c3cb873cc8faad6ec2d20dbd93b866cd895a057ddf5,2024-11-21T01:32:20.760000 +CVE-2011-4404,0,0,7cd20bda1283b61f1fd6125e36de1def7af71a88b76be3c9fa66173c51978adc,2024-11-21T01:32:20.623000 +CVE-2011-4405,0,0,ad7a26ed9b21e2e01fb79c3cb873cc8faad6ec2d20dbd93b866cd895a057ddf5,2024-11-21T01:32:20.760000 CVE-2011-4406,0,0,7adaaf4e71c9b7f6274edfca5b55c07b29c4eccffdc0d7474c4520e17e89381a,2014-04-17T14:33:57.367000 CVE-2011-4407,0,0,f1e2c258d0308ef3c35176e60f8a69176207761c6aa92d1cdb4c27a8e551fb19,2014-05-14T17:57:52.027000 CVE-2011-4408,0,0,dab83dd03df59e1f4ee3a998457ecb99f4f15aa0eb7fa9c50bba9bbc26e4476e,2017-08-29T01:30:29.817000 @@ -50984,7 +50984,7 @@ CVE-2011-4411,0,0,d413457aadf1d92834fe59eacc2b7e9f9234902d385b8a15b6a539852b0ae6 CVE-2011-4412,0,0,ba4f5512339c2b62d4ae74561b6b3d29779b55f5748c41b4501449228cf68db8,2023-11-07T02:09:29.680000 CVE-2011-4413,0,0,7b956409c4aa500a48516b4cda931e3fe1a9b5b1013a7fc7641dffdd39a28d28,2023-11-07T02:09:29.893000 CVE-2011-4414,0,0,8baba2fe203e0b5893f42fc43db341e57d0a86e2f9fe8b835d54ed7a22f6eb1e,2023-11-07T02:09:30.173000 -CVE-2011-4415,0,1,45116aa0f59688fac76504e3d18ff5bdd81a96db978b21195045f7576a04e778,2024-11-21T01:32:21.373000 +CVE-2011-4415,0,0,45116aa0f59688fac76504e3d18ff5bdd81a96db978b21195045f7576a04e778,2024-11-21T01:32:21.373000 CVE-2011-4416,0,0,53623593e394d2e3cb04dcb5c35c26c3e025e746ab362e5209c4a76d57fca737,2023-11-07T02:09:30.403000 CVE-2011-4417,0,0,3ae34b73bd27b5c5bd0288e7fc694be1e4b62df93304f1a5170a6ab06a07dd91,2023-11-07T02:09:30.617000 CVE-2011-4418,0,0,7c41d519a5705831fe368575bdced26ec9394797bee840ed33f9994ba99acad9,2023-11-07T02:09:30.833000 @@ -51000,43 +51000,43 @@ CVE-2011-4427,0,0,db0cf3277269b1a721bccab30c65c357da42b12c44800f08c504294156d0f7 CVE-2011-4428,0,0,971899b7050522044158955114c31ca9e4bc4963fab1a339908f6101bb2e5a36,2023-11-07T02:09:32.993000 CVE-2011-4429,0,0,2a8f9681b214eec811683870d0eeb280bde18c8b355eb7a588a2daca0d31f7ed,2023-11-07T02:09:33.243000 CVE-2011-4430,0,0,170debe0c1cfae178d1fb1f25fe32c347cc2e6e5142c0494ae2d895c37971a65,2023-11-07T02:09:33.560000 -CVE-2011-4431,0,1,5d20fefecd789f4a851c9fa39df119701718a036d180ef89c3fbf15a6ecfbe93,2024-11-21T01:32:21.723000 -CVE-2011-4432,0,1,c2ccf80607c68c4cf2b16c3a6acba9cb24b1c03c4c30eba31be26077a418dd51,2024-11-21T01:32:21.867000 +CVE-2011-4431,0,0,5d20fefecd789f4a851c9fa39df119701718a036d180ef89c3fbf15a6ecfbe93,2024-11-21T01:32:21.723000 +CVE-2011-4432,0,0,c2ccf80607c68c4cf2b16c3a6acba9cb24b1c03c4c30eba31be26077a418dd51,2024-11-21T01:32:21.867000 CVE-2011-4433,0,0,985cd099ad87b4341b35ac0ec53cd1de8e4576291412512803fc5dd90e113ae7,2023-11-07T02:09:33.783000 -CVE-2011-4434,0,1,36cb4a9f83304867845e13506cb764468037e99ed004f560974f93e6849cdfb9,2024-11-21T01:32:22.023000 -CVE-2011-4435,0,1,5fe57fe7b38e081d7c3af5729a34c58f6f7556571796c303aac2d2ac56a4ad58,2024-11-21T01:32:22.157000 -CVE-2011-4436,0,1,a74226d7363cbe48fd5c27b5e20ab6d42f7e9e575060efaa0d58c44e4a129067,2024-11-21T01:32:22.310000 +CVE-2011-4434,0,0,36cb4a9f83304867845e13506cb764468037e99ed004f560974f93e6849cdfb9,2024-11-21T01:32:22.023000 +CVE-2011-4435,0,0,5fe57fe7b38e081d7c3af5729a34c58f6f7556571796c303aac2d2ac56a4ad58,2024-11-21T01:32:22.157000 +CVE-2011-4436,0,0,a74226d7363cbe48fd5c27b5e20ab6d42f7e9e575060efaa0d58c44e4a129067,2024-11-21T01:32:22.310000 CVE-2011-4447,0,0,c46304ac8774368098f24aa3da71a5bbc16c5a8b03549ef2df1018939f5aa1c7,2020-03-18T17:37:42.477000 CVE-2011-4448,0,0,4a4da8b575c4393f8a46176480e73aec039c397de897f8a096d31cbf45ed2bd7,2012-09-06T12:43:21.517000 CVE-2011-4449,0,0,64e949cc7800f79887cdbff6af7173c59123aba5ff0bc1dfb5fe04d5061146f8,2012-09-07T04:24:00.600000 CVE-2011-4450,0,0,8341e421be331ae3835ad61629e75e6dc6dccf91e26b1eece4406fbf61a9c57d,2012-09-13T04:00:00 CVE-2011-4451,0,0,53650d03bdb2fe15bf8e118dc81f37e005d8962ac84853d1f305b149133eb0d4,2024-08-07T00:15:48.580000 CVE-2011-4452,0,0,86dd9b2fb021bf934dce227591d117be237080b165e0e72537f012d03b989bdb,2012-09-06T13:08:18.160000 -CVE-2011-4453,0,1,1ebe7113a1bfc34b2b516c95a0572c0a7bc87960c0f4767422f8bc98d607be92,2024-11-21T01:32:23.293000 +CVE-2011-4453,0,0,1ebe7113a1bfc34b2b516c95a0572c0a7bc87960c0f4767422f8bc98d607be92,2024-11-21T01:32:23.293000 CVE-2011-4454,0,0,32a09f2c97dc953e72d0208dc9302059acc21ca33006e2cdf94e17fdca7a3ed6,2019-11-21T15:23:28.580000 CVE-2011-4455,0,0,dfda9e23baca64545343660e68408338e763572bbf9acb68a4f01ea8e6280b1f,2019-11-21T15:15:45.620000 CVE-2011-4456,0,0,e2dfb2c835d5e95cfbd27f38509769256e96906375219eab3558101759f90c76,2023-11-07T02:09:33.930000 -CVE-2011-4457,0,1,779f733d356eea9b5ef0547b5fd50582bae317d6d3453a80890e9de730a25f2d,2024-11-21T01:32:23.737000 +CVE-2011-4457,0,0,779f733d356eea9b5ef0547b5fd50582bae317d6d3453a80890e9de730a25f2d,2024-11-21T01:32:23.737000 CVE-2011-4458,0,0,5bb843c7ac84e47d193abc166ce1c6607b8c5e83bffc6be6f2cffab599aab55f,2012-09-29T03:13:03.237000 CVE-2011-4459,0,0,28f2244a1b27167702f3195e1ebc21e898da7fbabd3251faeed0649f7678372d,2012-09-29T03:13:03.407000 CVE-2011-4460,0,0,068e1174bc384f18c770af9273156c93c1a22bcc1c703a68a2f33b73b652f382,2017-08-29T01:30:30.007000 -CVE-2011-4461,0,1,b627b7d00065b2aaebe1682a57dd24cf8500a3864a6958561b8fee5650a89154,2024-11-21T01:32:24.347000 -CVE-2011-4462,0,1,770019ab4c84dfe49ea34f1a3e4e729828be4c1194556da3cdd1fecbd7ededba,2024-11-21T01:32:24.550000 -CVE-2011-4465,0,1,8444504fdb0ec3729e296c3e3ae451c6fdb1bf3ada6aedff4011e2d23150a530,2024-11-21T01:32:24.700000 +CVE-2011-4461,0,0,b627b7d00065b2aaebe1682a57dd24cf8500a3864a6958561b8fee5650a89154,2024-11-21T01:32:24.347000 +CVE-2011-4462,0,0,770019ab4c84dfe49ea34f1a3e4e729828be4c1194556da3cdd1fecbd7ededba,2024-11-21T01:32:24.550000 +CVE-2011-4465,0,0,8444504fdb0ec3729e296c3e3ae451c6fdb1bf3ada6aedff4011e2d23150a530,2024-11-21T01:32:24.700000 CVE-2011-4486,0,0,d2a3ce44db10af24ebc491b71b52134124262ed7c1d2dd2d22de3e3d38b5ce5d,2012-03-01T05:00:00 CVE-2011-4487,0,0,e048cd70df0c73b93207eabcc8f2e3da502ebc64b87239659f5e147208a8ce40,2012-03-05T05:00:00 -CVE-2011-4496,0,1,633b71754ddf3b15e608ebc0aa745b5edac63170fcbd6a0654e6762268bea8fb,2024-11-21T01:32:25.090000 -CVE-2011-4497,0,1,d60d1e92e8b6f8f1a58d4f892ac76cc116d1ae77ff883ad442f2235113cefbb5,2024-11-21T01:32:25.223000 -CVE-2011-4498,0,1,eeb06a430e557c17e6e9276ff7b6328050b7af3816dad27c1bde7fb8dbc572ed,2024-11-21T01:32:25.353000 -CVE-2011-4499,0,1,ab8fb15363540a03ab33808c5c0fca17a08fc0f4653554e7bbec577d53a43c43,2024-11-21T01:32:25.483000 -CVE-2011-4500,0,1,9ba2d36d0f14174b071657fa18b523f0112ba31a625096e390e1d094a62fbdfa,2024-11-21T01:32:25.623000 -CVE-2011-4501,0,1,4871d14f6073c1f2258d9571324e9c7a79a886f5f2b1e067c7ac7b7929debe4e,2024-11-21T01:32:25.777000 -CVE-2011-4502,0,1,42036a3817473e49eea1bb83d21af63f406a0631c51ac2df1b8627fd38367a58,2024-11-21T01:32:25.920000 -CVE-2011-4503,0,1,cf84f6946abe1c2460012316feed0af3b81f71f40fc1d297be6b8c246a9f64cb,2024-11-21T01:32:26.073000 -CVE-2011-4504,0,1,e79cbb73367fc496c956f2a501ca3435bd9c0fcde862f066b8be609d080fd3f9,2024-11-21T01:32:26.213000 -CVE-2011-4505,0,1,ebf0dd7917772025a75132d657ea3882642350ea4d13eb600591639c5af9849d,2024-11-21T01:32:26.353000 -CVE-2011-4506,0,1,0bda5b331c2a1b6f2fc415faa2f89b112a70e34ac2cb9466f364eda674734432,2024-11-21T01:32:26.493000 -CVE-2011-4507,0,1,39e0066b157c90c1f40f39049fec43ccb123da33afb6f03d1532a84fe596b91f,2024-11-21T01:32:26.637000 +CVE-2011-4496,0,0,633b71754ddf3b15e608ebc0aa745b5edac63170fcbd6a0654e6762268bea8fb,2024-11-21T01:32:25.090000 +CVE-2011-4497,0,0,d60d1e92e8b6f8f1a58d4f892ac76cc116d1ae77ff883ad442f2235113cefbb5,2024-11-21T01:32:25.223000 +CVE-2011-4498,0,0,eeb06a430e557c17e6e9276ff7b6328050b7af3816dad27c1bde7fb8dbc572ed,2024-11-21T01:32:25.353000 +CVE-2011-4499,0,0,ab8fb15363540a03ab33808c5c0fca17a08fc0f4653554e7bbec577d53a43c43,2024-11-21T01:32:25.483000 +CVE-2011-4500,0,0,9ba2d36d0f14174b071657fa18b523f0112ba31a625096e390e1d094a62fbdfa,2024-11-21T01:32:25.623000 +CVE-2011-4501,0,0,4871d14f6073c1f2258d9571324e9c7a79a886f5f2b1e067c7ac7b7929debe4e,2024-11-21T01:32:25.777000 +CVE-2011-4502,0,0,42036a3817473e49eea1bb83d21af63f406a0631c51ac2df1b8627fd38367a58,2024-11-21T01:32:25.920000 +CVE-2011-4503,0,0,cf84f6946abe1c2460012316feed0af3b81f71f40fc1d297be6b8c246a9f64cb,2024-11-21T01:32:26.073000 +CVE-2011-4504,0,0,e79cbb73367fc496c956f2a501ca3435bd9c0fcde862f066b8be609d080fd3f9,2024-11-21T01:32:26.213000 +CVE-2011-4505,0,0,ebf0dd7917772025a75132d657ea3882642350ea4d13eb600591639c5af9849d,2024-11-21T01:32:26.353000 +CVE-2011-4506,0,0,0bda5b331c2a1b6f2fc415faa2f89b112a70e34ac2cb9466f364eda674734432,2024-11-21T01:32:26.493000 +CVE-2011-4507,0,0,39e0066b157c90c1f40f39049fec43ccb123da33afb6f03d1532a84fe596b91f,2024-11-21T01:32:26.637000 CVE-2011-4508,0,0,84dde1b68c35015ee16af67ea3bbdacd1bc222c2e70a20d2b46a7db65c833508,2012-02-07T05:00:00 CVE-2011-4509,0,0,c058b276c581d1649465bb2d6ac6377e6d5af7c9b75694d78c78c6b6cf06104e,2012-02-06T05:00:00 CVE-2011-4510,0,0,6cf3ba5e91f57ad6f21bb0d1423a44c0b40917eab45d5afd45c44cd8027ac5c1,2012-02-06T05:00:00 @@ -51045,8 +51045,8 @@ CVE-2011-4512,0,0,6c9f31619b468dde4e3d6fb70a440f9863cebb7097b4619173d392a525b014 CVE-2011-4513,0,0,3906d3507194047a94bcf66735122a2e75cf54847a62d688155ec5d736deb24e,2012-02-06T05:00:00 CVE-2011-4514,0,0,554b87266f36c2a326d6a84aa1f6e7bb2bfda2a00be3896dac4b002d117a0521,2012-02-06T05:00:00 CVE-2011-4515,0,0,372de616996292510af77935a4aceace8923acf906ff40481bb8bd569515f86c,2013-05-31T04:00:00 -CVE-2011-4516,0,1,48a7aa971298903ddb99556815031478ccb86a8d13dcb6dc4d02de3c82dc142c,2024-11-21T01:32:27.743000 -CVE-2011-4517,0,1,a8e4126c15d5b18acb1649a964a75e01758be14eacb6938ad6e0b9e94588b843,2024-11-21T01:32:27.893000 +CVE-2011-4516,0,0,48a7aa971298903ddb99556815031478ccb86a8d13dcb6dc4d02de3c82dc142c,2024-11-21T01:32:27.743000 +CVE-2011-4517,0,0,a8e4126c15d5b18acb1649a964a75e01758be14eacb6938ad6e0b9e94588b843,2024-11-21T01:32:27.893000 CVE-2011-4518,0,0,fae50b6fe5563dd9d850d48cd90b4bb7600ad3719bedb6d51004017c0f33eed6,2013-06-03T04:00:00 CVE-2011-4519,0,0,f443d13d44a8f0b858889ed9b069e99e3dc26a6c22037a0868c66d98e1ba383a,2013-05-24T04:00:00 CVE-2011-4520,0,0,c585897c5010e2d8e033bb330bb0489eacb2ec9a73f3cb108bd1056b3007ed9b,2013-05-24T04:00:00 @@ -51056,51 +51056,51 @@ CVE-2011-4523,0,0,b6df1e4f0c9e840d13dcf777ccd261a08f8f1728b2321e72b3f55c48015e66 CVE-2011-4524,0,0,9dd1899c4a9c69c64e92d154eb4f1267565fc2ea4e7ed23eee5543d5668403b7,2018-01-05T02:29:16.053000 CVE-2011-4525,0,0,f65c0d528185cf1b6fb142b2c49bf15a07afb9a714e643b15e98e20b96d11c34,2018-01-05T02:29:16.117000 CVE-2011-4526,0,0,4edd730e50e71b7748403cfe4ed5f6bd9b296b3126b00298aa9d495ec2b84a98,2018-01-05T02:29:16.163000 -CVE-2011-4528,0,1,f8af4f6488955bc898f9581336d7df11ea301b6fa048618cca473695b1b4f920,2024-11-21T01:32:28.990000 -CVE-2011-4529,0,1,bb518fe427ce95c0ffdbf86687f8833ee1159411dfec134fd4845be0b861af9e,2024-11-21T01:32:29.113000 -CVE-2011-4530,0,1,55f08508de13a76165db0e17d9ef749e6c5612d31b96873f494700bacdee146d,2024-11-21T01:32:29.240000 -CVE-2011-4531,0,1,f0878b94815769ef9debaf530889d58377861df82c8cd71d213f252ffa154db2,2024-11-21T01:32:29.357000 -CVE-2011-4532,0,1,e04b828d10bde8c8a51ae667e0d8972041a76fa4230f41d619a6d2af2f157d5e,2024-11-21T01:32:29.463000 +CVE-2011-4528,0,0,f8af4f6488955bc898f9581336d7df11ea301b6fa048618cca473695b1b4f920,2024-11-21T01:32:28.990000 +CVE-2011-4529,0,0,bb518fe427ce95c0ffdbf86687f8833ee1159411dfec134fd4845be0b861af9e,2024-11-21T01:32:29.113000 +CVE-2011-4530,0,0,55f08508de13a76165db0e17d9ef749e6c5612d31b96873f494700bacdee146d,2024-11-21T01:32:29.240000 +CVE-2011-4531,0,0,f0878b94815769ef9debaf530889d58377861df82c8cd71d213f252ffa154db2,2024-11-21T01:32:29.357000 +CVE-2011-4532,0,0,e04b828d10bde8c8a51ae667e0d8972041a76fa4230f41d619a6d2af2f157d5e,2024-11-21T01:32:29.463000 CVE-2011-4533,0,0,c38ee1d795c9047e8f45301d74360ef997bb6514345fda63c2ed395c8f9bc782,2012-02-13T05:00:00 CVE-2011-4534,0,0,2b631b2e62e2e04dfeacd8f565c51b4c192a52520e590fb6069783c9189aef3a,2012-02-13T14:16:06.287000 CVE-2011-4535,0,0,25dd351bf788db31bfb611d8288d2498be39643a7e07add392cf7787cf5c878d,2012-04-03T04:00:00 -CVE-2011-4536,0,1,e2f3ccaac2061df08fb824642830ccaa7ec46471fecee53ddfb1b3f9d937bda7,2024-11-21T01:32:29.910000 -CVE-2011-4537,0,1,1034aa8ba04b0938f96079ad2570a7e6b28af2cd2cd1bf1ff740c50feb00d256,2024-11-21T01:32:30.027000 +CVE-2011-4536,0,0,e2f3ccaac2061df08fb824642830ccaa7ec46471fecee53ddfb1b3f9d937bda7,2024-11-21T01:32:29.910000 +CVE-2011-4537,0,0,1034aa8ba04b0938f96079ad2570a7e6b28af2cd2cd1bf1ff740c50feb00d256,2024-11-21T01:32:30.027000 CVE-2011-4538,0,0,675c98183b18a293cd4a2a324386feab152dabd8ebf853b9051c1644970df8b2,2020-03-10T19:55:51.487000 -CVE-2011-4539,0,1,fb282001d37ec4ac75ef0944d936acaf4c71a5ac85ee672fcdf6be05eeb75f80,2024-11-21T01:32:30.300000 -CVE-2011-4540,0,1,2ba32cb9738640c0078a7ecfa5911591e3e486ce60a2e5339bfcd1c818cdf14e,2024-11-21T01:32:30.477000 -CVE-2011-4541,0,1,5366dbde502a41be97fdcfab43cb7557ad2bd59a4b78dafc35821b963fb53f65,2024-11-21T01:32:30.620000 -CVE-2011-4542,0,1,434ff5734582ef4121fc6f9639c1910f03cceb1eb94e0f60500690ac5cec99ab,2024-11-21T01:32:30.770000 -CVE-2011-4543,0,1,c014e51c88951ea16e1b50d636eb09aea6672bfe3f2fb7b938944cf63b409e40,2024-11-21T01:32:30.913000 -CVE-2011-4544,0,1,bd93c347fd1a42c93f3c0a3ae1aa81a84fcc905ee26425e8dc814878c591e672,2024-11-21T01:32:31.063000 -CVE-2011-4545,0,1,a515eb7c3d5599710c28458d2cffacbf3f54254f0834251bb9d9576ad9ecb0f8,2024-11-21T01:32:31.213000 -CVE-2011-4547,0,1,ade97200e0dd438fab3ffdbf989fe739666da6c8d1491f96453a617183dd8df0,2024-11-21T01:32:31.367000 -CVE-2011-4548,0,1,c678030a0064897773dcdffa7f6e435e12728a81e000bc71f97140596a638803,2024-11-21T01:32:31.520000 +CVE-2011-4539,0,0,fb282001d37ec4ac75ef0944d936acaf4c71a5ac85ee672fcdf6be05eeb75f80,2024-11-21T01:32:30.300000 +CVE-2011-4540,0,0,2ba32cb9738640c0078a7ecfa5911591e3e486ce60a2e5339bfcd1c818cdf14e,2024-11-21T01:32:30.477000 +CVE-2011-4541,0,0,5366dbde502a41be97fdcfab43cb7557ad2bd59a4b78dafc35821b963fb53f65,2024-11-21T01:32:30.620000 +CVE-2011-4542,0,0,434ff5734582ef4121fc6f9639c1910f03cceb1eb94e0f60500690ac5cec99ab,2024-11-21T01:32:30.770000 +CVE-2011-4543,0,0,c014e51c88951ea16e1b50d636eb09aea6672bfe3f2fb7b938944cf63b409e40,2024-11-21T01:32:30.913000 +CVE-2011-4544,0,0,bd93c347fd1a42c93f3c0a3ae1aa81a84fcc905ee26425e8dc814878c591e672,2024-11-21T01:32:31.063000 +CVE-2011-4545,0,0,a515eb7c3d5599710c28458d2cffacbf3f54254f0834251bb9d9576ad9ecb0f8,2024-11-21T01:32:31.213000 +CVE-2011-4547,0,0,ade97200e0dd438fab3ffdbf989fe739666da6c8d1491f96453a617183dd8df0,2024-11-21T01:32:31.367000 +CVE-2011-4548,0,0,c678030a0064897773dcdffa7f6e435e12728a81e000bc71f97140596a638803,2024-11-21T01:32:31.520000 CVE-2011-4551,0,0,958953fc27af4cce4a0d6aff0e0d032b0975bd3c0828640896293df06427f747,2012-10-24T04:00:00 -CVE-2011-4552,0,1,2a4acf4de6839c426135f77d6f67e8260630df6c62d27b3567b90d66723b8dc2,2024-11-21T01:32:31.827000 -CVE-2011-4553,0,1,8914778c64882fe38475b42e06d82d6b129e382e21f46077eba1a4cc91dd419f,2024-11-21T01:32:31.963000 -CVE-2011-4554,0,1,aca9f6277f96620e7da188a7a85baea464c87922c4d8e87447deb52a940e5a42,2024-11-21T01:32:32.103000 -CVE-2011-4555,0,1,d06be417e7f1c7ba38cd304f9630de822bb3a5217e1568ff931a9e33e7c1aa84,2024-11-21T01:32:32.243000 +CVE-2011-4552,0,0,2a4acf4de6839c426135f77d6f67e8260630df6c62d27b3567b90d66723b8dc2,2024-11-21T01:32:31.827000 +CVE-2011-4553,0,0,8914778c64882fe38475b42e06d82d6b129e382e21f46077eba1a4cc91dd419f,2024-11-21T01:32:31.963000 +CVE-2011-4554,0,0,aca9f6277f96620e7da188a7a85baea464c87922c4d8e87447deb52a940e5a42,2024-11-21T01:32:32.103000 +CVE-2011-4555,0,0,d06be417e7f1c7ba38cd304f9630de822bb3a5217e1568ff931a9e33e7c1aa84,2024-11-21T01:32:32.243000 CVE-2011-4558,0,0,7184e2bd394bff123c8cab5a66c134f3c4e2b2ce0caf612383a893d88aa3e2f1,2020-01-30T16:17:17.103000 -CVE-2011-4559,0,1,8c45f05d1e028c544b727b280dd2fd56dc139a54f5c2c0138d76e9aecaee9a38,2024-11-21T01:32:32.530000 -CVE-2011-4560,0,1,e87d633024084a6242ee47a3054e1b89bf2a671636f90cd47d95242fe902e43f,2024-11-21T01:32:32.703000 -CVE-2011-4561,0,1,5c785c89fab172494064721fcc67e6c365e671df9de84cfe9598374313861bb3,2024-11-21T01:32:32.880000 -CVE-2011-4562,0,1,0da4fa184948deacc2d170db6dcfc8fe1a3dbcfee1929b1cffd1b9920b112484,2024-11-21T01:32:33.030000 -CVE-2011-4563,0,1,826ed03b2731422e7b9b8f3c9031d174db6cf01d89e172c624e8b721a014d3d5,2024-11-21T01:32:33.187000 -CVE-2011-4564,0,1,09ac4a6cca58d1e9aa0c370004bfdf7b1255d9d741f540d8152ef83f29dac663,2024-11-21T01:32:33.340000 -CVE-2011-4565,0,1,c2bbc25a825673ae2dd960bee082ec09136474ceabb5fe943db29a9cb4664f18,2024-11-21T01:32:33.480000 -CVE-2011-4566,0,1,6be06536f378756866417b05404199ff886424a5aab69a7e644f7e42ee960afd,2024-11-21T01:32:33.623000 -CVE-2011-4567,0,1,9a4ed38e1bbcaa2959793b518c9c8a44717b7aea7e00e9632bb4bcc70576986d,2024-11-21T01:32:33.793000 -CVE-2011-4568,0,1,3ebd659203627dd1ca776f997d192f99ddb1427521ec206e0ae79b6c3411e0f4,2024-11-21T01:32:33.940000 -CVE-2011-4569,0,1,1ab2b5685ae38cffcc74565deb8520004b31ef317809aae1faeaead5aee69e96,2024-11-21T01:32:34.097000 -CVE-2011-4570,0,1,13675cfe5f09386e60d3efbfdcd539da6a65d813b2803c96d7c320696041faa8,2024-11-21T01:32:34.250000 -CVE-2011-4571,0,1,7afe05bba91fe245fbeb3a3ce79a868498f3c70901d9a4defd046e735737c521,2024-11-21T01:32:34.410000 -CVE-2011-4572,0,1,b0c5a33a813d053df08e518ed402fe6fce82fdba3ba444e886fd87c70392cda6,2024-11-21T01:32:34.557000 +CVE-2011-4559,0,0,8c45f05d1e028c544b727b280dd2fd56dc139a54f5c2c0138d76e9aecaee9a38,2024-11-21T01:32:32.530000 +CVE-2011-4560,0,0,e87d633024084a6242ee47a3054e1b89bf2a671636f90cd47d95242fe902e43f,2024-11-21T01:32:32.703000 +CVE-2011-4561,0,0,5c785c89fab172494064721fcc67e6c365e671df9de84cfe9598374313861bb3,2024-11-21T01:32:32.880000 +CVE-2011-4562,0,0,0da4fa184948deacc2d170db6dcfc8fe1a3dbcfee1929b1cffd1b9920b112484,2024-11-21T01:32:33.030000 +CVE-2011-4563,0,0,826ed03b2731422e7b9b8f3c9031d174db6cf01d89e172c624e8b721a014d3d5,2024-11-21T01:32:33.187000 +CVE-2011-4564,0,0,09ac4a6cca58d1e9aa0c370004bfdf7b1255d9d741f540d8152ef83f29dac663,2024-11-21T01:32:33.340000 +CVE-2011-4565,0,0,c2bbc25a825673ae2dd960bee082ec09136474ceabb5fe943db29a9cb4664f18,2024-11-21T01:32:33.480000 +CVE-2011-4566,0,0,6be06536f378756866417b05404199ff886424a5aab69a7e644f7e42ee960afd,2024-11-21T01:32:33.623000 +CVE-2011-4567,0,0,9a4ed38e1bbcaa2959793b518c9c8a44717b7aea7e00e9632bb4bcc70576986d,2024-11-21T01:32:33.793000 +CVE-2011-4568,0,0,3ebd659203627dd1ca776f997d192f99ddb1427521ec206e0ae79b6c3411e0f4,2024-11-21T01:32:33.940000 +CVE-2011-4569,0,0,1ab2b5685ae38cffcc74565deb8520004b31ef317809aae1faeaead5aee69e96,2024-11-21T01:32:34.097000 +CVE-2011-4570,0,0,13675cfe5f09386e60d3efbfdcd539da6a65d813b2803c96d7c320696041faa8,2024-11-21T01:32:34.250000 +CVE-2011-4571,0,0,7afe05bba91fe245fbeb3a3ce79a868498f3c70901d9a4defd046e735737c521,2024-11-21T01:32:34.410000 +CVE-2011-4572,0,0,b0c5a33a813d053df08e518ed402fe6fce82fdba3ba444e886fd87c70392cda6,2024-11-21T01:32:34.557000 CVE-2011-4573,0,0,cd98c971b54e91630924199d05c1f267f19bf3f21dbce12a0851506b4a694d2d,2014-04-01T14:38:49.943000 CVE-2011-4574,0,0,98ebc1068c65ab42ec658adffa4089d97afc43ed3a1abfeb8f3c94ebc78cc8f5,2021-10-28T17:55:50.970000 CVE-2011-4575,0,0,28a9ecaaf0480c047f325a9f2da3bb6fa6db441645a475becca9356d7e5c4b4a,2023-02-13T00:21:23.617000 -CVE-2011-4576,0,1,18467d49d79004c0dc70939131314c4332102e152dfb5900a3068d515ff70ad8,2024-11-21T01:32:35.127000 -CVE-2011-4577,0,1,969e2200e535524f9342ffa0afe70092d8c9d7938f4aaa5fff5b152fb249feb2,2024-11-21T01:32:35.300000 +CVE-2011-4576,0,0,18467d49d79004c0dc70939131314c4332102e152dfb5900a3068d515ff70ad8,2024-11-21T01:32:35.127000 +CVE-2011-4577,0,0,969e2200e535524f9342ffa0afe70092d8c9d7938f4aaa5fff5b152fb249feb2,2024-11-21T01:32:35.300000 CVE-2011-4578,0,0,3dea0d18746ea5608ed87a7b1d1632fc429c3c291ef363b9277be6df96de3db7,2013-04-05T03:06:21.327000 CVE-2011-4579,0,0,dc1f02138e3cd5f74d9d996d1f5f562be91db9a70cf2be6b28c6d65e7dca0c01,2023-11-07T02:09:34.660000 CVE-2011-4580,0,0,5937a4b500324f41c205f208b4fb5411c5cae291e05157e1baf8a96fe435bb97,2014-03-10T19:18:45.167000 @@ -51119,33 +51119,33 @@ CVE-2011-4592,0,0,12138220fef9fdee8e742ec2d34cf52eacd248938fa118e5712d72cf34c929 CVE-2011-4593,0,0,2c15e2508d606049cea5812e18e785ebcdcd4c3ee634a404f4e66b72caffdae0,2023-02-13T01:21:54.710000 CVE-2011-4594,0,0,46cafc69917df95633b55be117f1dce1d77efd2f2932a2a4e2ffd46ee5150008,2023-02-13T00:21:28.573000 CVE-2011-4595,0,0,c636472f87aff21e2078fd8a9995f1279cf0222b8f61b76b8b60c7cc7f8b7827,2020-01-13T18:39:25.017000 -CVE-2011-4596,0,1,2a7f27721329ed33a73f8e8dcc630eb117667c8d296542bde030a1b23058a7c1,2024-11-21T01:32:37.580000 -CVE-2011-4597,0,1,d24561b81c2e3fdf9a1d79ece7c1ad134c56ed79c179db92fb4af86e72e40534,2024-11-21T01:32:37.697000 -CVE-2011-4598,0,1,ef6a20668ef73a68fabae81909bb02befa90e876ae3f538f0c61ad22cdd3c2ee,2024-11-21T01:32:37.863000 +CVE-2011-4596,0,0,2a7f27721329ed33a73f8e8dcc630eb117667c8d296542bde030a1b23058a7c1,2024-11-21T01:32:37.580000 +CVE-2011-4597,0,0,d24561b81c2e3fdf9a1d79ece7c1ad134c56ed79c179db92fb4af86e72e40534,2024-11-21T01:32:37.697000 +CVE-2011-4598,0,0,ef6a20668ef73a68fabae81909bb02befa90e876ae3f538f0c61ad22cdd3c2ee,2024-11-21T01:32:37.863000 CVE-2011-4599,0,0,d5cbe51f36a034b8f7c4f401ebfd7995d09503fad2d157da2d837130206660fe,2023-02-13T03:23:54.917000 CVE-2011-4600,0,0,40499c507dc448a958ebe8967ab7fdf71301a1f96d4e304abedd2322fe8c43b1,2023-02-13T03:23:55.333000 -CVE-2011-4601,0,1,a8569a5236f860e504338a1be5954d1088e2438d55b8dee0eb7417cff1a06c17,2024-11-21T01:32:38.303000 -CVE-2011-4602,0,1,f76de2ac2d21c77dbfad1af95c93aa38b7f6b2259ecf05be3c864e2264b20b5e,2024-11-21T01:32:38.447000 -CVE-2011-4603,0,1,76d7b6f002efde150b2ce0c81d1c7e4c0944780b47309a43bed5f2cf2d059e67,2024-11-21T01:32:38.577000 +CVE-2011-4601,0,0,a8569a5236f860e504338a1be5954d1088e2438d55b8dee0eb7417cff1a06c17,2024-11-21T01:32:38.303000 +CVE-2011-4602,0,0,f76de2ac2d21c77dbfad1af95c93aa38b7f6b2259ecf05be3c864e2264b20b5e,2024-11-21T01:32:38.447000 +CVE-2011-4603,0,0,76d7b6f002efde150b2ce0c81d1c7e4c0944780b47309a43bed5f2cf2d059e67,2024-11-21T01:32:38.577000 CVE-2011-4604,0,0,6d80e6fa1a855f0fab69b4f7a754b33f1d7b2091065e015c3c1b89ff0897c719,2023-02-13T00:21:49.200000 CVE-2011-4605,0,0,d559e55236ab9e3028beeaae7495a88981e06ea3eef231d896bbf3d91450b3b7,2023-02-13T00:22:18.517000 -CVE-2011-4606,0,1,bf40c09b801e93109f60f52b32ebb633cf5194b72021ff4fd1063a2436ff3fd1,2024-11-21T01:32:38.970000 +CVE-2011-4606,0,0,bf40c09b801e93109f60f52b32ebb633cf5194b72021ff4fd1063a2436ff3fd1,2024-11-21T01:32:38.970000 CVE-2011-4607,0,0,956a07c8ec86ebecdd3c2e137126a6908cb57b5ecce321563115dbd026057dea,2019-03-21T17:04:58.200000 -CVE-2011-4608,0,1,413148c7b84f58e952c8e2575f800358a581f4fd846f7eafae89063785096c39,2024-11-21T01:32:39.200000 +CVE-2011-4608,0,0,413148c7b84f58e952c8e2575f800358a581f4fd846f7eafae89063785096c39,2024-11-21T01:32:39.200000 CVE-2011-4609,0,0,d6df2752b3c6197bcdcc63e320ab1f5414329000b75186b4f6e860c5197f1be8,2013-05-03T04:00:00 CVE-2011-4610,0,0,fb3581a9d387829d377678b3c43c570e705602aaea958e24bc8068b8de3bed33,2014-03-06T04:33:37.557000 CVE-2011-4611,0,0,c366bed5e4a935718170895d5acc0c60f1740e6cf3443347af5129ef9380e8e8,2023-02-13T03:23:59.103000 CVE-2011-4612,0,0,86708244a14b00acf0ef098efc675eb02c7e6deeb1dd85be81309bc831d64102,2021-09-09T12:51:38.243000 CVE-2011-4613,0,0,b8344a58afba99d698fb03305cce1421b7021f0360edb1709f1c166b6f50d407,2020-08-24T16:52:43.130000 CVE-2011-4614,0,0,37fd3fd2da260774677db1cc6a066b2a91c3185b2042d90cf0dfcb9e8d3a0345,2012-02-29T05:00:00 -CVE-2011-4615,0,1,f6bb17df59d38ac6244daed9bfb681c636e329b2494a0823501ae222e132b61a,2024-11-21T01:32:40.070000 -CVE-2011-4616,0,1,b14cf806abd1cfa4283416c5c1dad976f3ffe4b0ba2c84f4e43678b201a8495e,2024-11-21T01:32:40.200000 -CVE-2011-4617,0,1,158d46763f6031cac687d57794a9fd31b14f9c625085565abf8ae850b0fa2520,2024-11-21T01:32:40.343000 +CVE-2011-4615,0,0,f6bb17df59d38ac6244daed9bfb681c636e329b2494a0823501ae222e132b61a,2024-11-21T01:32:40.070000 +CVE-2011-4616,0,0,b14cf806abd1cfa4283416c5c1dad976f3ffe4b0ba2c84f4e43678b201a8495e,2024-11-21T01:32:40.200000 +CVE-2011-4617,0,0,158d46763f6031cac687d57794a9fd31b14f9c625085565abf8ae850b0fa2520,2024-11-21T01:32:40.343000 CVE-2011-4618,0,0,f5e1d762dbc5cc1c97b1b10545b003d61956196e5aa5d2afc345dd9fd262d09c,2023-11-07T02:09:35.027000 -CVE-2011-4619,0,1,7c162291358d792639c3214eeaa0c85f25870ce25beedb7fd2a004ccb4c2de46,2024-11-21T01:32:40.597000 -CVE-2011-4620,0,1,e26605b956e12d6ac4e63176e8ae4f15037d6beacb0cc198d292b5149b6607ff,2024-11-21T01:32:40.770000 +CVE-2011-4619,0,0,7c162291358d792639c3214eeaa0c85f25870ce25beedb7fd2a004ccb4c2de46,2024-11-21T01:32:40.597000 +CVE-2011-4620,0,0,e26605b956e12d6ac4e63176e8ae4f15037d6beacb0cc198d292b5149b6607ff,2024-11-21T01:32:40.770000 CVE-2011-4621,0,0,4d991890854ed5a8838a88daea291d1434589f42a0e2ef1c9310f89617fc946b,2023-02-13T03:23:59.627000 -CVE-2011-4622,0,1,e7c2b7a48a483cf75f00a770feed6c2e23b584e5817739e423ff39b996b6dfab,2024-11-21T01:32:41.037000 +CVE-2011-4622,0,0,e7c2b7a48a483cf75f00a770feed6c2e23b584e5817739e423ff39b996b6dfab,2024-11-21T01:32:41.037000 CVE-2011-4623,0,0,2ec9dae4ffdc9dfb05e17105fe723bd761b3949eb05b113e36a92f2868878c9d,2023-02-13T01:21:58.190000 CVE-2011-4624,0,0,37270c319369827df8000559e91e00a7d8e49bacde5a6eaa03591eb91d4761cf,2018-10-09T19:33:30.887000 CVE-2011-4625,0,0,91a38a44a5260b9b3207d5c36f9282e30d448619ff646d5d83dc97134e80c607,2020-08-18T15:05:58.063000 @@ -51156,135 +51156,135 @@ CVE-2011-4629,0,0,120e487cc710cee68d93fc8dd58a42096eb97cde8271580b393696555c31d3 CVE-2011-4630,0,0,5a76ddf311ed12fa34888838dadbfa0a16e5ad9c9bdcc1502a0c621cfba58437,2019-11-08T17:45:11.527000 CVE-2011-4631,0,0,67057c12318b13ae177b386517c4c49623c93f62ab381c4d875b0e8f24522978,2019-11-08T17:42:48.580000 CVE-2011-4632,0,0,1c1078a3bf9733de47eccd0c219544a75466a9737eea0bb76f21e14fc0cc6ec7,2019-11-08T15:38:36.097000 -CVE-2011-4634,0,1,704d03911fbd8d45a02a934f111288e34a2ec209c27427fdcf740c68f12fb560,2024-11-21T01:32:42.307000 +CVE-2011-4634,0,0,704d03911fbd8d45a02a934f111288e34a2ec209c27427fdcf740c68f12fb560,2024-11-21T01:32:42.307000 CVE-2011-4638,0,0,0a3b965e53e6a4844a33f3e50773a1651f13b1c182f33aa959c274e88dc15d46,2012-10-08T10:47:44.903000 CVE-2011-4639,0,0,49822cbde5004d1ccae3013af262ed7660be1b0bd0531845626b02db71e0cd68,2012-10-08T10:47:44.950000 CVE-2011-4640,0,0,5e82fe2a0727c2c40ebc9645236d73510502eebc7fecfd4ae89a9ab23c2e3d80,2012-10-08T10:47:44.980000 -CVE-2011-4642,0,1,2ee85805325b53df4852fa6b4ce1bf91f7aa5e58dcbd2f40bafa8d32dad9b6d3,2024-11-21T01:32:42.867000 -CVE-2011-4643,0,1,3eb4318ebd10bf3dc95b024d52e00f038b03de66063d1a75c028ed25fb8c2350,2024-11-21T01:32:43.043000 -CVE-2011-4644,0,1,48006fc35356c8aac37d5254790766637f7f1d9d6f80ebac7c2d95b4d0ce8a3c,2024-11-21T01:32:43.203000 -CVE-2011-4646,0,1,2d40583288bc0ba7066c1122746ca4aead747b00cb5d612d838371684d07389a,2024-11-21T01:32:43.360000 -CVE-2011-4647,0,1,9d5f5e60589619156058076dcbd824ed60fb5472eda48752bed502fdb8f18496,2024-11-21T01:32:43.503000 +CVE-2011-4642,0,0,2ee85805325b53df4852fa6b4ce1bf91f7aa5e58dcbd2f40bafa8d32dad9b6d3,2024-11-21T01:32:42.867000 +CVE-2011-4643,0,0,3eb4318ebd10bf3dc95b024d52e00f038b03de66063d1a75c028ed25fb8c2350,2024-11-21T01:32:43.043000 +CVE-2011-4644,0,0,48006fc35356c8aac37d5254790766637f7f1d9d6f80ebac7c2d95b4d0ce8a3c,2024-11-21T01:32:43.203000 +CVE-2011-4646,0,0,2d40583288bc0ba7066c1122746ca4aead747b00cb5d612d838371684d07389a,2024-11-21T01:32:43.360000 +CVE-2011-4647,0,0,9d5f5e60589619156058076dcbd824ed60fb5472eda48752bed502fdb8f18496,2024-11-21T01:32:43.503000 CVE-2011-4650,0,0,f1cb2e71d670f1bdfedbb6e4eb5067cc9544604f4e0f9347939232c9af34a13e,2017-08-25T18:37:46.043000 -CVE-2011-4659,0,1,a713cea5b1b399919fe15fdcd565bed6972350892dfa7fbb02a697e91b18ce8d,2024-11-21T01:32:43.777000 +CVE-2011-4659,0,0,a713cea5b1b399919fe15fdcd565bed6972350892dfa7fbb02a697e91b18ce8d,2024-11-21T01:32:43.777000 CVE-2011-4661,0,0,204615e94e26cd0c9ccfefa386dc0e5659418cb907bc2ae73da5db0bf36f18c0,2020-03-02T15:10:50.900000 CVE-2011-4667,0,0,0dd39962489823d269eed31d328c45fc579869f9ae47afaea7c27eccfa285af7,2017-10-06T17:30:00.557000 -CVE-2011-4668,0,1,dcb6d7d2f608ffbdd74cb9f7b686ef6c0d6771c7b2a8b04f3a45e44e03c2403e,2024-11-21T01:32:44.117000 -CVE-2011-4669,0,1,f1f611d6bacc79d83cf66860188ed8f037b38908fae4b375cd1e5ada4ffe4f57,2024-11-21T01:32:44.270000 -CVE-2011-4670,0,1,3a5b8703729c2dda76bef108d90ababed1ff75a93bc6df82f8e4d5ee63302c4a,2024-11-21T01:32:44.423000 -CVE-2011-4671,0,1,47013e327fd5ac28778a465338c694daeea7351a44a7745dfe9036d4263efd8d,2024-11-21T01:32:44.580000 -CVE-2011-4672,0,1,49199f2df0c84681cf97ebc0060a58a9c65ad4e15f46095d052a031f097810f5,2024-11-21T01:32:44.737000 -CVE-2011-4673,0,1,6c1a7ccf471125eb5bcfec56958f6b5ff040f2d18a155728d1c32fee37610f31,2024-11-21T01:32:44.890000 -CVE-2011-4674,0,1,caf050210fcbcf975d5f53419a130637f42a79ca605d4f25dba7d3467d47554f,2024-11-21T01:32:45.043000 -CVE-2011-4675,0,1,48455f2289e53e7014b956c2784af111861087fc4f8337c6b10dc9428fd8f6dc,2024-11-21T01:32:45.187000 -CVE-2011-4677,0,1,9044e9153673a456b8a3c54a48edb0962e0a26c3cdb6df6cf21b457fde0a47ff,2024-11-21T01:32:45.337000 -CVE-2011-4678,0,1,319eec471492069dc687596e630bbb2f1c724213ffc1ef3a68d19f13590a9e84,2024-11-21T01:32:45.483000 -CVE-2011-4679,0,1,4e34a04b05d871e01d894740247ea7e85e6468a67cb7fc043ede7e6414a23e6e,2024-11-21T01:32:45.627000 -CVE-2011-4680,0,1,c2b031de1e948d583d22e83959d4ad2f98b4af1140ac1aac251f10acc8a2ddbf,2024-11-21T01:32:45.773000 -CVE-2011-4681,0,1,dc7d9b0cfde4263574dd9e113798454b8f83212abf78d2d672d71adba0719965,2024-11-21T01:32:45.913000 -CVE-2011-4682,0,1,b525b8625e81e5cdc4812b3312476a83be1faca4ddefd5becf6f382f5c38073e,2024-11-21T01:32:46.083000 -CVE-2011-4683,0,1,0255307fc86f5446b31c6b26f31935f52ba372eb62e3e2e60f0da10332c7375a,2024-11-21T01:32:46.247000 -CVE-2011-4684,0,1,b6ecbf6010ee2791fc7ca37ccf19c7c71478deb21b85224c49d644a39396532f,2024-11-21T01:32:46.433000 -CVE-2011-4685,0,1,f849ba775434a2dc12cb5fa934a1f6b0bdcf70ec082a8c4e76cb5f34eb5ca0b5,2024-11-21T01:32:46.590000 -CVE-2011-4686,0,1,89210fc2b7ccd8cc6ba4ad259eec5ce32bc0375b084692870ae9260f23ec637c,2024-11-21T01:32:46.763000 -CVE-2011-4687,0,1,db526c0322f56daa4ab0a5fbb5d77a484ba5830fb35f1c999ce7a3a9c583e78e,2024-11-21T01:32:46.930000 -CVE-2011-4688,0,1,034888883acd11874cbbcaa8ce49bd9e5fc6424c3cc20c875af812e447919364,2024-11-21T01:32:47.087000 -CVE-2011-4689,0,1,bd135669663162b017bb7316646756e1535c427659b5f7cde127666d77e0f6b5,2024-11-21T01:32:47.230000 -CVE-2011-4690,0,1,ffff2d3b58891dbf7badb58d4ba62256dd6a87adeb2fc5cd0e2f1ec33b573c39,2024-11-21T01:32:47.367000 -CVE-2011-4691,0,1,7bda162e23938be89a362daf953ecd81889910d4f2eda7706e2ccb625acfd902,2024-11-21T01:32:47.510000 -CVE-2011-4692,0,1,efe9de6365a0fa7c885a20a5c86b1c61add7d789d9807d2a6abe52329321d50d,2024-11-21T01:32:47.650000 -CVE-2011-4693,0,1,5fdfbc75f296caca84a95e6173bbd6c1eefb41ea1881c2fc11b9a6468ec0c240,2024-11-21T01:32:47.800000 -CVE-2011-4694,0,1,a1bce82469082c6cd30191d3a5317a06fd4e51f4470a5053eb0b27f7cc0517d5,2024-11-21T01:32:47.950000 -CVE-2011-4695,0,1,e7d53035783c9e3240f69dba05248a689f5625930547dd8780e55722587cd916,2024-11-21T01:32:48.100000 +CVE-2011-4668,0,0,dcb6d7d2f608ffbdd74cb9f7b686ef6c0d6771c7b2a8b04f3a45e44e03c2403e,2024-11-21T01:32:44.117000 +CVE-2011-4669,0,0,f1f611d6bacc79d83cf66860188ed8f037b38908fae4b375cd1e5ada4ffe4f57,2024-11-21T01:32:44.270000 +CVE-2011-4670,0,0,3a5b8703729c2dda76bef108d90ababed1ff75a93bc6df82f8e4d5ee63302c4a,2024-11-21T01:32:44.423000 +CVE-2011-4671,0,0,47013e327fd5ac28778a465338c694daeea7351a44a7745dfe9036d4263efd8d,2024-11-21T01:32:44.580000 +CVE-2011-4672,0,0,49199f2df0c84681cf97ebc0060a58a9c65ad4e15f46095d052a031f097810f5,2024-11-21T01:32:44.737000 +CVE-2011-4673,0,0,6c1a7ccf471125eb5bcfec56958f6b5ff040f2d18a155728d1c32fee37610f31,2024-11-21T01:32:44.890000 +CVE-2011-4674,0,0,caf050210fcbcf975d5f53419a130637f42a79ca605d4f25dba7d3467d47554f,2024-11-21T01:32:45.043000 +CVE-2011-4675,0,0,48455f2289e53e7014b956c2784af111861087fc4f8337c6b10dc9428fd8f6dc,2024-11-21T01:32:45.187000 +CVE-2011-4677,0,0,9044e9153673a456b8a3c54a48edb0962e0a26c3cdb6df6cf21b457fde0a47ff,2024-11-21T01:32:45.337000 +CVE-2011-4678,0,0,319eec471492069dc687596e630bbb2f1c724213ffc1ef3a68d19f13590a9e84,2024-11-21T01:32:45.483000 +CVE-2011-4679,0,0,4e34a04b05d871e01d894740247ea7e85e6468a67cb7fc043ede7e6414a23e6e,2024-11-21T01:32:45.627000 +CVE-2011-4680,0,0,c2b031de1e948d583d22e83959d4ad2f98b4af1140ac1aac251f10acc8a2ddbf,2024-11-21T01:32:45.773000 +CVE-2011-4681,0,0,dc7d9b0cfde4263574dd9e113798454b8f83212abf78d2d672d71adba0719965,2024-11-21T01:32:45.913000 +CVE-2011-4682,0,0,b525b8625e81e5cdc4812b3312476a83be1faca4ddefd5becf6f382f5c38073e,2024-11-21T01:32:46.083000 +CVE-2011-4683,0,0,0255307fc86f5446b31c6b26f31935f52ba372eb62e3e2e60f0da10332c7375a,2024-11-21T01:32:46.247000 +CVE-2011-4684,0,0,b6ecbf6010ee2791fc7ca37ccf19c7c71478deb21b85224c49d644a39396532f,2024-11-21T01:32:46.433000 +CVE-2011-4685,0,0,f849ba775434a2dc12cb5fa934a1f6b0bdcf70ec082a8c4e76cb5f34eb5ca0b5,2024-11-21T01:32:46.590000 +CVE-2011-4686,0,0,89210fc2b7ccd8cc6ba4ad259eec5ce32bc0375b084692870ae9260f23ec637c,2024-11-21T01:32:46.763000 +CVE-2011-4687,0,0,db526c0322f56daa4ab0a5fbb5d77a484ba5830fb35f1c999ce7a3a9c583e78e,2024-11-21T01:32:46.930000 +CVE-2011-4688,0,0,034888883acd11874cbbcaa8ce49bd9e5fc6424c3cc20c875af812e447919364,2024-11-21T01:32:47.087000 +CVE-2011-4689,0,0,bd135669663162b017bb7316646756e1535c427659b5f7cde127666d77e0f6b5,2024-11-21T01:32:47.230000 +CVE-2011-4690,0,0,ffff2d3b58891dbf7badb58d4ba62256dd6a87adeb2fc5cd0e2f1ec33b573c39,2024-11-21T01:32:47.367000 +CVE-2011-4691,0,0,7bda162e23938be89a362daf953ecd81889910d4f2eda7706e2ccb625acfd902,2024-11-21T01:32:47.510000 +CVE-2011-4692,0,0,efe9de6365a0fa7c885a20a5c86b1c61add7d789d9807d2a6abe52329321d50d,2024-11-21T01:32:47.650000 +CVE-2011-4693,0,0,5fdfbc75f296caca84a95e6173bbd6c1eefb41ea1881c2fc11b9a6468ec0c240,2024-11-21T01:32:47.800000 +CVE-2011-4694,0,0,a1bce82469082c6cd30191d3a5317a06fd4e51f4470a5053eb0b27f7cc0517d5,2024-11-21T01:32:47.950000 +CVE-2011-4695,0,0,e7d53035783c9e3240f69dba05248a689f5625930547dd8780e55722587cd916,2024-11-21T01:32:48.100000 CVE-2011-4696,0,0,4bab21a5c6f27c2205820ee7e483b4bf86e46545b4630546aeee458afccab7ed,2017-08-29T01:30:32.427000 -CVE-2011-4697,0,1,5302299d51d16305777dcb7d6bbd753d591a50b84848b3a2add3eeabf94c5e94,2024-11-21T01:32:48.437000 -CVE-2011-4698,0,1,f4be1f78ceb79633eafa3728b5f175883d6ad37f7bc13e43cc18b19014879f0f,2024-11-21T01:32:48.580000 -CVE-2011-4699,0,1,a7a56ab8deacd44d2660e369a0b259db39edffdab7ad503654256b695cb61b3c,2024-11-21T01:32:48.730000 -CVE-2011-4700,0,1,c9ccc2b856843736c5191b88200bd54ff34da47b7385b3ae4b61ddea5fcdb5c7,2024-11-21T01:32:48.867000 -CVE-2011-4701,0,1,99edacd77ebe8015901609f93c15d5d0a90615cc8f4bf081214acfbeb06258a5,2024-11-21T01:32:49 -CVE-2011-4702,0,1,b69439bdf45531747de87bf3ced8e7fdec22782ccaa9a353b44e9c8d7b55996d,2024-11-21T01:32:49.140000 -CVE-2011-4703,0,1,2d8eac02654bc33c9c49955eaf5d9e591e7eb17ea960b2bf91b8b30aeef9812b,2024-11-21T01:32:49.280000 -CVE-2011-4704,0,1,b89246c512869507f7b044b2d5ae6ee53e498352d5c3969a7a7019d1be7b6e24,2024-11-21T01:32:49.423000 -CVE-2011-4705,0,1,3864d29aed5ebaeb333fbb9384defed46bc1accc7a0fbf320feaa6d3e7b0fb46,2024-11-21T01:32:49.563000 -CVE-2011-4707,0,1,90a66d905591747ac42b11584daef6ba1bba01c6624a88f8e7accf11a51f774f,2024-11-21T01:32:49.703000 -CVE-2011-4708,0,1,46118068087b19af35c9af21e1ecb301ad5886cb8285d702555c0b0c39d17e37,2024-11-21T01:32:49.843000 -CVE-2011-4709,0,1,23d49d0030aa4aadb83ff9d176b94189bfdd8c30b559461e14c9dc471678f6cc,2024-11-21T01:32:49.987000 -CVE-2011-4710,0,1,10135078052c96d139d5fea893c7b02af4148e301fdcdc7deb82eb365432100f,2024-11-21T01:32:50.140000 -CVE-2011-4711,0,1,ad59e5d681e659cc93b91b57c2571dd4f4ff96293ea15ab011d988510fc60fb0,2024-11-21T01:32:50.280000 -CVE-2011-4712,0,1,e52608444fecd5c7cc333fa145c7127c466b87a668096480dbd1b827087ec04e,2024-11-21T01:32:50.443000 -CVE-2011-4713,0,1,2ec2aeb3d2862daa5e7137a41fe562ed48bfaa91345ca58f56610dc36e0f7597,2024-11-21T01:32:50.587000 -CVE-2011-4714,0,1,74fa3aa82b737f6595900647ea971b1614ca20911f25457820058108b07b2552,2024-11-21T01:32:50.737000 -CVE-2011-4715,0,1,18de0b881d1217958e37f351bdc8b8dd58419b826fce10398c064e06cbeefa19,2024-11-21T01:32:50.897000 -CVE-2011-4716,0,1,9e577a1d0a10908c5ed4233fcab3e5e9da9dc7e1b8cd4ba33443daefa5152cf7,2024-11-21T01:32:51.050000 -CVE-2011-4717,0,1,1f10f0a21b3e06fa0893e14a24a8c592d340b047fef6715cff001da7531c5248,2024-11-21T01:32:51.190000 +CVE-2011-4697,0,0,5302299d51d16305777dcb7d6bbd753d591a50b84848b3a2add3eeabf94c5e94,2024-11-21T01:32:48.437000 +CVE-2011-4698,0,0,f4be1f78ceb79633eafa3728b5f175883d6ad37f7bc13e43cc18b19014879f0f,2024-11-21T01:32:48.580000 +CVE-2011-4699,0,0,a7a56ab8deacd44d2660e369a0b259db39edffdab7ad503654256b695cb61b3c,2024-11-21T01:32:48.730000 +CVE-2011-4700,0,0,c9ccc2b856843736c5191b88200bd54ff34da47b7385b3ae4b61ddea5fcdb5c7,2024-11-21T01:32:48.867000 +CVE-2011-4701,0,0,99edacd77ebe8015901609f93c15d5d0a90615cc8f4bf081214acfbeb06258a5,2024-11-21T01:32:49 +CVE-2011-4702,0,0,b69439bdf45531747de87bf3ced8e7fdec22782ccaa9a353b44e9c8d7b55996d,2024-11-21T01:32:49.140000 +CVE-2011-4703,0,0,2d8eac02654bc33c9c49955eaf5d9e591e7eb17ea960b2bf91b8b30aeef9812b,2024-11-21T01:32:49.280000 +CVE-2011-4704,0,0,b89246c512869507f7b044b2d5ae6ee53e498352d5c3969a7a7019d1be7b6e24,2024-11-21T01:32:49.423000 +CVE-2011-4705,0,0,3864d29aed5ebaeb333fbb9384defed46bc1accc7a0fbf320feaa6d3e7b0fb46,2024-11-21T01:32:49.563000 +CVE-2011-4707,0,0,90a66d905591747ac42b11584daef6ba1bba01c6624a88f8e7accf11a51f774f,2024-11-21T01:32:49.703000 +CVE-2011-4708,0,0,46118068087b19af35c9af21e1ecb301ad5886cb8285d702555c0b0c39d17e37,2024-11-21T01:32:49.843000 +CVE-2011-4709,0,0,23d49d0030aa4aadb83ff9d176b94189bfdd8c30b559461e14c9dc471678f6cc,2024-11-21T01:32:49.987000 +CVE-2011-4710,0,0,10135078052c96d139d5fea893c7b02af4148e301fdcdc7deb82eb365432100f,2024-11-21T01:32:50.140000 +CVE-2011-4711,0,0,ad59e5d681e659cc93b91b57c2571dd4f4ff96293ea15ab011d988510fc60fb0,2024-11-21T01:32:50.280000 +CVE-2011-4712,0,0,e52608444fecd5c7cc333fa145c7127c466b87a668096480dbd1b827087ec04e,2024-11-21T01:32:50.443000 +CVE-2011-4713,0,0,2ec2aeb3d2862daa5e7137a41fe562ed48bfaa91345ca58f56610dc36e0f7597,2024-11-21T01:32:50.587000 +CVE-2011-4714,0,0,74fa3aa82b737f6595900647ea971b1614ca20911f25457820058108b07b2552,2024-11-21T01:32:50.737000 +CVE-2011-4715,0,0,18de0b881d1217958e37f351bdc8b8dd58419b826fce10398c064e06cbeefa19,2024-11-21T01:32:50.897000 +CVE-2011-4716,0,0,9e577a1d0a10908c5ed4233fcab3e5e9da9dc7e1b8cd4ba33443daefa5152cf7,2024-11-21T01:32:51.050000 +CVE-2011-4717,0,0,1f10f0a21b3e06fa0893e14a24a8c592d340b047fef6715cff001da7531c5248,2024-11-21T01:32:51.190000 CVE-2011-4718,0,0,ed7b6737baff0990fbd1441e2b85d223e07cf9faa6f46a4caecb4c8dc949a932,2023-11-07T02:09:35.693000 -CVE-2011-4719,0,1,b190353bc1da8422b41adfeae4e2ea119b8ee6b86d19dc64d1f09af51121e83f,2024-11-21T01:32:51.500000 +CVE-2011-4719,0,0,b190353bc1da8422b41adfeae4e2ea119b8ee6b86d19dc64d1f09af51121e83f,2024-11-21T01:32:51.500000 CVE-2011-4720,0,0,25baa89553bd2813d2210d8f4e6424b3479a9cc1a6ec835acc89701596ee22ac,2014-12-29T16:20:09.797000 CVE-2011-4722,0,0,f508a527906d4760cff07c044bd62ff05be80a4289fdd3a7545afeb0ac662b37,2017-08-29T01:30:32.880000 -CVE-2011-4723,0,1,3e804ee1a42e454ad398b97c6cc58f86feba19823cb2621c1fe49f23e2159746,2024-11-21T01:32:51.950000 -CVE-2011-4725,0,1,3370e6c913116d18cd3df9c0cc16e221e004a4b7680b2bb4f1ed2c0f3bb078d4,2024-11-21T01:32:52.103000 -CVE-2011-4726,0,1,59064a480d3797c4ef6539f4acdd76bb054c794d6bbaa224c51ecb639bf947ff,2024-11-21T01:32:52.247000 -CVE-2011-4727,0,1,d02c251fd5c4c496c6ae0d2d8b0e032bdbc0b43f9d65303a2f321e70ba1f7895,2024-11-21T01:32:52.400000 -CVE-2011-4728,0,1,6c1d79fe0f03f7e8fd62d4495ae3fd0f9180b38704899a8a050287ac77698d5c,2024-11-21T01:32:52.543000 -CVE-2011-4729,0,1,a5b56a8f57fc1300e20b8fd9fffc5d4662f58c44363aab33567a327e03a746c1,2024-11-21T01:32:52.693000 -CVE-2011-4730,0,1,eb2c39d993c7eb6eeb636fd2e12dc8a3b7a3fd70845f3f8b2ca49dcbb5307a80,2024-11-21T01:32:52.840000 -CVE-2011-4731,0,1,f417accca6e647eb548f4e61a8d8b5c9f1b33c5be4874939e0116a4099ce0a48,2024-11-21T01:32:52.983000 -CVE-2011-4732,0,1,22e5d99c74ea5f7e6d4771d79a09f069ddc7f0a72124da2585cb6d0241e1f244,2024-11-21T01:32:53.127000 -CVE-2011-4733,0,1,3e390580b7f97ffa9a5f28f64b953cddf519bf2143abb1950cb80cde1c783a9d,2024-11-21T01:32:53.270000 -CVE-2011-4734,0,1,af91507df34208b5d028749231be1ae5a0be05474c5f9e18a460bd4b2da81bf7,2024-11-21T01:32:53.427000 -CVE-2011-4735,0,1,daebed68ef4ec9cb86c069c04a3902ce08bcc28e3045456910bd4cfca19436dd,2024-11-21T01:32:53.570000 -CVE-2011-4736,0,1,59644970148997e4c286a2c9af3579cdf37634fef008132c0f75e287691cc366,2024-11-21T01:32:53.710000 -CVE-2011-4737,0,1,96130476a96513cc9ab82523ef604bc0c559bfb08a64f5b9ca6bcedd64b3bdef,2024-11-21T01:32:53.850000 -CVE-2011-4738,0,1,1ce172bc23e9317916d875b75a292ab6b207d005c8da476f46058a9ce6287fcf,2024-11-21T01:32:53.993000 -CVE-2011-4739,0,1,b0f9045a1ca5aae021019d11139353f79209db4cf3d1923c819916757228ce7a,2024-11-21T01:32:54.130000 -CVE-2011-4740,0,1,e451463218fdb1fbd549d4f4d932b98059c695f6c62f8c705aac44b5b83ef892,2024-11-21T01:32:54.267000 -CVE-2011-4741,0,1,0367b0100236d5361b0c090e07063ac9af38019fe70e9195712d66bf2ae37bfa,2024-11-21T01:32:54.403000 -CVE-2011-4742,0,1,615901ce29b413b813184dcc223599055fef38031c5a976ddc2629aecdc5459f,2024-11-21T01:32:54.540000 -CVE-2011-4743,0,1,c36176eaf089eac63240494b61196b8ae5e8625cabe5bdc37f6ec43a4198e83e,2024-11-21T01:32:54.677000 -CVE-2011-4744,0,1,fb93fb632f0f07fadb035121b666989e169f3d96b3d03cdb061d18182d54526a,2024-11-21T01:32:54.820000 -CVE-2011-4745,0,1,fe4113622aea68349be9bd78d740f3b80480f4498714baf405ef5f0a760d89c7,2024-11-21T01:32:54.963000 -CVE-2011-4746,0,1,c4b2db3ddae5de4d6843ed2ab1c621546693165e1351ab6d3fca145a40e6df16,2024-11-21T01:32:55.103000 -CVE-2011-4747,0,1,30dbab2418c78fe11e4941f40fc5aae7b074ede1694cd2ec48dbb2d3d7a5c6c8,2024-11-21T01:32:55.237000 -CVE-2011-4748,0,1,f5a20d35631f53da80785640876c56cff5166ce32c494c6b60fc922787dba1d6,2024-11-21T01:32:55.383000 -CVE-2011-4749,0,1,76cda5cdc23d8da55ddf0d66725630459233b541f9326274143175fd16df29a3,2024-11-21T01:32:55.523000 -CVE-2011-4750,0,1,2fb6e49e046a7c7e40c1f190f765580aaf813784bec15487769ae00e7bc258c7,2024-11-21T01:32:55.660000 -CVE-2011-4751,0,1,0652838c9016a5dcf7a5d9f3d7609f838c18788043bc8c510e1f54846ff9ee3d,2024-11-21T01:32:55.797000 -CVE-2011-4752,0,1,fc9dfcfa028872243ad0a34743f3ac5014486b2836357108ec46bcb2619f32b4,2024-11-21T01:32:55.930000 -CVE-2011-4753,0,1,84488130b348959bed8646826416a5e99b4e0329f152400168b916552bfe2c9e,2024-11-21T01:32:56.063000 -CVE-2011-4754,0,1,837bb2bcc700b0c0a81d94823da19a3bd6bb82d815f4c57f1774bd0ae9241d9a,2024-11-21T01:32:56.200000 -CVE-2011-4755,0,1,ba1fbe1b11cfe0da5aacf452eef89fff5be28a67a516c178188a990da2e7be36,2024-11-21T01:32:56.347000 -CVE-2011-4756,0,1,e21866d8983056f8f782eab68fbe04209920ea95977ab8b885987ffc1d1c8552,2024-11-21T01:32:56.477000 -CVE-2011-4757,0,1,188c8a94e6d6806404d88c0ed1112f5ff09e0abda1af7d06117018b30c5aa3a4,2024-11-21T01:32:56.620000 -CVE-2011-4758,0,1,5af94cbc6bbbf4d605e9fbb6f038ffeec9f2ad9def6e9c8ad85a542828b88bda,2024-11-21T01:32:56.757000 -CVE-2011-4759,0,1,cc9ae1775eb00c5437bbb6c0181b4d864a9e8dd2a6bdf7ce0a4ad918ea2bd3ac,2024-11-21T01:32:56.890000 -CVE-2011-4760,0,1,ca67b57d62241ea039a05357ff9a44a47b437b691c46fd8817936c50e7d4ec8f,2024-11-21T01:32:57.037000 -CVE-2011-4761,0,1,8dec1ccda9ebcb588331ca71ad581026cf599e8d90a20fc0938f6a5886d1c776,2024-11-21T01:32:57.173000 -CVE-2011-4762,0,1,d5d86fd3926340f8781cb78315a53a118bd96d7ca5487d6e24931b5cd6ec41b0,2024-11-21T01:32:57.310000 -CVE-2011-4763,0,1,e6f72caf7badb3698b0685381363ea9b572c69c12bb92e7513aaed25aa04ecc3,2024-11-21T01:32:57.450000 -CVE-2011-4764,0,1,4e391d53faee9fda2e723bfa6591c30cce6f66bb53c13285c43712404c825017,2024-11-21T01:32:57.590000 -CVE-2011-4765,0,1,daa7772914f7ecbb0b6931b0fc89df37654350b9af2dcfc427e4835e78081d2e,2024-11-21T01:32:57.737000 -CVE-2011-4766,0,1,0a515b79fcd0f84692252ad31ad5a50adf4730601bffb838e79b0381a44154cc,2024-11-21T01:32:57.880000 -CVE-2011-4767,0,1,97a1b8f7160d6d0cc290d1165146e4bdb6f326ef0da761c9fb27621f4edd9299,2024-11-21T01:32:58.010000 -CVE-2011-4768,0,1,cacb6dc92dc32a8da7e27635bae34aa234a11ee8661199c5ce582c1dc5dff651,2024-11-21T01:32:58.153000 -CVE-2011-4769,0,1,5752f7fc95ad9ba9e974da45b83eeb888f925f0b843bc556cb6cdf51d7a0e92a,2024-11-21T01:32:58.307000 -CVE-2011-4770,0,1,ef9c5d415be19bb022d33532c467c2ad19a02d31a4517aa2274d0efb086de818,2024-11-21T01:32:58.447000 -CVE-2011-4771,0,1,87811bde434feefb481497614973821dd8f19c9715fa08f05b36b3802c658b3e,2024-11-21T01:32:58.603000 -CVE-2011-4772,0,1,94c89029a87633fe90af8cd830743892726ce238119fc9a8667641d0829f68aa,2024-11-21T01:32:58.743000 -CVE-2011-4773,0,1,ca3935153846d1cfabf50c50dded5295c1df721fffcff9ac584c7fe5cb1133f7,2024-11-21T01:32:58.880000 -CVE-2011-4776,0,1,6c7bcf5aa29845c58a2bbe1a7cf5c320d58253d4b2efee56406b3383ec396197,2024-11-21T01:32:59.020000 -CVE-2011-4777,0,1,d3c450b90f77496a78823938c6407e41c541cd9348fa2706ae7a77950d4ee105,2024-11-21T01:32:59.160000 -CVE-2011-4778,0,1,c59a83b3da2f5df42872895779c3c0cf276cd2acf3a6896aace46af2e8bbf9e1,2024-11-21T01:32:59.297000 +CVE-2011-4723,0,0,3e804ee1a42e454ad398b97c6cc58f86feba19823cb2621c1fe49f23e2159746,2024-11-21T01:32:51.950000 +CVE-2011-4725,0,0,3370e6c913116d18cd3df9c0cc16e221e004a4b7680b2bb4f1ed2c0f3bb078d4,2024-11-21T01:32:52.103000 +CVE-2011-4726,0,0,59064a480d3797c4ef6539f4acdd76bb054c794d6bbaa224c51ecb639bf947ff,2024-11-21T01:32:52.247000 +CVE-2011-4727,0,0,d02c251fd5c4c496c6ae0d2d8b0e032bdbc0b43f9d65303a2f321e70ba1f7895,2024-11-21T01:32:52.400000 +CVE-2011-4728,0,0,6c1d79fe0f03f7e8fd62d4495ae3fd0f9180b38704899a8a050287ac77698d5c,2024-11-21T01:32:52.543000 +CVE-2011-4729,0,0,a5b56a8f57fc1300e20b8fd9fffc5d4662f58c44363aab33567a327e03a746c1,2024-11-21T01:32:52.693000 +CVE-2011-4730,0,0,eb2c39d993c7eb6eeb636fd2e12dc8a3b7a3fd70845f3f8b2ca49dcbb5307a80,2024-11-21T01:32:52.840000 +CVE-2011-4731,0,0,f417accca6e647eb548f4e61a8d8b5c9f1b33c5be4874939e0116a4099ce0a48,2024-11-21T01:32:52.983000 +CVE-2011-4732,0,0,22e5d99c74ea5f7e6d4771d79a09f069ddc7f0a72124da2585cb6d0241e1f244,2024-11-21T01:32:53.127000 +CVE-2011-4733,0,0,3e390580b7f97ffa9a5f28f64b953cddf519bf2143abb1950cb80cde1c783a9d,2024-11-21T01:32:53.270000 +CVE-2011-4734,0,0,af91507df34208b5d028749231be1ae5a0be05474c5f9e18a460bd4b2da81bf7,2024-11-21T01:32:53.427000 +CVE-2011-4735,0,0,daebed68ef4ec9cb86c069c04a3902ce08bcc28e3045456910bd4cfca19436dd,2024-11-21T01:32:53.570000 +CVE-2011-4736,0,0,59644970148997e4c286a2c9af3579cdf37634fef008132c0f75e287691cc366,2024-11-21T01:32:53.710000 +CVE-2011-4737,0,0,96130476a96513cc9ab82523ef604bc0c559bfb08a64f5b9ca6bcedd64b3bdef,2024-11-21T01:32:53.850000 +CVE-2011-4738,0,0,1ce172bc23e9317916d875b75a292ab6b207d005c8da476f46058a9ce6287fcf,2024-11-21T01:32:53.993000 +CVE-2011-4739,0,0,b0f9045a1ca5aae021019d11139353f79209db4cf3d1923c819916757228ce7a,2024-11-21T01:32:54.130000 +CVE-2011-4740,0,0,e451463218fdb1fbd549d4f4d932b98059c695f6c62f8c705aac44b5b83ef892,2024-11-21T01:32:54.267000 +CVE-2011-4741,0,0,0367b0100236d5361b0c090e07063ac9af38019fe70e9195712d66bf2ae37bfa,2024-11-21T01:32:54.403000 +CVE-2011-4742,0,0,615901ce29b413b813184dcc223599055fef38031c5a976ddc2629aecdc5459f,2024-11-21T01:32:54.540000 +CVE-2011-4743,0,0,c36176eaf089eac63240494b61196b8ae5e8625cabe5bdc37f6ec43a4198e83e,2024-11-21T01:32:54.677000 +CVE-2011-4744,0,0,fb93fb632f0f07fadb035121b666989e169f3d96b3d03cdb061d18182d54526a,2024-11-21T01:32:54.820000 +CVE-2011-4745,0,0,fe4113622aea68349be9bd78d740f3b80480f4498714baf405ef5f0a760d89c7,2024-11-21T01:32:54.963000 +CVE-2011-4746,0,0,c4b2db3ddae5de4d6843ed2ab1c621546693165e1351ab6d3fca145a40e6df16,2024-11-21T01:32:55.103000 +CVE-2011-4747,0,0,30dbab2418c78fe11e4941f40fc5aae7b074ede1694cd2ec48dbb2d3d7a5c6c8,2024-11-21T01:32:55.237000 +CVE-2011-4748,0,0,f5a20d35631f53da80785640876c56cff5166ce32c494c6b60fc922787dba1d6,2024-11-21T01:32:55.383000 +CVE-2011-4749,0,0,76cda5cdc23d8da55ddf0d66725630459233b541f9326274143175fd16df29a3,2024-11-21T01:32:55.523000 +CVE-2011-4750,0,0,2fb6e49e046a7c7e40c1f190f765580aaf813784bec15487769ae00e7bc258c7,2024-11-21T01:32:55.660000 +CVE-2011-4751,0,0,0652838c9016a5dcf7a5d9f3d7609f838c18788043bc8c510e1f54846ff9ee3d,2024-11-21T01:32:55.797000 +CVE-2011-4752,0,0,fc9dfcfa028872243ad0a34743f3ac5014486b2836357108ec46bcb2619f32b4,2024-11-21T01:32:55.930000 +CVE-2011-4753,0,0,84488130b348959bed8646826416a5e99b4e0329f152400168b916552bfe2c9e,2024-11-21T01:32:56.063000 +CVE-2011-4754,0,0,837bb2bcc700b0c0a81d94823da19a3bd6bb82d815f4c57f1774bd0ae9241d9a,2024-11-21T01:32:56.200000 +CVE-2011-4755,0,0,ba1fbe1b11cfe0da5aacf452eef89fff5be28a67a516c178188a990da2e7be36,2024-11-21T01:32:56.347000 +CVE-2011-4756,0,0,e21866d8983056f8f782eab68fbe04209920ea95977ab8b885987ffc1d1c8552,2024-11-21T01:32:56.477000 +CVE-2011-4757,0,0,188c8a94e6d6806404d88c0ed1112f5ff09e0abda1af7d06117018b30c5aa3a4,2024-11-21T01:32:56.620000 +CVE-2011-4758,0,0,5af94cbc6bbbf4d605e9fbb6f038ffeec9f2ad9def6e9c8ad85a542828b88bda,2024-11-21T01:32:56.757000 +CVE-2011-4759,0,0,cc9ae1775eb00c5437bbb6c0181b4d864a9e8dd2a6bdf7ce0a4ad918ea2bd3ac,2024-11-21T01:32:56.890000 +CVE-2011-4760,0,0,ca67b57d62241ea039a05357ff9a44a47b437b691c46fd8817936c50e7d4ec8f,2024-11-21T01:32:57.037000 +CVE-2011-4761,0,0,8dec1ccda9ebcb588331ca71ad581026cf599e8d90a20fc0938f6a5886d1c776,2024-11-21T01:32:57.173000 +CVE-2011-4762,0,0,d5d86fd3926340f8781cb78315a53a118bd96d7ca5487d6e24931b5cd6ec41b0,2024-11-21T01:32:57.310000 +CVE-2011-4763,0,0,e6f72caf7badb3698b0685381363ea9b572c69c12bb92e7513aaed25aa04ecc3,2024-11-21T01:32:57.450000 +CVE-2011-4764,0,0,4e391d53faee9fda2e723bfa6591c30cce6f66bb53c13285c43712404c825017,2024-11-21T01:32:57.590000 +CVE-2011-4765,0,0,daa7772914f7ecbb0b6931b0fc89df37654350b9af2dcfc427e4835e78081d2e,2024-11-21T01:32:57.737000 +CVE-2011-4766,0,0,0a515b79fcd0f84692252ad31ad5a50adf4730601bffb838e79b0381a44154cc,2024-11-21T01:32:57.880000 +CVE-2011-4767,0,0,97a1b8f7160d6d0cc290d1165146e4bdb6f326ef0da761c9fb27621f4edd9299,2024-11-21T01:32:58.010000 +CVE-2011-4768,0,0,cacb6dc92dc32a8da7e27635bae34aa234a11ee8661199c5ce582c1dc5dff651,2024-11-21T01:32:58.153000 +CVE-2011-4769,0,0,5752f7fc95ad9ba9e974da45b83eeb888f925f0b843bc556cb6cdf51d7a0e92a,2024-11-21T01:32:58.307000 +CVE-2011-4770,0,0,ef9c5d415be19bb022d33532c467c2ad19a02d31a4517aa2274d0efb086de818,2024-11-21T01:32:58.447000 +CVE-2011-4771,0,0,87811bde434feefb481497614973821dd8f19c9715fa08f05b36b3802c658b3e,2024-11-21T01:32:58.603000 +CVE-2011-4772,0,0,94c89029a87633fe90af8cd830743892726ce238119fc9a8667641d0829f68aa,2024-11-21T01:32:58.743000 +CVE-2011-4773,0,0,ca3935153846d1cfabf50c50dded5295c1df721fffcff9ac584c7fe5cb1133f7,2024-11-21T01:32:58.880000 +CVE-2011-4776,0,0,6c7bcf5aa29845c58a2bbe1a7cf5c320d58253d4b2efee56406b3383ec396197,2024-11-21T01:32:59.020000 +CVE-2011-4777,0,0,d3c450b90f77496a78823938c6407e41c541cd9348fa2706ae7a77950d4ee105,2024-11-21T01:32:59.160000 +CVE-2011-4778,0,0,c59a83b3da2f5df42872895779c3c0cf276cd2acf3a6896aace46af2e8bbf9e1,2024-11-21T01:32:59.297000 CVE-2011-4779,0,0,a92309b7230f549f6227897b7c0380acea6d9355411ed623b842e4716df590fa,2023-11-07T02:09:36.220000 -CVE-2011-4780,0,1,9dea1cd15f4e6316d6ae417582a9fa69427406e0ea1b97beb01a691e6bbc436e,2024-11-21T01:32:59.440000 -CVE-2011-4782,0,1,2329ad1057b202d0f2fc872afbac775122770334db70f62b5caf29e9195b7bc2,2024-11-21T01:32:59.580000 -CVE-2011-4783,0,1,82f3226fba68b27690c2522205eaa18cae29d8c0f3596cb4c266189d793bd93b,2024-11-21T01:32:59.720000 -CVE-2011-4784,0,1,ad6bd78337e9022c7386e57b96541580a8e482f55e9839b239a9d3230f248ef4,2024-11-21T01:32:59.853000 -CVE-2011-4785,0,1,ea5284984ce7a760e7eaa987c97eb9ee4e9cb247ea57c241fc39add1e13bb762,2024-11-21T01:32:59.993000 -CVE-2011-4786,0,1,1ec478fa8457a2748c072f73a8b5cebfda7b84d902647538848824e840ab0c44,2024-11-21T01:33:00.103000 -CVE-2011-4787,0,1,f98545b5d3306972153fa1695cad79ebba80eb2e020b8b7a3ce279fc3d719e41,2024-11-21T01:33:00.200000 -CVE-2011-4788,0,1,88a68097b66c666e9de05832cbac5bc9605b72c5bbd79ff66bff3fdc3e0bb1f5,2024-11-21T01:33:00.300000 -CVE-2011-4789,0,1,633b82d00966326c230e96622d1dc2ebffdc08840b3bed0e5602125b68d5e164,2024-11-21T01:33:00.403000 -CVE-2011-4790,0,1,0f2cd4e48dcc1216842369dfcf29494dca6b2d565cabc216b773d91f1952f8ae,2024-11-21T01:33:00.503000 +CVE-2011-4780,0,0,9dea1cd15f4e6316d6ae417582a9fa69427406e0ea1b97beb01a691e6bbc436e,2024-11-21T01:32:59.440000 +CVE-2011-4782,0,0,2329ad1057b202d0f2fc872afbac775122770334db70f62b5caf29e9195b7bc2,2024-11-21T01:32:59.580000 +CVE-2011-4783,0,0,82f3226fba68b27690c2522205eaa18cae29d8c0f3596cb4c266189d793bd93b,2024-11-21T01:32:59.720000 +CVE-2011-4784,0,0,ad6bd78337e9022c7386e57b96541580a8e482f55e9839b239a9d3230f248ef4,2024-11-21T01:32:59.853000 +CVE-2011-4785,0,0,ea5284984ce7a760e7eaa987c97eb9ee4e9cb247ea57c241fc39add1e13bb762,2024-11-21T01:32:59.993000 +CVE-2011-4786,0,0,1ec478fa8457a2748c072f73a8b5cebfda7b84d902647538848824e840ab0c44,2024-11-21T01:33:00.103000 +CVE-2011-4787,0,0,f98545b5d3306972153fa1695cad79ebba80eb2e020b8b7a3ce279fc3d719e41,2024-11-21T01:33:00.200000 +CVE-2011-4788,0,0,88a68097b66c666e9de05832cbac5bc9605b72c5bbd79ff66bff3fdc3e0bb1f5,2024-11-21T01:33:00.300000 +CVE-2011-4789,0,0,633b82d00966326c230e96622d1dc2ebffdc08840b3bed0e5602125b68d5e164,2024-11-21T01:33:00.403000 +CVE-2011-4790,0,0,0f2cd4e48dcc1216842369dfcf29494dca6b2d565cabc216b773d91f1952f8ae,2024-11-21T01:33:00.503000 CVE-2011-4791,0,0,1ce07bc4adbe88da2a16daa79c04c1e26a4752afcc5cf9ff85a990e318c05b06,2019-10-09T23:03:58.977000 CVE-2011-4792,0,0,9dfe33799adb3c59b68b5a1bf15f6a615c0db4500f99f5dbc0a138a699edeb5c,2023-11-07T02:09:36.437000 CVE-2011-4793,0,0,efd72f94d61cca44350fcfb2599df06a8b1f868c976d288420c8a0903de4bb94,2023-11-07T02:09:36.657000 @@ -51294,72 +51294,72 @@ CVE-2011-4796,0,0,b2358ade11b95e67f1fcd01bb161d7efcd15f21e00e129be8e8852c4a16806 CVE-2011-4797,0,0,ccc5e228b12f4cb9cc97f96cddef01dc933d8ea300b204559bc9caac618fd274,2023-11-07T02:09:37.513000 CVE-2011-4798,0,0,c23fdad2ff006390048725b106ef2b7f96159a35ec43cec1683e4adf6a6da4d6,2023-11-07T02:09:37.727000 CVE-2011-4799,0,0,d0dc84dad34f78369ca59ded356fdef3282b8e4a1d7e35e1d310c79bead1e3a9,2023-11-07T02:09:37.947000 -CVE-2011-4800,0,1,978503768f2a4a27c27a7c6ed238214dd2e39755ef788bc877585965e9920f8d,2024-11-21T01:33:00.813000 -CVE-2011-4801,0,1,de2b2059686c1eb15f804b4529ebfb959829a444677aad70f7ac51da9f42bfbd,2024-11-21T01:33:00.960000 -CVE-2011-4802,0,1,5f292b11120c1a415528574aafcc7a1352fd1ac8cee6b22297fe60030fa86f7b,2024-11-21T01:33:01.097000 -CVE-2011-4803,0,1,a8c9ced5d52bf9888dd5495585ea9c056cabe7ecd086895dc2b4ee90bfdf889c,2024-11-21T01:33:01.257000 -CVE-2011-4804,0,1,5b214506933f1319204c607f6298255b43b08b4644097526730cebc2e1f6d9d0,2024-11-21T01:33:01.397000 -CVE-2011-4805,0,1,69b1158fa5519c7e7e24dbb35869f2c9202844138e075792496f4b5080637ec1,2024-11-21T01:33:01.540000 -CVE-2011-4806,0,1,c9a94b3e9e0236df49e5b1339dbfd86f2217f05ae8b5dafa7c6e4292d2977774,2024-11-21T01:33:01.680000 -CVE-2011-4807,0,1,0ab856ef6c24d1340c96e588b0d792d118d9cd9a2be399b5ef9b64cba834f686,2024-11-21T01:33:01.833000 -CVE-2011-4808,0,1,3b9179a65a1c036179a28795281dcd843dad16898df48be9c50caf643969ba5d,2024-11-21T01:33:01.973000 -CVE-2011-4809,0,1,72d1891307751b0905dfbba43e463b68ca5486c210f2c119c75edf9276ce2d92,2024-11-21T01:33:02.110000 -CVE-2011-4810,0,1,d271b8819685947c714c7265075c5ed9fd4f5da471913f014a3d64da0f6bb803,2024-11-21T01:33:02.250000 -CVE-2011-4811,0,1,fd55a7a6ac08447f5a69d5b1c356794f029f98da2653922970ee850332201f63,2024-11-21T01:33:02.390000 -CVE-2011-4812,0,1,3883ed13ea6b5250b3a1019639dc4644706b41d6351d185c5b4e1682385c3733,2024-11-21T01:33:02.523000 -CVE-2011-4813,0,1,2fd31e2b8bf55adde3fe53ad37f5a3991a15ef97364b5cdba45e7c1cef8de7c1,2024-11-21T01:33:02.680000 -CVE-2011-4814,0,1,de883552705195bfb1fa93862fdde8f3526cc7de4db9357f0a744facc23d4f54,2024-11-21T01:33:02.827000 -CVE-2011-4815,0,1,ffc87d46cc0475648baf263c076e0e73da1ff3ebe708ffeeea866246e03f3187,2024-11-21T01:33:02.987000 +CVE-2011-4800,0,0,978503768f2a4a27c27a7c6ed238214dd2e39755ef788bc877585965e9920f8d,2024-11-21T01:33:00.813000 +CVE-2011-4801,0,0,de2b2059686c1eb15f804b4529ebfb959829a444677aad70f7ac51da9f42bfbd,2024-11-21T01:33:00.960000 +CVE-2011-4802,0,0,5f292b11120c1a415528574aafcc7a1352fd1ac8cee6b22297fe60030fa86f7b,2024-11-21T01:33:01.097000 +CVE-2011-4803,0,0,a8c9ced5d52bf9888dd5495585ea9c056cabe7ecd086895dc2b4ee90bfdf889c,2024-11-21T01:33:01.257000 +CVE-2011-4804,0,0,5b214506933f1319204c607f6298255b43b08b4644097526730cebc2e1f6d9d0,2024-11-21T01:33:01.397000 +CVE-2011-4805,0,0,69b1158fa5519c7e7e24dbb35869f2c9202844138e075792496f4b5080637ec1,2024-11-21T01:33:01.540000 +CVE-2011-4806,0,0,c9a94b3e9e0236df49e5b1339dbfd86f2217f05ae8b5dafa7c6e4292d2977774,2024-11-21T01:33:01.680000 +CVE-2011-4807,0,0,0ab856ef6c24d1340c96e588b0d792d118d9cd9a2be399b5ef9b64cba834f686,2024-11-21T01:33:01.833000 +CVE-2011-4808,0,0,3b9179a65a1c036179a28795281dcd843dad16898df48be9c50caf643969ba5d,2024-11-21T01:33:01.973000 +CVE-2011-4809,0,0,72d1891307751b0905dfbba43e463b68ca5486c210f2c119c75edf9276ce2d92,2024-11-21T01:33:02.110000 +CVE-2011-4810,0,0,d271b8819685947c714c7265075c5ed9fd4f5da471913f014a3d64da0f6bb803,2024-11-21T01:33:02.250000 +CVE-2011-4811,0,0,fd55a7a6ac08447f5a69d5b1c356794f029f98da2653922970ee850332201f63,2024-11-21T01:33:02.390000 +CVE-2011-4812,0,0,3883ed13ea6b5250b3a1019639dc4644706b41d6351d185c5b4e1682385c3733,2024-11-21T01:33:02.523000 +CVE-2011-4813,0,0,2fd31e2b8bf55adde3fe53ad37f5a3991a15ef97364b5cdba45e7c1cef8de7c1,2024-11-21T01:33:02.680000 +CVE-2011-4814,0,0,de883552705195bfb1fa93862fdde8f3526cc7de4db9357f0a744facc23d4f54,2024-11-21T01:33:02.827000 +CVE-2011-4815,0,0,ffc87d46cc0475648baf263c076e0e73da1ff3ebe708ffeeea866246e03f3187,2024-11-21T01:33:02.987000 CVE-2011-4816,0,0,75418cc56331f66e513b28a31dca19f90289bce78ff306bd8caefa75e7eb1e17,2018-01-10T02:29:23.363000 CVE-2011-4817,0,0,7751e9bc03a685b7c69fca47dc325b3bdf368627f19ba2473fbfb798b6beeda5,2018-01-10T02:29:23.457000 CVE-2011-4818,0,0,db3ea8c584ae86125a2a6ca96b1dbc85829a7b3c10fcfd71273f5154e2e37e73,2018-01-10T02:29:23.520000 CVE-2011-4819,0,0,fb0b1a195c594b4bff9cbd2c603a2d9481cdf7bcb6ed22351708d618a14a5a83,2018-01-10T02:29:23.580000 CVE-2011-4820,0,0,a5a924cdda53d67bd3d379fc70432720526567e8b6735d5b1a72ec7d78325b09,2022-10-28T22:37:32.600000 CVE-2011-4821,0,0,6d5a3fcebabad73b357c89e3292884e918bf0f24ed8ced650620b136ad24593b,2023-04-26T19:27:52.350000 -CVE-2011-4822,0,1,41218d089f79a092ac81714db9fd0ecfd4edd11916ce3c181e85af9f96eae562,2024-11-21T01:33:03.923000 -CVE-2011-4823,0,1,7b5bdf556d64fb0847d638cbdef896ae662dcd653611db430445378de7a3f443,2024-11-21T01:33:04.087000 -CVE-2011-4824,0,1,ceeb22222e0f88a6ded2f098ee8c99743e0014198419376295e808eaaf9a54b4,2024-11-21T01:33:04.227000 -CVE-2011-4825,0,1,817864dc76060eae3fa196162be2e242b4c11717ce3aaffd53f7673aff018d37,2024-11-21T01:33:04.383000 -CVE-2011-4826,0,1,2c6ddc03ce09e99cabbb512bc38b1ce1220a432067f1fcd4eca5ec6670539a84,2024-11-21T01:33:04.533000 -CVE-2011-4827,0,1,41b834ca18b164ee497aaef626b7e84be4e3db93c1d10bb2d79a34ae3da30c35,2024-11-21T01:33:04.673000 -CVE-2011-4828,0,1,ba9ce7867e948db1f8df0f863a6bfb00a9c2bf8f6285e2ad3b42afcf179eb260,2024-11-21T01:33:04.803000 -CVE-2011-4829,0,1,0c9449e160ac97e7ac6ff07c9398ab5ea892f96383e74011251e4956cdf3dd41,2024-11-21T01:33:04.940000 -CVE-2011-4830,0,1,c280e96ff783f2693ff67273cfe4313e1de09f7631ef3ae7bbe3e00f17c28216,2024-11-21T01:33:05.073000 -CVE-2011-4831,0,1,eb6d110323a9a95a8b631145109ee0de3efce38be0761810e365939d627db7ee,2024-11-21T01:33:05.220000 -CVE-2011-4832,0,1,923d467c06a90bb645fd88eee0ec17c3508bd2cbdc929748645f55fc041c138e,2024-11-21T01:33:05.357000 -CVE-2011-4833,0,1,028ff05a109eecfb8796d12bb4e7aa9b4fb5fa448322c63cb4cf08178da33111,2024-11-21T01:33:05.513000 -CVE-2011-4834,0,1,b53183d035ca2681e87d244f6715dac1e41b95ebec0db888dd950e85a0deee64,2024-11-21T01:33:05.663000 -CVE-2011-4835,0,1,5bc5bcf472d2817742ad6ee4f387b6225f74ffba6086d5da40607ca96dc73495,2024-11-21T01:33:05.807000 -CVE-2011-4836,0,1,603e8a162577a9f9cd185f21df2898b487a926e0af519e06c3430410dd5503f0,2024-11-21T01:33:05.947000 -CVE-2011-4837,0,1,e4766f3bbec93d0d4935b0fbf4618eecf91af4df2eb2d49a115590a9fe42bb62,2024-11-21T01:33:06.080000 -CVE-2011-4838,0,1,7b86adaa34321c67625080152f3faf3e4eaad5daeded848fe8cb32d9932b754a,2024-11-21T01:33:06.217000 -CVE-2011-4847,0,1,cfd2d3fd71c3674e0c46e8cc22973da756c9608bbe4e8ad3f8ddc3f28e25b031,2024-11-21T01:33:06.370000 -CVE-2011-4848,0,1,fe904ec796ae8570c1d76bce86895e2098bd5117a195b125ebc609fb4daca083,2024-11-21T01:33:06.523000 -CVE-2011-4849,0,1,531b1080a699097529aa5651d6a8fe04144f409fbde4c24fc3878fe45e8ccfc1,2024-11-21T01:33:06.680000 -CVE-2011-4850,0,1,0e474f4efeb5c7578b0312b6b15d58fb1cc4706d69365f1f532a77e926ecebc1,2024-11-21T01:33:06.833000 -CVE-2011-4851,0,1,b9c4fe9030e8bbc596a613b1e416cea0835bf5201b5377a71e0c838e935fb747,2024-11-21T01:33:06.980000 -CVE-2011-4852,0,1,b73c99fa2570cf777e7fc6d2341174571e772290ff471f55d6bcb42f6d076e0a,2024-11-21T01:33:07.110000 -CVE-2011-4853,0,1,a9975ffd3052cb275b56f6778e327bc554ef34564543637f885b4fd257ca7a8f,2024-11-21T01:33:07.263000 -CVE-2011-4854,0,1,0d0d569045105c471a8c95ad4c48b4ecc8edafcbd6ae3f98b767ec7c03690355,2024-11-21T01:33:07.397000 -CVE-2011-4855,0,1,f33fabab8868c8ea3e7662d7815549fbfa2f3e392ee10655a1000c993292740c,2024-11-21T01:33:07.540000 -CVE-2011-4856,0,1,78e79dc99094d7cf755446d2fab6c3015834414fe86130c1a97677ec33c848a9,2024-11-21T01:33:07.680000 -CVE-2011-4857,0,1,ef982f700df7565700394c0b5f1d7fbe9eae9c5036ff6a422f1054eea2fe36c6,2024-11-21T01:33:07.820000 -CVE-2011-4858,0,1,5c877352ff32e6e6561e76efa3adb2e872361002375fd4ef320d7968e7d9d117,2024-11-21T01:33:07.977000 -CVE-2011-4859,0,1,9c6edd7b0b3ed5c4082c2882b5bc486f5d604b04efc83a9274147bdf2dded942,2024-11-21T01:33:08.170000 -CVE-2011-4860,0,1,ebbe9ac530547284ce206ee8cb840943a36573c697f132fcfba830273452d337,2024-11-21T01:33:08.320000 -CVE-2011-4861,0,1,337a699a6ebc43a726e9e305c117b39a5f92a35e106694eeed34cb930d5d16a5,2024-11-21T01:33:08.467000 -CVE-2011-4862,0,1,52c0ce315aca92646ddfc9142bbd042db16da84005f991de758ed7bdf319f0a7,2024-11-21T01:33:08.610000 -CVE-2011-4863,0,1,36f1dc66ed9250fd3a57e549d63ef76b943208bf70499beb29c3b413e7a22218,2024-11-21T01:33:08.803000 -CVE-2011-4864,0,1,7975813b01600139fbbae93fd2d7f1e80b1d67c6b9dbd5fbbf0931c96564968b,2024-11-21T01:33:08.957000 -CVE-2011-4865,0,1,9789d653e9feb6795ecca3953acc10d47125d9304905bfb3beff2f8cdba771de,2024-11-21T01:33:09.097000 -CVE-2011-4866,0,1,38b53de387609994c61c1500a62559398f1945659f645be249f7890d4360997c,2024-11-21T01:33:09.233000 -CVE-2011-4867,0,1,d8c0e6c8b3e9366d6f9994de34afb6f966932a6b61e6954c58c4eb940832847b,2024-11-21T01:33:09.363000 -CVE-2011-4868,0,1,fc4fd90eedea830ae1f9b4cb91e6e732dc3fc9c2155afd4d68a89a46e0ab9962,2024-11-21T01:33:09.503000 -CVE-2011-4869,0,1,8625e40c74b61758a7f4329d6efb1c0d7d842a3660da3131682a8baeb5b9cadf,2024-11-21T01:33:09.653000 -CVE-2011-4870,0,1,79a4fbf7ed48c2d54dbaffda394396204a9d5b8124099ceb1b2b5d9079c5f4e0,2024-11-21T01:33:09.807000 +CVE-2011-4822,0,0,41218d089f79a092ac81714db9fd0ecfd4edd11916ce3c181e85af9f96eae562,2024-11-21T01:33:03.923000 +CVE-2011-4823,0,0,7b5bdf556d64fb0847d638cbdef896ae662dcd653611db430445378de7a3f443,2024-11-21T01:33:04.087000 +CVE-2011-4824,0,0,ceeb22222e0f88a6ded2f098ee8c99743e0014198419376295e808eaaf9a54b4,2024-11-21T01:33:04.227000 +CVE-2011-4825,0,0,817864dc76060eae3fa196162be2e242b4c11717ce3aaffd53f7673aff018d37,2024-11-21T01:33:04.383000 +CVE-2011-4826,0,0,2c6ddc03ce09e99cabbb512bc38b1ce1220a432067f1fcd4eca5ec6670539a84,2024-11-21T01:33:04.533000 +CVE-2011-4827,0,0,41b834ca18b164ee497aaef626b7e84be4e3db93c1d10bb2d79a34ae3da30c35,2024-11-21T01:33:04.673000 +CVE-2011-4828,0,0,ba9ce7867e948db1f8df0f863a6bfb00a9c2bf8f6285e2ad3b42afcf179eb260,2024-11-21T01:33:04.803000 +CVE-2011-4829,0,0,0c9449e160ac97e7ac6ff07c9398ab5ea892f96383e74011251e4956cdf3dd41,2024-11-21T01:33:04.940000 +CVE-2011-4830,0,0,c280e96ff783f2693ff67273cfe4313e1de09f7631ef3ae7bbe3e00f17c28216,2024-11-21T01:33:05.073000 +CVE-2011-4831,0,0,eb6d110323a9a95a8b631145109ee0de3efce38be0761810e365939d627db7ee,2024-11-21T01:33:05.220000 +CVE-2011-4832,0,0,923d467c06a90bb645fd88eee0ec17c3508bd2cbdc929748645f55fc041c138e,2024-11-21T01:33:05.357000 +CVE-2011-4833,0,0,028ff05a109eecfb8796d12bb4e7aa9b4fb5fa448322c63cb4cf08178da33111,2024-11-21T01:33:05.513000 +CVE-2011-4834,0,0,b53183d035ca2681e87d244f6715dac1e41b95ebec0db888dd950e85a0deee64,2024-11-21T01:33:05.663000 +CVE-2011-4835,0,0,5bc5bcf472d2817742ad6ee4f387b6225f74ffba6086d5da40607ca96dc73495,2024-11-21T01:33:05.807000 +CVE-2011-4836,0,0,603e8a162577a9f9cd185f21df2898b487a926e0af519e06c3430410dd5503f0,2024-11-21T01:33:05.947000 +CVE-2011-4837,0,0,e4766f3bbec93d0d4935b0fbf4618eecf91af4df2eb2d49a115590a9fe42bb62,2024-11-21T01:33:06.080000 +CVE-2011-4838,0,0,7b86adaa34321c67625080152f3faf3e4eaad5daeded848fe8cb32d9932b754a,2024-11-21T01:33:06.217000 +CVE-2011-4847,0,0,cfd2d3fd71c3674e0c46e8cc22973da756c9608bbe4e8ad3f8ddc3f28e25b031,2024-11-21T01:33:06.370000 +CVE-2011-4848,0,0,fe904ec796ae8570c1d76bce86895e2098bd5117a195b125ebc609fb4daca083,2024-11-21T01:33:06.523000 +CVE-2011-4849,0,0,531b1080a699097529aa5651d6a8fe04144f409fbde4c24fc3878fe45e8ccfc1,2024-11-21T01:33:06.680000 +CVE-2011-4850,0,0,0e474f4efeb5c7578b0312b6b15d58fb1cc4706d69365f1f532a77e926ecebc1,2024-11-21T01:33:06.833000 +CVE-2011-4851,0,0,b9c4fe9030e8bbc596a613b1e416cea0835bf5201b5377a71e0c838e935fb747,2024-11-21T01:33:06.980000 +CVE-2011-4852,0,0,b73c99fa2570cf777e7fc6d2341174571e772290ff471f55d6bcb42f6d076e0a,2024-11-21T01:33:07.110000 +CVE-2011-4853,0,0,a9975ffd3052cb275b56f6778e327bc554ef34564543637f885b4fd257ca7a8f,2024-11-21T01:33:07.263000 +CVE-2011-4854,0,0,0d0d569045105c471a8c95ad4c48b4ecc8edafcbd6ae3f98b767ec7c03690355,2024-11-21T01:33:07.397000 +CVE-2011-4855,0,0,f33fabab8868c8ea3e7662d7815549fbfa2f3e392ee10655a1000c993292740c,2024-11-21T01:33:07.540000 +CVE-2011-4856,0,0,78e79dc99094d7cf755446d2fab6c3015834414fe86130c1a97677ec33c848a9,2024-11-21T01:33:07.680000 +CVE-2011-4857,0,0,ef982f700df7565700394c0b5f1d7fbe9eae9c5036ff6a422f1054eea2fe36c6,2024-11-21T01:33:07.820000 +CVE-2011-4858,0,0,5c877352ff32e6e6561e76efa3adb2e872361002375fd4ef320d7968e7d9d117,2024-11-21T01:33:07.977000 +CVE-2011-4859,0,0,9c6edd7b0b3ed5c4082c2882b5bc486f5d604b04efc83a9274147bdf2dded942,2024-11-21T01:33:08.170000 +CVE-2011-4860,0,0,ebbe9ac530547284ce206ee8cb840943a36573c697f132fcfba830273452d337,2024-11-21T01:33:08.320000 +CVE-2011-4861,0,0,337a699a6ebc43a726e9e305c117b39a5f92a35e106694eeed34cb930d5d16a5,2024-11-21T01:33:08.467000 +CVE-2011-4862,0,0,52c0ce315aca92646ddfc9142bbd042db16da84005f991de758ed7bdf319f0a7,2024-11-21T01:33:08.610000 +CVE-2011-4863,0,0,36f1dc66ed9250fd3a57e549d63ef76b943208bf70499beb29c3b413e7a22218,2024-11-21T01:33:08.803000 +CVE-2011-4864,0,0,7975813b01600139fbbae93fd2d7f1e80b1d67c6b9dbd5fbbf0931c96564968b,2024-11-21T01:33:08.957000 +CVE-2011-4865,0,0,9789d653e9feb6795ecca3953acc10d47125d9304905bfb3beff2f8cdba771de,2024-11-21T01:33:09.097000 +CVE-2011-4866,0,0,38b53de387609994c61c1500a62559398f1945659f645be249f7890d4360997c,2024-11-21T01:33:09.233000 +CVE-2011-4867,0,0,d8c0e6c8b3e9366d6f9994de34afb6f966932a6b61e6954c58c4eb940832847b,2024-11-21T01:33:09.363000 +CVE-2011-4868,0,0,fc4fd90eedea830ae1f9b4cb91e6e732dc3fc9c2155afd4d68a89a46e0ab9962,2024-11-21T01:33:09.503000 +CVE-2011-4869,0,0,8625e40c74b61758a7f4329d6efb1c0d7d842a3660da3131682a8baeb5b9cadf,2024-11-21T01:33:09.653000 +CVE-2011-4870,0,0,79a4fbf7ed48c2d54dbaffda394396204a9d5b8124099ceb1b2b5d9079c5f4e0,2024-11-21T01:33:09.807000 CVE-2011-4871,0,0,cc8b91a4fd5ed9e20f80d408d82a5d7de7d8dc33390a71a727c90a51d4ab774a,2012-04-20T04:00:00 CVE-2011-4872,0,0,8be46a88b3cd887d0a46440c0f787b28b86f1df1d41335b188e886a1109ba3ab,2012-02-16T05:00:00 -CVE-2011-4873,0,1,553e921cb2c47bb585ef990391742b543610f7948579fcfa4c290249836ea507,2024-11-21T01:33:10.127000 +CVE-2011-4873,0,0,553e921cb2c47bb585ef990391742b543610f7948579fcfa4c290249836ea507,2024-11-21T01:33:10.127000 CVE-2011-4874,0,0,a1806d45b33e39db47182f132cbb38189f3e2f7fe234b1af864882b5b7a91cbf,2017-08-29T01:30:37.053000 CVE-2011-4875,0,0,703be2819e3ad9f8a2d18597fefb261798ae0b13daf64d97b9cb2552633084b8,2017-08-29T01:30:37.130000 CVE-2011-4876,0,0,db20b34ab9d08fbd5d359b29b03f4fa1709afe352f90c857e770a6946e86f2e9,2017-08-29T01:30:37.210000 @@ -51370,25 +51370,25 @@ CVE-2011-4880,0,0,b408e8ee2331e3216f17efd310bd807b6bcfdc50aa2ee93f9f23a9df557cbb CVE-2011-4881,0,0,b2adcc3271992c5a3dc4a828d6d08a42fa1fa8f685766a4c7c6064539763c346,2012-04-13T13:22:15.277000 CVE-2011-4882,0,0,662afa959d38a82f813a3d02e18969a60ea0fce8de2d566f4740d1c11b7460c5,2012-04-13T13:26:36.620000 CVE-2011-4883,0,0,77523034ef43271677f8026842482f66b1cc13258d93ba44fe70600e49ba8a7f,2012-04-13T13:27:49.337000 -CVE-2011-4885,0,1,296806dc7976c87ebaa2f10f428977a3623c55ed0bfe59673ffe4162f969d332,2024-11-21T01:33:12.920000 +CVE-2011-4885,0,0,296806dc7976c87ebaa2f10f428977a3623c55ed0bfe59673ffe4162f969d332,2024-11-21T01:33:12.920000 CVE-2011-4887,0,0,bbc07a7083a8af27f3d5105fe5abbe7256ade5dc256f5ff1c58dee6128fab6bb,2017-08-29T01:30:37.710000 CVE-2011-4889,0,0,d3c9ccfc55a6df2ec09b060f15f93d5a87a6ca0f320c09e03da3ef510eba7fe9,2018-03-10T15:08:47.197000 CVE-2011-4890,0,0,6a55ba254c345d646a73e25fa35ba207a2c527f6c803d7e74ae66aa923df09bf,2017-08-29T01:30:37.807000 CVE-2011-4891,0,0,2f07f71beb31ce7d0845aefa98fc4bca0cab9eac4b4f21d0e5b9c7622a3dd563,2023-11-07T02:09:38.960000 CVE-2011-4892,0,0,3be8eaf5a298f33d8dbf67730829606b3f6fb40ea02d9be28b572fd011a20b1d,2023-11-07T02:09:39.287000 CVE-2011-4893,0,0,081d6dfaa00c558ec1654b1c59cf9601aed8c06878ac02660cb700cee172570a,2023-11-07T02:09:39.520000 -CVE-2011-4894,0,1,db29bb0bf71b272f49b799981f7755df2b6b482457b7f880dcce33fd44099a5e,2024-11-21T01:33:13.517000 -CVE-2011-4895,0,1,e2c33f9c389d9c16a7ac99c08153ecc9ca873a58bcf51aca4790c8cdf3bf2321,2024-11-21T01:33:15.193000 -CVE-2011-4896,0,1,94ebfd5bebc8dfaecd31ca055a643ab172b9a14a77c6a2d4970adac8c6e6193e,2024-11-21T01:33:15.350000 -CVE-2011-4897,0,1,48a28b7e61aa42a85edc05fafacc0868c30c9bde2fb79ab4e868ab72f8544588,2024-11-21T01:33:15.500000 -CVE-2011-4898,0,1,2aa559fec4d9e86ee74c03c774c0462c81f6634aa2acbd6a669ed0eef446826b,2024-11-21T01:33:15.650000 -CVE-2011-4899,0,1,c14a58b4a609088abb412736bab04933f41b136d24c978ed1ae950215d8bc349,2024-11-21T01:33:15.800000 +CVE-2011-4894,0,0,db29bb0bf71b272f49b799981f7755df2b6b482457b7f880dcce33fd44099a5e,2024-11-21T01:33:13.517000 +CVE-2011-4895,0,0,e2c33f9c389d9c16a7ac99c08153ecc9ca873a58bcf51aca4790c8cdf3bf2321,2024-11-21T01:33:15.193000 +CVE-2011-4896,0,0,94ebfd5bebc8dfaecd31ca055a643ab172b9a14a77c6a2d4970adac8c6e6193e,2024-11-21T01:33:15.350000 +CVE-2011-4897,0,0,48a28b7e61aa42a85edc05fafacc0868c30c9bde2fb79ab4e868ab72f8544588,2024-11-21T01:33:15.500000 +CVE-2011-4898,0,0,2aa559fec4d9e86ee74c03c774c0462c81f6634aa2acbd6a669ed0eef446826b,2024-11-21T01:33:15.650000 +CVE-2011-4899,0,0,c14a58b4a609088abb412736bab04933f41b136d24c978ed1ae950215d8bc349,2024-11-21T01:33:15.800000 CVE-2011-4900,0,0,b2d7f2427d13e3300c93a6bba05d3f7a68b7a8eebeb6d6a20b9f5809ad709c01,2019-11-07T20:26:49.310000 CVE-2011-4901,0,0,2efa0bb49928eadfa56c2d1cc0d9d702c05168f21a5265215d2ee39bf4261dde,2019-11-08T15:43:50.467000 CVE-2011-4902,0,0,0a3b9f20fe42341d4380f567948647ba64030d1aee9b18be2a29243fb94aea47,2019-11-08T15:25:14.107000 CVE-2011-4903,0,0,e5911d45dc5b2c628012eb58012aba6200fd92ec39b8a830b4ee4426d71d642f,2019-11-07T20:40:36.690000 CVE-2011-4904,0,0,f3ecc67d8056ce3f3718f214b3226e8869b6cc92be3ef3f41cd1a9f460d3f871,2019-11-08T15:12:21.883000 -CVE-2011-4905,0,1,4cc649d91376d32243ab7ef3d1614181672ad12d59d455364971f8e6b70d5b0f,2024-11-21T01:33:16.460000 +CVE-2011-4905,0,0,4cc649d91376d32243ab7ef3d1614181672ad12d59d455364971f8e6b70d5b0f,2024-11-21T01:33:16.460000 CVE-2011-4906,0,0,32d5fc33bbcd7641d6967b4e0e51fd3196d241c92838dedc2b4cf43123cf6039,2020-02-25T19:02:03.673000 CVE-2011-4907,0,0,053c47aa21603407582d21fd9722004e14a077c8c72c51ac6794680010cd6600,2020-01-22T21:23:54.640000 CVE-2011-4908,0,0,2bef6d75943a8b6722a1bad2372ab1a3b8637756271a5cbc2d896f20567689f6,2020-02-25T19:03:34.397000 @@ -51403,12 +51403,12 @@ CVE-2011-4916,0,0,5ea48259d8cdc200eaf16022cda086270d8c9c798e786e6996b8a427b91cd0 CVE-2011-4917,0,0,7c5bcfea632cdb77d32883f6d6254fb78386265f054d36e7b86e26015c08e1a4,2022-04-26T18:33:18.717000 CVE-2011-4918,0,0,80109e6a8c942d7259f09dd726e5bd4f118c649ffa36151ec169f962e5535abb,2018-10-09T19:33:37.497000 CVE-2011-4919,0,0,f79992dd19be34226f69aab5fd6901bfd9a8597c85a865b4aa0b5f838f7c9fb1,2019-11-21T15:45:18.717000 -CVE-2011-4920,0,1,fb9ac6b4f5833ce4596c256c31149bd037b8fd9dcf351dd78018270afbc2345f,2024-11-21T01:33:18.133000 -CVE-2011-4921,0,1,97d30aa5927f41f30fce6372c03c5214564cd28d7c11bb9ba53f8aae5dd4025f,2024-11-21T01:33:18.237000 +CVE-2011-4920,0,0,fb9ac6b4f5833ce4596c256c31149bd037b8fd9dcf351dd78018270afbc2345f,2024-11-21T01:33:18.133000 +CVE-2011-4921,0,0,97d30aa5927f41f30fce6372c03c5214564cd28d7c11bb9ba53f8aae5dd4025f,2024-11-21T01:33:18.237000 CVE-2011-4922,0,0,d53359ebefc0908a1c8bfd713dfbad0b1be13f330058166f33168ef2abf2d506,2017-09-19T01:34:26.713000 CVE-2011-4923,0,0,ce1df6732c386c885bc58d673ee803c3c8c1120a8d51bc35f5d0dbe30d122a62,2017-08-29T01:30:38.083000 CVE-2011-4924,0,0,d9b18e8097597db1526a1403f261666d01f4d2f8e48119b8ecb6de5cdbe0ec7c,2019-12-05T16:01:21.703000 -CVE-2011-4925,0,1,1b3a4aed021e2ba9b7ed3dbe87199d4380e40dad7680901cb1e9f65f4326d2b0,2024-11-21T01:33:18.670000 +CVE-2011-4925,0,0,1b3a4aed021e2ba9b7ed3dbe87199d4380e40dad7680901cb1e9f65f4326d2b0,2024-11-21T01:33:18.670000 CVE-2011-4926,0,0,cfb5c03c01573ca9084b853f7e33b85920c976f1534e968f366707c104dce87a,2023-11-07T02:09:40.133000 CVE-2011-4927,0,0,4c6f87826329c52bec60f5501d7cfb5a23aac9936c241fb291bc49adb69380d6,2012-10-09T04:00:00 CVE-2011-4928,0,0,815340ddc139341b181d911a140dc151f0b5f9309aff411a7a24efff3bc3dcb8,2012-10-09T04:00:00 @@ -51484,76 +51484,76 @@ CVE-2011-4997,0,0,2311179c75190c6121d36d5252626da7962f9eae6e286ea298ad6bfea21706 CVE-2011-4998,0,0,ad4c14ae07aaa2bf72484050e78e7031e7ebb92244bcefa158a97780ae4fb28e,2023-11-07T02:09:47.290000 CVE-2011-4999,0,0,28f7fa52ccfdfdded77d39d1978b45f1c92bbdb850f34a889128df73d0721648,2023-11-07T02:09:47.500000 CVE-2011-5000,0,0,63305d492fcf460b42895c7b8f274912d3eca8ad2f8a508f39ebf61cd34d5db7,2012-07-22T03:33:00.197000 -CVE-2011-5001,0,1,d3686347bfd7dd5efaaf57b6ec6751d37794b0d19016e8a893fdbfcff41b7eba,2024-11-21T01:33:24.190000 -CVE-2011-5002,0,1,22cb955d6b9adb46ce2f533be41569adf9cbfc752dd18a2d8c63d8f0909bd6fc,2024-11-21T01:33:24.350000 -CVE-2011-5003,0,1,85d39f1c24544b30cb1027cdffa5beb032e122a0888b216919ec2552ceaa011e,2024-11-21T01:33:24.497000 -CVE-2011-5004,0,1,4e68177022b038913231b19e877d81c3b0d8303aadca7e39f6db2e45522f3482,2024-11-21T01:33:24.633000 -CVE-2011-5005,0,1,d755a9c8b3ae96c3d6d50af5fc66b6dcdbf712004d7b61255269e8d180ad9511,2024-11-21T01:33:24.773000 -CVE-2011-5006,0,1,3c0f026d29dfb448bc3a8f68cd7535dad0a86b5aec035e7ce8c5719dbe30a33e,2024-11-21T01:33:24.913000 -CVE-2011-5007,0,1,32f1418da0e5d3ae94a1cb082ea06785049bd29c53a0f4142ebf50030fa69b67,2024-11-21T01:33:25.053000 -CVE-2011-5008,0,1,742f4358426b20bed04980ef69b652d262bfc3b4338b2a65995a3f88908f0e01,2024-11-21T01:33:25.193000 -CVE-2011-5009,0,1,bd7f562f7c06b5e7194d5856120780ea4c78ced293396acb58572d1d57c9b87d,2024-11-21T01:33:25.340000 -CVE-2011-5010,0,1,4fe162dcc2989789ebbebe3571dfd470ced1228c1c7f037b9c4ef9c7a3b690ce,2024-11-21T01:33:25.480000 -CVE-2011-5011,0,1,26b96121be78e4a689185d2bddd2472b0f3f0ad15aeed0350a6635fe5b42c745,2024-11-21T01:33:25.610000 -CVE-2011-5012,0,1,a5ce778b670223d69b879037e779879e2e702379b78be352ebb49bb6c0b5eb48,2024-11-21T01:33:25.747000 +CVE-2011-5001,0,0,d3686347bfd7dd5efaaf57b6ec6751d37794b0d19016e8a893fdbfcff41b7eba,2024-11-21T01:33:24.190000 +CVE-2011-5002,0,0,22cb955d6b9adb46ce2f533be41569adf9cbfc752dd18a2d8c63d8f0909bd6fc,2024-11-21T01:33:24.350000 +CVE-2011-5003,0,0,85d39f1c24544b30cb1027cdffa5beb032e122a0888b216919ec2552ceaa011e,2024-11-21T01:33:24.497000 +CVE-2011-5004,0,0,4e68177022b038913231b19e877d81c3b0d8303aadca7e39f6db2e45522f3482,2024-11-21T01:33:24.633000 +CVE-2011-5005,0,0,d755a9c8b3ae96c3d6d50af5fc66b6dcdbf712004d7b61255269e8d180ad9511,2024-11-21T01:33:24.773000 +CVE-2011-5006,0,0,3c0f026d29dfb448bc3a8f68cd7535dad0a86b5aec035e7ce8c5719dbe30a33e,2024-11-21T01:33:24.913000 +CVE-2011-5007,0,0,32f1418da0e5d3ae94a1cb082ea06785049bd29c53a0f4142ebf50030fa69b67,2024-11-21T01:33:25.053000 +CVE-2011-5008,0,0,742f4358426b20bed04980ef69b652d262bfc3b4338b2a65995a3f88908f0e01,2024-11-21T01:33:25.193000 +CVE-2011-5009,0,0,bd7f562f7c06b5e7194d5856120780ea4c78ced293396acb58572d1d57c9b87d,2024-11-21T01:33:25.340000 +CVE-2011-5010,0,0,4fe162dcc2989789ebbebe3571dfd470ced1228c1c7f037b9c4ef9c7a3b690ce,2024-11-21T01:33:25.480000 +CVE-2011-5011,0,0,26b96121be78e4a689185d2bddd2472b0f3f0ad15aeed0350a6635fe5b42c745,2024-11-21T01:33:25.610000 +CVE-2011-5012,0,0,a5ce778b670223d69b879037e779879e2e702379b78be352ebb49bb6c0b5eb48,2024-11-21T01:33:25.747000 CVE-2011-5018,0,0,ac9168408d5e330214994c2e84368be9f71f4ec9703fe51d6028e820c0934f4c,2023-11-07T02:09:47.820000 -CVE-2011-5019,0,1,09fe3a2b2345678d57aed25c61604bc40a3759ec27c006a9d3f6e4e43dc7da07,2024-11-21T01:33:26.043000 +CVE-2011-5019,0,0,09fe3a2b2345678d57aed25c61604bc40a3759ec27c006a9d3f6e4e43dc7da07,2024-11-21T01:33:26.043000 CVE-2011-5020,0,0,b1935a1f342881e72e84f2ae9a767bac67b6413701a87c1b0003fb252975c6a8,2020-01-14T14:29:50.037000 -CVE-2011-5021,0,1,c266421c20487f8a2629a613b78eec399a15458c3e664c029b9c60cc2265811a,2024-11-21T01:33:26.310000 -CVE-2011-5022,0,1,735d03bab5ff1248aa76967d2385f0c25bd4f6b6f9fd2bbd8b0eccbbf32506bf,2024-11-21T01:33:26.440000 -CVE-2011-5023,0,1,cdab9d5aa7978505be58b7cc2d79f029c38521107ca6cd3902dd87733ef1ad38,2024-11-21T01:33:26.570000 -CVE-2011-5024,0,1,27f2aa127280d8e3ea23644172b939e2cad11376c2721c8eadb76eaa80c39eba,2024-11-21T01:33:26.703000 -CVE-2011-5025,0,1,17f17ae2db32f3b9af9731d0838a30326cc59fbb4394b715886c028d161cb5be,2024-11-21T01:33:26.837000 -CVE-2011-5026,0,1,cf075fed276a09e49801bb53b12d720a55eda545f56ff1b80136556b612852e7,2024-11-21T01:33:26.970000 -CVE-2011-5027,0,1,7bbb7b445d04281ea80eba59f8718b3aae31149458d16dec94fe54eae0dfa374,2024-11-21T01:33:27.120000 -CVE-2011-5028,0,1,00fda065318a95336c39445be543d08938d6d7f43fee12fff127a64b4d585c3e,2024-11-21T01:33:27.270000 -CVE-2011-5029,0,1,2e1a1924b924fd878361c8e278a0e011bc09e885e363b9f4d9595d2b7c867e17,2024-11-21T01:33:27.413000 -CVE-2011-5030,0,1,4f34c516856e7cf4ed7a26ad812e81f497801cc0f46818c43be2a64cf00703f2,2024-11-21T01:33:27.550000 -CVE-2011-5031,0,1,327bf024c078fdbce304939316de965db624f6157cf46f0f22867c3a9fc48311,2024-11-21T01:33:27.687000 -CVE-2011-5032,0,1,2b05b700fdd3db7ba342f3b0627604abcdb21939a014cc5546e46d880c909457,2024-11-21T01:33:27.830000 -CVE-2011-5033,0,1,69e9100272cf13905009478bef9f0d93e1fa5ed22c1ae8c0ed8b56aa9aa77dc1,2024-11-21T01:33:27.960000 -CVE-2011-5034,0,1,59ed735f8522288e3c1662d628084cbee415291ed071802ae9082cafa60f96d3,2024-11-21T01:33:28.113000 -CVE-2011-5035,0,1,0584a3244b5bdedc38768fbca03d0702d37d826f824a4d7006499b295e4b0250,2024-11-21T01:33:28.300000 -CVE-2011-5036,0,1,36714692e99732dd813bdba46abb94a00d140f7d286abe26472230392e37caac,2024-11-21T01:33:28.483000 -CVE-2011-5037,0,1,13589c7d55e9dc7e63ff5c01cf24cb28eef90b8c0a40e4e0203d32f090aef169,2024-11-21T01:33:28.643000 -CVE-2011-5038,0,1,bc0f25874c46a5f22e6898cb2d00105af281f066993f2b84f7ce5782415f3df3,2024-11-21T01:33:28.787000 -CVE-2011-5039,0,1,860fe738f31fc9029cc75a1e4ada9dd5dfe147d93a77430e89de4569632c1936,2024-11-21T01:33:28.933000 -CVE-2011-5040,0,1,8bd8e9f2ea4049ea7c43f8306b0cb2092ded7b4d990d65f15da68245196524c8,2024-11-21T01:33:29.073000 -CVE-2011-5041,0,1,522655999c1affddc332bea335ea35b218ba1578a7b77dce26c94beff22d430c,2024-11-21T01:33:29.207000 -CVE-2011-5042,0,1,febd8e0e89cf49ac1cb963f0b9bdb076b1c43965d6686bf55aacb256ace22434,2024-11-21T01:33:29.340000 -CVE-2011-5043,0,1,ce263ef58210374d7116f90a38c59aedda046a1b19fed56cd77841c42139e480,2024-11-21T01:33:29.500000 -CVE-2011-5044,0,1,7120095a40f47d266b0d8e5be94caca9a407ff17de90f4820fe4034b4428d865,2024-11-21T01:33:29.647000 -CVE-2011-5045,0,1,1e0a6b7b46ca5306d640a06b64e21cc84e34f75993640fc72811b4c91fb109be,2024-11-21T01:33:29.787000 -CVE-2011-5046,0,1,93df05c26814a5996cdc07e58f3bb55e932d7ccb3e1ef6a3e9b28b124fefd491,2024-11-21T01:33:29.930000 -CVE-2011-5047,0,1,e4ade1b4dafc7b1f0020eea18bb012b3404c4a23d26fb1d9305cec6df00ac494,2024-11-21T01:33:30.077000 -CVE-2011-5048,0,1,acab469b2a9b8d51707f65a1e41194e23f5d6bd32e6138bcab2a9d26308c3f83,2024-11-21T01:33:30.230000 -CVE-2011-5049,0,1,7f285200f65fc98115f4b90958dfa28a94229a7da756ca744047378fe7f028b8,2024-11-21T01:33:30.370000 -CVE-2011-5050,0,1,73199b91b9734a39615702cdb848076749dbc69545a04e444d2cf9576dfc05b6,2024-11-21T01:33:30.517000 -CVE-2011-5051,0,1,200caa594456770688ce00154fc0016481728dbaba2c4869bd0bed55f9c51619,2024-11-21T01:33:30.657000 -CVE-2011-5052,0,1,26d1c07dc81ab322d4178abf00d4d39f98a8bea3f16da202cb6d2241d4f2d083,2024-11-21T01:33:30.823000 -CVE-2011-5053,0,1,b02659766b1f03af21b10ec775b65be4a218901469ebc9abc61160dbc58b4dbd,2024-11-21T01:33:30.960000 -CVE-2011-5054,0,1,638d28ff6641c11aa77bdf53a68c7145013b0f30e7485a8b2fa9d43bbaf6ddf0,2024-11-21T01:33:31.070000 -CVE-2011-5055,0,1,51e1469104957c4e7d6cd44aa3fb215669b0b7e5336873805e8f004979281682,2024-11-21T01:33:31.223000 -CVE-2011-5056,0,1,33ade166bcee7686e1ba796d5c28c34881f0f08f46fe19aa95a5ea0553273e12,2024-11-21T01:33:31.370000 -CVE-2011-5057,0,1,ea608dfb277abf628ed2499d02afe26652b849305754ae91c9480158b36ac0d3,2024-11-21T01:33:31.510000 -CVE-2011-5058,0,1,d3873160ef22dc20d232d9dcbb5a8c9be4dfb2ab68d67f376febb23e1bfb0dd3,2024-11-21T01:33:31.660000 -CVE-2011-5059,0,1,7ed3fb0731e44fe90c845671166f607df9544791bb3850373322b415a13dbb26,2024-11-21T01:33:31.813000 -CVE-2011-5060,0,1,38785f307ff13b3fee3fe27a3dd9070ae4a3fcb628f10ab00a318d50d4a611ea,2024-11-21T01:33:31.940000 -CVE-2011-5061,0,1,a51054c458ea1ffec72b738432e2cda36d79f7ca2259a4aaec5a2371c5a290ac,2024-11-21T01:33:32.093000 -CVE-2011-5062,0,1,d0a15a050011996548cd85483c929383e9d42c1d2d75cd82b713dd9ba48ecc56,2024-11-21T01:33:32.240000 -CVE-2011-5063,0,1,623dd9f7b6cfaa9373e199503145f63c6ebe6554106a9bdfeaf93e125efe5ba6,2024-11-21T01:33:32.437000 -CVE-2011-5064,0,1,e6fe1a6e72bdcffc187593ef4d7f144f2da6e6b71ef44450d2687059c4e63656,2024-11-21T01:33:32.640000 -CVE-2011-5065,0,1,fff6034de823898cd90191e262b8d2dabf552eb53460098c42c6240685db213d,2024-11-21T01:33:32.843000 -CVE-2011-5066,0,1,4b66db6a1074990c2172884b12112812dc3167ef6675989c1e89265604a23121,2024-11-21T01:33:32.997000 -CVE-2011-5067,0,1,7e1112964be77198416a208b57b55a7401f3274bb26b4a4029326ef26ad28103,2024-11-21T01:33:33.173000 -CVE-2011-5068,0,1,964a914943e58ff6b05b3e7d79bc9501415711f8b817338a039451dc478cfea4,2024-11-21T01:33:33.327000 -CVE-2011-5069,0,1,2871a5388c8ebe5cecc17c9a9500720e821e5cc809e7666cb639043c5b67c67b,2024-11-21T01:33:33.490000 -CVE-2011-5070,0,1,e5aa25c2fbc1becabe5044aac897ba557f3a60278ae19204d9c64e83529c693c,2024-11-21T01:33:33.637000 -CVE-2011-5071,0,1,48b58cac7a0838f99bc265a47ff7e895758f3051a486144bdd79969a2f4ef7b9,2024-11-21T01:33:33.777000 -CVE-2011-5072,0,1,5fc696515df069d18b9d833955d8af95dd0580ddf44ccd2ced54668f48709947,2024-11-21T01:33:33.930000 -CVE-2011-5073,0,1,52c6be9698637c9d94f1f5b24b66c0a7e0448132dd25362d59f7554bf5e762f9,2024-11-21T01:33:34.080000 -CVE-2011-5074,0,1,0015da41b6bda23848d373f790ef3c764657475b531edd7713a60013ea3acf15,2024-11-21T01:33:34.233000 -CVE-2011-5075,0,1,dac45b2e0dd025062dc90fdd6e49215bfd6833f6be86bedbdd774fb6de4e053a,2024-11-21T01:33:34.403000 +CVE-2011-5021,0,0,c266421c20487f8a2629a613b78eec399a15458c3e664c029b9c60cc2265811a,2024-11-21T01:33:26.310000 +CVE-2011-5022,0,0,735d03bab5ff1248aa76967d2385f0c25bd4f6b6f9fd2bbd8b0eccbbf32506bf,2024-11-21T01:33:26.440000 +CVE-2011-5023,0,0,cdab9d5aa7978505be58b7cc2d79f029c38521107ca6cd3902dd87733ef1ad38,2024-11-21T01:33:26.570000 +CVE-2011-5024,0,0,27f2aa127280d8e3ea23644172b939e2cad11376c2721c8eadb76eaa80c39eba,2024-11-21T01:33:26.703000 +CVE-2011-5025,0,0,17f17ae2db32f3b9af9731d0838a30326cc59fbb4394b715886c028d161cb5be,2024-11-21T01:33:26.837000 +CVE-2011-5026,0,0,cf075fed276a09e49801bb53b12d720a55eda545f56ff1b80136556b612852e7,2024-11-21T01:33:26.970000 +CVE-2011-5027,0,0,7bbb7b445d04281ea80eba59f8718b3aae31149458d16dec94fe54eae0dfa374,2024-11-21T01:33:27.120000 +CVE-2011-5028,0,0,00fda065318a95336c39445be543d08938d6d7f43fee12fff127a64b4d585c3e,2024-11-21T01:33:27.270000 +CVE-2011-5029,0,0,2e1a1924b924fd878361c8e278a0e011bc09e885e363b9f4d9595d2b7c867e17,2024-11-21T01:33:27.413000 +CVE-2011-5030,0,0,4f34c516856e7cf4ed7a26ad812e81f497801cc0f46818c43be2a64cf00703f2,2024-11-21T01:33:27.550000 +CVE-2011-5031,0,0,327bf024c078fdbce304939316de965db624f6157cf46f0f22867c3a9fc48311,2024-11-21T01:33:27.687000 +CVE-2011-5032,0,0,2b05b700fdd3db7ba342f3b0627604abcdb21939a014cc5546e46d880c909457,2024-11-21T01:33:27.830000 +CVE-2011-5033,0,0,69e9100272cf13905009478bef9f0d93e1fa5ed22c1ae8c0ed8b56aa9aa77dc1,2024-11-21T01:33:27.960000 +CVE-2011-5034,0,0,59ed735f8522288e3c1662d628084cbee415291ed071802ae9082cafa60f96d3,2024-11-21T01:33:28.113000 +CVE-2011-5035,0,0,0584a3244b5bdedc38768fbca03d0702d37d826f824a4d7006499b295e4b0250,2024-11-21T01:33:28.300000 +CVE-2011-5036,0,0,36714692e99732dd813bdba46abb94a00d140f7d286abe26472230392e37caac,2024-11-21T01:33:28.483000 +CVE-2011-5037,0,0,13589c7d55e9dc7e63ff5c01cf24cb28eef90b8c0a40e4e0203d32f090aef169,2024-11-21T01:33:28.643000 +CVE-2011-5038,0,0,bc0f25874c46a5f22e6898cb2d00105af281f066993f2b84f7ce5782415f3df3,2024-11-21T01:33:28.787000 +CVE-2011-5039,0,0,860fe738f31fc9029cc75a1e4ada9dd5dfe147d93a77430e89de4569632c1936,2024-11-21T01:33:28.933000 +CVE-2011-5040,0,0,8bd8e9f2ea4049ea7c43f8306b0cb2092ded7b4d990d65f15da68245196524c8,2024-11-21T01:33:29.073000 +CVE-2011-5041,0,0,522655999c1affddc332bea335ea35b218ba1578a7b77dce26c94beff22d430c,2024-11-21T01:33:29.207000 +CVE-2011-5042,0,0,febd8e0e89cf49ac1cb963f0b9bdb076b1c43965d6686bf55aacb256ace22434,2024-11-21T01:33:29.340000 +CVE-2011-5043,0,0,ce263ef58210374d7116f90a38c59aedda046a1b19fed56cd77841c42139e480,2024-11-21T01:33:29.500000 +CVE-2011-5044,0,0,7120095a40f47d266b0d8e5be94caca9a407ff17de90f4820fe4034b4428d865,2024-11-21T01:33:29.647000 +CVE-2011-5045,0,0,1e0a6b7b46ca5306d640a06b64e21cc84e34f75993640fc72811b4c91fb109be,2024-11-21T01:33:29.787000 +CVE-2011-5046,0,0,93df05c26814a5996cdc07e58f3bb55e932d7ccb3e1ef6a3e9b28b124fefd491,2024-11-21T01:33:29.930000 +CVE-2011-5047,0,0,e4ade1b4dafc7b1f0020eea18bb012b3404c4a23d26fb1d9305cec6df00ac494,2024-11-21T01:33:30.077000 +CVE-2011-5048,0,0,acab469b2a9b8d51707f65a1e41194e23f5d6bd32e6138bcab2a9d26308c3f83,2024-11-21T01:33:30.230000 +CVE-2011-5049,0,0,7f285200f65fc98115f4b90958dfa28a94229a7da756ca744047378fe7f028b8,2024-11-21T01:33:30.370000 +CVE-2011-5050,0,0,73199b91b9734a39615702cdb848076749dbc69545a04e444d2cf9576dfc05b6,2024-11-21T01:33:30.517000 +CVE-2011-5051,0,0,200caa594456770688ce00154fc0016481728dbaba2c4869bd0bed55f9c51619,2024-11-21T01:33:30.657000 +CVE-2011-5052,0,0,26d1c07dc81ab322d4178abf00d4d39f98a8bea3f16da202cb6d2241d4f2d083,2024-11-21T01:33:30.823000 +CVE-2011-5053,0,0,b02659766b1f03af21b10ec775b65be4a218901469ebc9abc61160dbc58b4dbd,2024-11-21T01:33:30.960000 +CVE-2011-5054,0,0,638d28ff6641c11aa77bdf53a68c7145013b0f30e7485a8b2fa9d43bbaf6ddf0,2024-11-21T01:33:31.070000 +CVE-2011-5055,0,0,51e1469104957c4e7d6cd44aa3fb215669b0b7e5336873805e8f004979281682,2024-11-21T01:33:31.223000 +CVE-2011-5056,0,0,33ade166bcee7686e1ba796d5c28c34881f0f08f46fe19aa95a5ea0553273e12,2024-11-21T01:33:31.370000 +CVE-2011-5057,0,0,ea608dfb277abf628ed2499d02afe26652b849305754ae91c9480158b36ac0d3,2024-11-21T01:33:31.510000 +CVE-2011-5058,0,0,d3873160ef22dc20d232d9dcbb5a8c9be4dfb2ab68d67f376febb23e1bfb0dd3,2024-11-21T01:33:31.660000 +CVE-2011-5059,0,0,7ed3fb0731e44fe90c845671166f607df9544791bb3850373322b415a13dbb26,2024-11-21T01:33:31.813000 +CVE-2011-5060,0,0,38785f307ff13b3fee3fe27a3dd9070ae4a3fcb628f10ab00a318d50d4a611ea,2024-11-21T01:33:31.940000 +CVE-2011-5061,0,0,a51054c458ea1ffec72b738432e2cda36d79f7ca2259a4aaec5a2371c5a290ac,2024-11-21T01:33:32.093000 +CVE-2011-5062,0,0,d0a15a050011996548cd85483c929383e9d42c1d2d75cd82b713dd9ba48ecc56,2024-11-21T01:33:32.240000 +CVE-2011-5063,0,0,623dd9f7b6cfaa9373e199503145f63c6ebe6554106a9bdfeaf93e125efe5ba6,2024-11-21T01:33:32.437000 +CVE-2011-5064,0,0,e6fe1a6e72bdcffc187593ef4d7f144f2da6e6b71ef44450d2687059c4e63656,2024-11-21T01:33:32.640000 +CVE-2011-5065,0,0,fff6034de823898cd90191e262b8d2dabf552eb53460098c42c6240685db213d,2024-11-21T01:33:32.843000 +CVE-2011-5066,0,0,4b66db6a1074990c2172884b12112812dc3167ef6675989c1e89265604a23121,2024-11-21T01:33:32.997000 +CVE-2011-5067,0,0,7e1112964be77198416a208b57b55a7401f3274bb26b4a4029326ef26ad28103,2024-11-21T01:33:33.173000 +CVE-2011-5068,0,0,964a914943e58ff6b05b3e7d79bc9501415711f8b817338a039451dc478cfea4,2024-11-21T01:33:33.327000 +CVE-2011-5069,0,0,2871a5388c8ebe5cecc17c9a9500720e821e5cc809e7666cb639043c5b67c67b,2024-11-21T01:33:33.490000 +CVE-2011-5070,0,0,e5aa25c2fbc1becabe5044aac897ba557f3a60278ae19204d9c64e83529c693c,2024-11-21T01:33:33.637000 +CVE-2011-5071,0,0,48b58cac7a0838f99bc265a47ff7e895758f3051a486144bdd79969a2f4ef7b9,2024-11-21T01:33:33.777000 +CVE-2011-5072,0,0,5fc696515df069d18b9d833955d8af95dd0580ddf44ccd2ced54668f48709947,2024-11-21T01:33:33.930000 +CVE-2011-5073,0,0,52c6be9698637c9d94f1f5b24b66c0a7e0448132dd25362d59f7554bf5e762f9,2024-11-21T01:33:34.080000 +CVE-2011-5074,0,0,0015da41b6bda23848d373f790ef3c764657475b531edd7713a60013ea3acf15,2024-11-21T01:33:34.233000 +CVE-2011-5075,0,0,dac45b2e0dd025062dc90fdd6e49215bfd6833f6be86bedbdd774fb6de4e053a,2024-11-21T01:33:34.403000 CVE-2011-5076,0,0,8669ce8f5e9ff2a2156129aa631350ec9a4c10b4cd8b1f044b8f4ab1e73d3aea,2012-02-08T15:16:51.217000 CVE-2011-5077,0,0,34e8d1c4bce7e1ab11ba58f7c7fb04646cf44ba53e1110213ae22aca18e1dc5e,2012-02-08T15:21:35.717000 CVE-2011-5078,0,0,ea195c3ab0b50beac12a819e599b8251e92b3fd37e39b9f6647360216f245ce0,2012-02-09T05:00:00 @@ -51811,19 +51811,19 @@ CVE-2011-5370,0,0,71cfcbdae155a0dc89f11392278453b0fae69bcb13b948ee55d123f205d1dc CVE-2011-5371,0,0,fcb7279169e30c922e349494b854fd7ba840c24dd780a4211e025c5e5c5dd56d,2023-11-07T02:09:51.593000 CVE-2011-5372,0,0,41b4cd0f16d829b5ec0c3b315482844fee61a67c3040af3d67ccd47f23ac1319,2023-11-07T02:09:51.620000 CVE-2011-5373,0,0,35876c6ca9af5c618a354e273064d0ba807ce5a70e75d68a204620e1de766edc,2023-11-07T02:09:51.653000 -CVE-2012-0001,0,1,45b67e469f3da6328a6ec9798c295a2c87b1afbeab11ed158502beeb7e9211be,2024-11-21T01:34:10.290000 +CVE-2012-0001,0,0,45b67e469f3da6328a6ec9798c295a2c87b1afbeab11ed158502beeb7e9211be,2024-11-21T01:34:10.290000 CVE-2012-0002,0,0,9d298a4def9b0d26363a3f7c9570aa83bddb2dc68689045c35caed06c3d154c6,2023-12-07T18:38:56.693000 -CVE-2012-0003,0,1,b8d35336a6dbb54178b2415959b96500c4ba21e8a15e72f5e8dbd70ecac57963,2024-11-21T01:34:10.513000 -CVE-2012-0004,0,1,1d6909b2b2c340bc23a1db1868dddf7970c898754bc7f1cfe8a886c19f702298,2024-11-21T01:34:10.690000 -CVE-2012-0005,0,1,c4d23ec79423f62317957f8b2c3b87674255ddd67c00ba803cd9b035cc51722a,2024-11-21T01:34:10.803000 +CVE-2012-0003,0,0,b8d35336a6dbb54178b2415959b96500c4ba21e8a15e72f5e8dbd70ecac57963,2024-11-21T01:34:10.513000 +CVE-2012-0004,0,0,1d6909b2b2c340bc23a1db1868dddf7970c898754bc7f1cfe8a886c19f702298,2024-11-21T01:34:10.690000 +CVE-2012-0005,0,0,c4d23ec79423f62317957f8b2c3b87674255ddd67c00ba803cd9b035cc51722a,2024-11-21T01:34:10.803000 CVE-2012-0006,0,0,04f91969846b15aeb22fa43a7d8f18a4ae4732adaec074a7bdee6c583d32ab22,2020-09-28T12:58:30.503000 -CVE-2012-0007,0,1,12e873ee1541f46a2fee02c5c33e2861e09892c8b24ffeba43001bab6b0dc92f,2024-11-21T01:34:11.010000 +CVE-2012-0007,0,0,12e873ee1541f46a2fee02c5c33e2861e09892c8b24ffeba43001bab6b0dc92f,2024-11-21T01:34:11.010000 CVE-2012-0008,0,0,f9bce0525a2f9eb2ced66ba17fba2cb278d1176b5016a3eeef2a1b7847d54e98,2018-10-12T22:01:58.743000 -CVE-2012-0009,0,1,632c46934c71066c7f4f7af0161be0d8ea6111e8e084cba0cc61c7bff8965064,2024-11-21T01:34:11.217000 +CVE-2012-0009,0,0,632c46934c71066c7f4f7af0161be0d8ea6111e8e084cba0cc61c7bff8965064,2024-11-21T01:34:11.217000 CVE-2012-0010,0,0,52fc387020b5df2f477f602baeb568098107d1eb207f450c21ac428f36a4b69f,2022-03-01T14:58:06.127000 CVE-2012-0011,0,0,e54ebac2c9295a56aa08df1d51fa57a7f034fe0e3e22eb6b6cc1bd520de09f0a,2022-03-01T16:28:42.923000 CVE-2012-0012,0,0,6bb410914fd1a3d542d22a88c414ac79a91c04b01aefa62852744f8bb5d62dfe,2022-03-01T16:29:56.313000 -CVE-2012-0013,0,1,020b21844a5a6288aea044597186d8b3abef7d250fb2e81e95ab8a91a0a5be31,2024-11-21T01:34:11.640000 +CVE-2012-0013,0,0,020b21844a5a6288aea044597186d8b3abef7d250fb2e81e95ab8a91a0a5be31,2024-11-21T01:34:11.640000 CVE-2012-0014,0,0,6a53d237047e76787e00075889eae6df0ec7c7149320233f5bda854e435b3aaa,2023-12-07T18:38:56.693000 CVE-2012-0015,0,0,e2e3a62a5b5f37cd79e9114246a0f7008394dc89fec81dce8f0287351459e18a,2023-12-07T18:38:56.693000 CVE-2012-0016,0,0,1a02946eb3ae5e0f0f2873bb6ec9ec1e3201858e2da84cc80b79521dd24e136e,2018-10-12T22:02:02.040000 @@ -51831,26 +51831,26 @@ CVE-2012-0017,0,0,559c99721ba132877ed7363c444e6d0aa6f21baf3bb78c211cf2252ae28569 CVE-2012-0018,0,0,bd2163bc12ddba9c3d96c369a18c2758bc41a29547c779b18ad70e8d42ec870a,2018-10-12T22:02:02.667000 CVE-2012-0019,0,0,9c256a2b20ef063a17a6decaf636f606427fe3fd6505053ccb136db173af236e,2018-10-12T22:02:03.307000 CVE-2012-0020,0,0,4d20bc317f92fb794f90a16a61ad2dff67211bddfce30f34ebd42329e2b7193a,2018-10-12T22:02:03.603000 -CVE-2012-0021,0,1,1f137b9b486b38ee79f06e7882fb92eaa8e68f37eb69147b80fe30daa30486b1,2024-11-21T01:34:12.520000 -CVE-2012-0022,0,1,c2c8e636189a21555798330b6e5a691898654fc901b2d05c617ae82302de93dc,2024-11-21T01:34:13.463000 +CVE-2012-0021,0,0,1f137b9b486b38ee79f06e7882fb92eaa8e68f37eb69147b80fe30daa30486b1,2024-11-21T01:34:12.520000 +CVE-2012-0022,0,0,c2c8e636189a21555798330b6e5a691898654fc901b2d05c617ae82302de93dc,2024-11-21T01:34:13.463000 CVE-2012-0023,0,0,00169805e28e2f7eb9dd84d9ee6abec3cbad2d1f1eaaebf51b4aeb70a1b19eda,2023-11-07T02:09:52.080000 -CVE-2012-0024,0,1,00a97753cbab53cbf6823cb5ce21d8bf81941f14ce0d9de41d109901bcea67b8,2024-11-21T01:34:14.207000 +CVE-2012-0024,0,0,00a97753cbab53cbf6823cb5ce21d8bf81941f14ce0d9de41d109901bcea67b8,2024-11-21T01:34:14.207000 CVE-2012-0025,0,0,17c4e099f9b0b7ac3c6259747dd5777c45adfb3badbb3dd916c7c1255e46504e,2017-11-30T02:29:00.353000 CVE-2012-0026,0,0,ecb05ba429c0795fd2d8a213732bf8ee07f9d88c36f3a7b595951cb1805a18a4,2023-11-07T02:09:52.170000 -CVE-2012-0027,0,1,e0e6123edfdd73b8831e07e4cb61cc706adaae6c82a5024a7f354a24892f4d00,2024-11-21T01:34:14.440000 +CVE-2012-0027,0,0,e0e6123edfdd73b8831e07e4cb61cc706adaae6c82a5024a7f354a24892f4d00,2024-11-21T01:34:14.440000 CVE-2012-0028,0,0,f00fec3c34cf4d431bbf7551abe697374f3c19f1ab9fe96a03571ca9ade93b12,2023-02-13T03:24:05.763000 -CVE-2012-0029,0,1,dc7841400bf821f748dd9e433ea5aef17b4859a56c7e1b3fd9209e15c97aec9a,2024-11-21T01:34:14.673000 -CVE-2012-0030,0,1,ced15a3204a68bb2e9b55f6e4ee03990ff063f573d9c7900219daeed14db8b42,2024-11-21T01:34:14.790000 -CVE-2012-0031,0,1,eb9f32d006396cc48073cb67bbd0a7292cefb7303e17e00245f435b651422962,2024-11-21T01:34:14.897000 +CVE-2012-0029,0,0,dc7841400bf821f748dd9e433ea5aef17b4859a56c7e1b3fd9209e15c97aec9a,2024-11-21T01:34:14.673000 +CVE-2012-0030,0,0,ced15a3204a68bb2e9b55f6e4ee03990ff063f573d9c7900219daeed14db8b42,2024-11-21T01:34:14.790000 +CVE-2012-0031,0,0,eb9f32d006396cc48073cb67bbd0a7292cefb7303e17e00245f435b651422962,2024-11-21T01:34:14.897000 CVE-2012-0032,0,0,1b61b673239c17acc4ced31ba8035206642b0197b0eae4afa7642331406a58f1,2014-04-01T14:40:21.477000 CVE-2012-0033,0,0,da170b3b785f0e8725055df6180a3181a9c0255cc6896a669d2c552b315e149b,2016-12-08T03:02:16.277000 CVE-2012-0034,0,0,540c938d4278a070a8d5c9f1fb2b32580ad6870040b9202ddf80b14cc57ca88b,2015-01-18T02:59:07.413000 -CVE-2012-0035,0,1,16eabd956458c62d80676f339993641a53719728fcf9ed133a4f0be8dda3c33f,2024-11-21T01:34:15.413000 +CVE-2012-0035,0,0,16eabd956458c62d80676f339993641a53719728fcf9ed133a4f0be8dda3c33f,2024-11-21T01:34:15.413000 CVE-2012-0036,0,0,3a576172d9a5ac29f65770d57aecfa9dbd3e5c433ad0ac24c3a3849b2fd5c7ba,2018-01-10T02:29:23.787000 CVE-2012-0037,0,0,a85085d4bc7e3168d943912ccb1917e3799a6ee33248f5e60d9e8d9c98255639,2024-02-15T03:22:33.830000 CVE-2012-0038,0,0,be8c12ff9dc0ffd17f9831601e98080ea43b957ff7df8331e86cbf8420f7ae6f,2023-02-13T03:24:13.327000 -CVE-2012-0039,0,1,332910a0264e096c57af0e73fa4bcd7efbcda6f720cb1d8b035240c0fb11f735,2024-11-21T01:34:16 -CVE-2012-0040,0,1,23ade2c6dee2b7959cd5ff60dd4702214aac93a7bb275336e69867fd20f46562,2024-11-21T01:34:16.150000 +CVE-2012-0039,0,0,332910a0264e096c57af0e73fa4bcd7efbcda6f720cb1d8b035240c0fb11f735,2024-11-21T01:34:16 +CVE-2012-0040,0,0,23ade2c6dee2b7959cd5ff60dd4702214aac93a7bb275336e69867fd20f46562,2024-11-21T01:34:16.150000 CVE-2012-0041,0,0,64ae118f56397fb9ac1edca2faad65bc8ef3fb667c86f64757cc08f711286b50,2017-09-19T01:34:28.743000 CVE-2012-0042,0,0,ad1dbb11520fe6dbe115da7d633999a0c8c5c5eeb5541fb514258962073fca02,2017-09-19T01:34:28.823000 CVE-2012-0043,0,0,4b16e0a20867078bcb31b9c53d124804e367d6e3c35ae7ca94190ee38c4cfeb4,2017-09-19T01:34:28.887000 @@ -51860,14 +51860,14 @@ CVE-2012-0046,0,0,500a690b626f7629a29334137780fdf9cb824a1e3919d3784200899f137ce1 CVE-2012-0047,0,0,078972a45bb48c6dd5b16070b7eaa605d4fb2d35f27bf9f0b8385b50a94161ec,2017-12-06T02:29:01.383000 CVE-2012-0048,0,0,0d9f2cbcc7f5d23e629e58c2e2dc3b6712c0898bd099f3ef029956762eceeaa0,2012-08-27T04:00:00 CVE-2012-0049,0,0,40396ff9d65e00efca2d57127cff295ec7334109679dd19feb1839daa65a6d8e,2019-11-09T22:15:48.903000 -CVE-2012-0050,0,1,0d6a0a5fd66feff3a7deae91c3a99274010f6229b349996ce737b7a2ac20bfa4,2024-11-21T01:34:17.407000 +CVE-2012-0050,0,0,0d6a0a5fd66feff3a7deae91c3a99274010f6229b349996ce737b7a2ac20bfa4,2024-11-21T01:34:17.407000 CVE-2012-0051,0,0,a520aee82d9df08ba082b8c972d5cf5de5b87913692516e3227dca96d7b8fcba,2019-11-12T16:44:05.560000 CVE-2012-0052,0,0,5567cf49a11bc6ec865f9f8dd70ccde1836caafc896966651ca13188d1d5aff1,2014-02-14T18:44:12.440000 -CVE-2012-0053,0,1,a1a81c3bc8c0ccae5ad6d197dc4756a4914e4509c44d3e7fb46cccb065ceb303,2024-11-21T01:34:17.753000 +CVE-2012-0053,0,0,a1a81c3bc8c0ccae5ad6d197dc4756a4914e4509c44d3e7fb46cccb065ceb303,2024-11-21T01:34:17.753000 CVE-2012-0054,0,0,b37842f53d4b91a78620c70ed9d2b0beedc326c86f92ade610663646b4f49815,2012-08-03T04:00:00 CVE-2012-0055,0,0,ba0b2c058f22b86373b8967583d35c22a277e747359678336b404da10bfdb3e4,2020-02-28T14:33:47.030000 -CVE-2012-0056,0,1,055aeac231f72068de07bd548744a2ace77387dcd804a12644a1822e048252ff,2024-11-21T01:34:18.207000 -CVE-2012-0057,0,1,d65ced0277ed764fc776f9e06823942325eb94fa0ed1d08a7beba65a52430b48,2024-11-21T01:34:18.343000 +CVE-2012-0056,0,0,055aeac231f72068de07bd548744a2ace77387dcd804a12644a1822e048252ff,2024-11-21T01:34:18.207000 +CVE-2012-0057,0,0,d65ced0277ed764fc776f9e06823942325eb94fa0ed1d08a7beba65a52430b48,2024-11-21T01:34:18.343000 CVE-2012-0058,0,0,85ad865c01beb4c99766c2801b7c49960f6ec3e9cce017ec0b642cdb55107254,2020-07-29T16:56:55.787000 CVE-2012-0059,0,0,b6adefb07893e5f2b0cf4c8456b125dc92ff8797e5cadbd876d6443fc5952cf3,2022-02-03T16:26:48.003000 CVE-2012-0060,0,0,46608b059997c8131de75652223c61dfa121bebf801fa033d8ffb766ae93da0b,2023-11-07T02:09:53.380000 @@ -51879,58 +51879,58 @@ CVE-2012-0065,0,0,fc56a91d342ab679793bbe06a1004746ec9e9e043182bb211a80b92950623e CVE-2012-0066,0,0,48bacf11454274d8785bfd1c143118ecb04b9cf9fa9fb9f274e311aafed25900,2017-09-19T01:34:28.963000 CVE-2012-0067,0,0,22f61abd5f2591992c1b17d1f358455395b4d053e1e1c4bd36ff445911cd9640,2023-02-13T03:24:58.273000 CVE-2012-0068,0,0,b277e8c2eb19d6bb2dde0ba64922fc8fcc924543acdcc726e0300c455081937b,2017-09-27T01:29:00.620000 -CVE-2012-0069,0,1,fddac92bb0f645b741c196eed9690bf42172ffe1f2f624c6f19655b88bd8a3dc,2024-11-21T01:34:19.860000 +CVE-2012-0069,0,0,fddac92bb0f645b741c196eed9690bf42172ffe1f2f624c6f19655b88bd8a3dc,2024-11-21T01:34:19.860000 CVE-2012-0070,0,0,7707279ed7933f09fb1b88f6e62631860a8b0dd6c4c787d629b63c672b16a5dd,2020-01-23T17:25:43.107000 CVE-2012-0071,0,0,358f9805dc92dab1215db3a7242da7fa8a5cb5aad63662533577cf67cb7ce2a1,2016-11-22T20:53:37.300000 -CVE-2012-0072,0,1,74f1ca05ad35161fa7ef393f5aa7a7a380ec22e617ada0b039ab9975fb4ec511,2024-11-21T01:34:20.170000 -CVE-2012-0073,0,1,5950f79c5a03c2a9dce94c1a6a6a5c48e8d81f776cefcdc4b6711f7f907e1826,2024-11-21T01:34:20.270000 -CVE-2012-0074,0,1,cfecb8634c812219ed65ffc75cf06214d382a3ff55c5e39a1237362e777420ff,2024-11-21T01:34:20.370000 -CVE-2012-0075,0,1,355e401359a610c869c0e0691a4dbaa2cecac54fc007305d114458347fca5522,2024-11-21T01:34:20.470000 -CVE-2012-0076,0,1,8d9307e948affe3104567f5cbb4c601740d24a4e143de84399b9a1b21987c1be,2024-11-21T01:34:20.603000 -CVE-2012-0077,0,1,8a8a33d81034176ee876bf124c586256340ba5e2012745cb2e17bcd930c4e90c,2024-11-21T01:34:20.707000 -CVE-2012-0078,0,1,607cefa17e4ed51c4050ce93dc47673028e968566cb2c555b91db2f5dc8704a0,2024-11-21T01:34:20.813000 -CVE-2012-0079,0,1,1f6a80fcebcae36c7c420f587b63f2dcb6cdc47823edbb521a13eb2b0250547f,2024-11-21T01:34:20.913000 -CVE-2012-0080,0,1,48007165c55af6b716455c58485c81a583c0e22957a60f1b299dd0e03127ddd7,2024-11-21T01:34:21.043000 -CVE-2012-0081,0,1,86479f4fcfef6c4cda73ea0acc5dacd7fc9d0b764b66cb2b89e96346f1a5c2ce,2024-11-21T01:34:21.170000 -CVE-2012-0082,0,1,8e32e02f51932d92741d28d301532b5e4e7a0555ca2d80d3619dcca17c43158f,2024-11-21T01:34:21.283000 -CVE-2012-0083,0,1,81854dcc2091653e441c0054f710f07f7d47c45f24c9909a6a6639de302b9feb,2024-11-21T01:34:21.397000 -CVE-2012-0084,0,1,3d46a3a6bf655aaedc93f828bfe7068873fb2caffc2a519d76f54ba00bfb5c88,2024-11-21T01:34:21.507000 -CVE-2012-0085,0,1,511ecc33f954ff27326636337dfc47cb8dbd052a28b25967cb4743158b031acc,2024-11-21T01:34:21.630000 +CVE-2012-0072,0,0,74f1ca05ad35161fa7ef393f5aa7a7a380ec22e617ada0b039ab9975fb4ec511,2024-11-21T01:34:20.170000 +CVE-2012-0073,0,0,5950f79c5a03c2a9dce94c1a6a6a5c48e8d81f776cefcdc4b6711f7f907e1826,2024-11-21T01:34:20.270000 +CVE-2012-0074,0,0,cfecb8634c812219ed65ffc75cf06214d382a3ff55c5e39a1237362e777420ff,2024-11-21T01:34:20.370000 +CVE-2012-0075,0,0,355e401359a610c869c0e0691a4dbaa2cecac54fc007305d114458347fca5522,2024-11-21T01:34:20.470000 +CVE-2012-0076,0,0,8d9307e948affe3104567f5cbb4c601740d24a4e143de84399b9a1b21987c1be,2024-11-21T01:34:20.603000 +CVE-2012-0077,0,0,8a8a33d81034176ee876bf124c586256340ba5e2012745cb2e17bcd930c4e90c,2024-11-21T01:34:20.707000 +CVE-2012-0078,0,0,607cefa17e4ed51c4050ce93dc47673028e968566cb2c555b91db2f5dc8704a0,2024-11-21T01:34:20.813000 +CVE-2012-0079,0,0,1f6a80fcebcae36c7c420f587b63f2dcb6cdc47823edbb521a13eb2b0250547f,2024-11-21T01:34:20.913000 +CVE-2012-0080,0,0,48007165c55af6b716455c58485c81a583c0e22957a60f1b299dd0e03127ddd7,2024-11-21T01:34:21.043000 +CVE-2012-0081,0,0,86479f4fcfef6c4cda73ea0acc5dacd7fc9d0b764b66cb2b89e96346f1a5c2ce,2024-11-21T01:34:21.170000 +CVE-2012-0082,0,0,8e32e02f51932d92741d28d301532b5e4e7a0555ca2d80d3619dcca17c43158f,2024-11-21T01:34:21.283000 +CVE-2012-0083,0,0,81854dcc2091653e441c0054f710f07f7d47c45f24c9909a6a6639de302b9feb,2024-11-21T01:34:21.397000 +CVE-2012-0084,0,0,3d46a3a6bf655aaedc93f828bfe7068873fb2caffc2a519d76f54ba00bfb5c88,2024-11-21T01:34:21.507000 +CVE-2012-0085,0,0,511ecc33f954ff27326636337dfc47cb8dbd052a28b25967cb4743158b031acc,2024-11-21T01:34:21.630000 CVE-2012-0086,0,0,a960dfa6a1dd962bbe7552af8fd9ec9bc514e0b2533bb6fb046d1d7bc8c7b967,2016-11-22T20:14:01.150000 -CVE-2012-0087,0,1,5242e6e9af3fc4f5a5b837e19518fc52190ede78fb81017f4e726973182175c6,2024-11-21T01:34:21.860000 -CVE-2012-0088,0,1,a1f578aaa91fe01cbee75a7b47c308c621fd7d231cacd570c4170442a6abce2d,2024-11-21T01:34:22 -CVE-2012-0089,0,1,3b4de5b61067b3286e90a58d935fe901d5d9021732293ba42615f0aa6efef48d,2024-11-21T01:34:22.107000 +CVE-2012-0087,0,0,5242e6e9af3fc4f5a5b837e19518fc52190ede78fb81017f4e726973182175c6,2024-11-21T01:34:21.860000 +CVE-2012-0088,0,0,a1f578aaa91fe01cbee75a7b47c308c621fd7d231cacd570c4170442a6abce2d,2024-11-21T01:34:22 +CVE-2012-0089,0,0,3b4de5b61067b3286e90a58d935fe901d5d9021732293ba42615f0aa6efef48d,2024-11-21T01:34:22.107000 CVE-2012-0090,0,0,ccf297e78169a8d7334c3c30ba0903654c639c47ab7299ad38090fe1567f6a0f,2016-11-19T03:02:26.907000 -CVE-2012-0091,0,1,45d4371ad400c51834463433c41c962ac7d09ff851e3c7e757b218f85b27ee9d,2024-11-21T01:34:22.330000 +CVE-2012-0091,0,0,45d4371ad400c51834463433c41c962ac7d09ff851e3c7e757b218f85b27ee9d,2024-11-21T01:34:22.330000 CVE-2012-0092,0,0,dd4eea3c4fc1a76e3b65c2d6112357c0e2281a01a2a4c15b9e7dad36003bde31,2016-11-19T03:02:28.250000 CVE-2012-0093,0,0,8e0adfadf5b25979c2b3f2ddf773fd7d47b443e49b0bdf7aee818da015630081,2016-11-22T20:53:46.537000 -CVE-2012-0094,0,1,1f9e298866804f49cba603281bdc32c54020ab3a1bb6abab5fc2d389aa2ccf95,2024-11-21T01:34:22.677000 +CVE-2012-0094,0,0,1f9e298866804f49cba603281bdc32c54020ab3a1bb6abab5fc2d389aa2ccf95,2024-11-21T01:34:22.677000 CVE-2012-0095,0,0,f39cb38912093f068de0b43576ac6c3851ff80973de181ada6a9e10ca86adcc0,2016-11-22T20:15:04.260000 -CVE-2012-0096,0,1,65966d2df635f856fdc1327bf36a88a8026fe18a1d3134b6e008d9b72367449b,2024-11-21T01:34:22.903000 -CVE-2012-0097,0,1,c6bd4f6552cb80ce75cf391dea6d06c43b8b1398cf4cbf7ab3050635a059fbb3,2024-11-21T01:34:23.013000 -CVE-2012-0098,0,1,8cae0fb981a98fa51e16a0c3f137be436bd0c6dc053ccedfccf721f2bef93c70,2024-11-21T01:34:23.120000 -CVE-2012-0099,0,1,3d1307dea42a52ecd509bd24223c6b958488e94ef3ac931cce9b2e5d844f1486,2024-11-21T01:34:23.240000 -CVE-2012-0100,0,1,4dc5c79589f7da3ac2cd2d88895173564a1b9a3eed63b1d42d618504717feebf,2024-11-21T01:34:23.350000 -CVE-2012-0101,0,1,db99bb328874c8613af6e593b214d6a265a6d9543743871f6bb2bf42f6dcee3f,2024-11-21T01:34:23.453000 -CVE-2012-0102,0,1,6a275ae7afcfd49793c0ad752633afffda5e6bc7f9da98e619fe3e3ad2d0ba28,2024-11-21T01:34:23.590000 -CVE-2012-0103,0,1,11329f972cce8a6124d16fafbe4c2e8c4da1ed77da778463baae249fc911372a,2024-11-21T01:34:23.730000 -CVE-2012-0104,0,1,6a0c28cc7a89b7ef32957429a075625d34555913767a1e1151b0a52e46150c24,2024-11-21T01:34:23.837000 -CVE-2012-0105,0,1,3c7893a2c0468ac9012c47052e8d6e928712b38927c812ffdfc2d5ba6828d81a,2024-11-21T01:34:23.943000 +CVE-2012-0096,0,0,65966d2df635f856fdc1327bf36a88a8026fe18a1d3134b6e008d9b72367449b,2024-11-21T01:34:22.903000 +CVE-2012-0097,0,0,c6bd4f6552cb80ce75cf391dea6d06c43b8b1398cf4cbf7ab3050635a059fbb3,2024-11-21T01:34:23.013000 +CVE-2012-0098,0,0,8cae0fb981a98fa51e16a0c3f137be436bd0c6dc053ccedfccf721f2bef93c70,2024-11-21T01:34:23.120000 +CVE-2012-0099,0,0,3d1307dea42a52ecd509bd24223c6b958488e94ef3ac931cce9b2e5d844f1486,2024-11-21T01:34:23.240000 +CVE-2012-0100,0,0,4dc5c79589f7da3ac2cd2d88895173564a1b9a3eed63b1d42d618504717feebf,2024-11-21T01:34:23.350000 +CVE-2012-0101,0,0,db99bb328874c8613af6e593b214d6a265a6d9543743871f6bb2bf42f6dcee3f,2024-11-21T01:34:23.453000 +CVE-2012-0102,0,0,6a275ae7afcfd49793c0ad752633afffda5e6bc7f9da98e619fe3e3ad2d0ba28,2024-11-21T01:34:23.590000 +CVE-2012-0103,0,0,11329f972cce8a6124d16fafbe4c2e8c4da1ed77da778463baae249fc911372a,2024-11-21T01:34:23.730000 +CVE-2012-0104,0,0,6a0c28cc7a89b7ef32957429a075625d34555913767a1e1151b0a52e46150c24,2024-11-21T01:34:23.837000 +CVE-2012-0105,0,0,3c7893a2c0468ac9012c47052e8d6e928712b38927c812ffdfc2d5ba6828d81a,2024-11-21T01:34:23.943000 CVE-2012-0106,0,0,22b47b2b105a87bef1e8453c947dd2ed1cd3c1ac693581e5e6ea5271e8db086b,2013-10-11T03:40:18.253000 CVE-2012-0107,0,0,d19aa7590db05efa3b8df6d28b7a55df4f64633e4ed9825cf73b1f16b037cab1,2013-10-11T03:40:18.317000 CVE-2012-0108,0,0,f809addaf9fa7cd852afc2d5aaea5b800efc141ff77fb37bf084309a7df7cc36,2016-11-22T20:14:38.033000 -CVE-2012-0109,0,1,1bcdc769edfa5be8a10ad746537f7cfd81c62a3255bfa51b439703a543b1b444,2024-11-21T01:34:24.383000 -CVE-2012-0110,0,1,c24064762cd7137dbcad0abc54cc5f0f0cb1229ebf13d51fdea975c30cfedac5,2024-11-21T01:34:24.493000 -CVE-2012-0111,0,1,3e6a1c0a23d13f45f898e18d39f5e2c83be048404a00305b3a4d140444244f03,2024-11-21T01:34:24.590000 -CVE-2012-0112,0,1,5036b5474dbf61e5d06614641b13d0cf976f1afa020c3740d1c70e49b4b04f82,2024-11-21T01:34:24.700000 -CVE-2012-0113,0,1,55a2dd92743f1178f08759ba610c76302be4528d344c959b2b5ae63fa92ad188,2024-11-21T01:34:24.820000 -CVE-2012-0114,0,1,8a11f262c7235dc30ae28f0dd77b3711c168071baeea82b2bd3eb3b2d4122257,2024-11-21T01:34:24.947000 -CVE-2012-0115,0,1,2b72d2672f4607846984a42d6e72a2ea32b709f5fb22d9ade59bd2fbf99c000e,2024-11-21T01:34:25.073000 -CVE-2012-0116,0,1,b899c096db8cc84d63b13cb90c66fe28bd5402cf112085b3e329769ebb1e90eb,2024-11-21T01:34:25.200000 -CVE-2012-0117,0,1,13c943e16e33c97aaf6306f1cbd5abf5360f6393304db17ea83e66139bcc3ae4,2024-11-21T01:34:25.323000 -CVE-2012-0118,0,1,69c21d330378ea177a6aee160c77b589befe8131c47c6a801a0db33d45d1c8a7,2024-11-21T01:34:25.440000 -CVE-2012-0119,0,1,7256ff6bd7863006f3e35bae627644134334e95c1a121daa6a83fbec99222aac,2024-11-21T01:34:25.570000 -CVE-2012-0120,0,1,6d1d091dae4a50a8a37fa15d526a40be4c2aacb81954ce2efacf228992b25e23,2024-11-21T01:34:25.700000 +CVE-2012-0109,0,0,1bcdc769edfa5be8a10ad746537f7cfd81c62a3255bfa51b439703a543b1b444,2024-11-21T01:34:24.383000 +CVE-2012-0110,0,0,c24064762cd7137dbcad0abc54cc5f0f0cb1229ebf13d51fdea975c30cfedac5,2024-11-21T01:34:24.493000 +CVE-2012-0111,0,0,3e6a1c0a23d13f45f898e18d39f5e2c83be048404a00305b3a4d140444244f03,2024-11-21T01:34:24.590000 +CVE-2012-0112,0,0,5036b5474dbf61e5d06614641b13d0cf976f1afa020c3740d1c70e49b4b04f82,2024-11-21T01:34:24.700000 +CVE-2012-0113,0,0,55a2dd92743f1178f08759ba610c76302be4528d344c959b2b5ae63fa92ad188,2024-11-21T01:34:24.820000 +CVE-2012-0114,0,0,8a11f262c7235dc30ae28f0dd77b3711c168071baeea82b2bd3eb3b2d4122257,2024-11-21T01:34:24.947000 +CVE-2012-0115,0,0,2b72d2672f4607846984a42d6e72a2ea32b709f5fb22d9ade59bd2fbf99c000e,2024-11-21T01:34:25.073000 +CVE-2012-0116,0,0,b899c096db8cc84d63b13cb90c66fe28bd5402cf112085b3e329769ebb1e90eb,2024-11-21T01:34:25.200000 +CVE-2012-0117,0,0,13c943e16e33c97aaf6306f1cbd5abf5360f6393304db17ea83e66139bcc3ae4,2024-11-21T01:34:25.323000 +CVE-2012-0118,0,0,69c21d330378ea177a6aee160c77b589befe8131c47c6a801a0db33d45d1c8a7,2024-11-21T01:34:25.440000 +CVE-2012-0119,0,0,7256ff6bd7863006f3e35bae627644134334e95c1a121daa6a83fbec99222aac,2024-11-21T01:34:25.570000 +CVE-2012-0120,0,0,6d1d091dae4a50a8a37fa15d526a40be4c2aacb81954ce2efacf228992b25e23,2024-11-21T01:34:25.700000 CVE-2012-0121,0,0,5a865b3b15170160192f3b33fcdafe6e7eb86634d8908ad84020c56376cdbd98,2019-10-09T23:04:11.603000 CVE-2012-0122,0,0,4b9772fd14bde18a5435c54461f06d9ce579edca9ad5409d4780289de6d1ccaa,2019-10-09T23:04:11.820000 CVE-2012-0123,0,0,b79926eaf899b3db8cf2169d676dcc251a03c5a98712f21b45ac95dc7861cc36,2018-01-05T02:29:17.883000 @@ -51998,12 +51998,12 @@ CVE-2012-0184,0,0,52c249082a95f036390dd9c71afb5e011ea1711f5d417d45eeef06c00d2101 CVE-2012-0185,0,0,36facd89f3a4f30903711a6dc71e3f0bc23833064ac666648d4e873e6facb7cf,2018-10-12T22:02:25.573000 CVE-2012-0186,0,0,31bb8a25edf5c24ab89656610a02ef93d51f8e66ae26cec35e783d8fdf7ffdfa,2017-08-29T01:30:51.350000 CVE-2012-0187,0,0,0e5b484fe06a4d77fefd9c8435e3149d74c19781960f9cc13ed868b3980ed9f1,2017-08-29T01:30:51.413000 -CVE-2012-0188,0,1,d19705640f51fccce9795c2a6fbc32d75739d7f8accd96696c9194c22d74ed49,2024-11-21T01:34:32.870000 -CVE-2012-0189,0,1,2f7070706bf9b1e94e87f5a676a253cf2e2c4ccd6552a332d67d5332dcaf2bac,2024-11-21T01:34:32.977000 -CVE-2012-0190,0,1,240c01c557586813db7c36c4b3bf75820286d316a5cdaf5b0e0d703cd76b8fed,2024-11-21T01:34:33.083000 +CVE-2012-0188,0,0,d19705640f51fccce9795c2a6fbc32d75739d7f8accd96696c9194c22d74ed49,2024-11-21T01:34:32.870000 +CVE-2012-0189,0,0,2f7070706bf9b1e94e87f5a676a253cf2e2c4ccd6552a332d67d5332dcaf2bac,2024-11-21T01:34:32.977000 +CVE-2012-0190,0,0,240c01c557586813db7c36c4b3bf75820286d316a5cdaf5b0e0d703cd76b8fed,2024-11-21T01:34:33.083000 CVE-2012-0191,0,0,51d1f87883e2d763c57582da8fbb41edefef09e0d0c177e4c2dde581476c47d2,2017-08-29T01:30:51.630000 -CVE-2012-0192,0,1,b000f6f8e46d9d891db1010e2065ce66032a639bd3a94c7ec85c486be40958e0,2024-11-21T01:34:33.290000 -CVE-2012-0193,0,1,ad05cbafef18266025cce0d74b2bd89fa440ee1e8a13faeb8211039df341bf4e,2024-11-21T01:34:33.400000 +CVE-2012-0192,0,0,b000f6f8e46d9d891db1010e2065ce66032a639bd3a94c7ec85c486be40958e0,2024-11-21T01:34:33.290000 +CVE-2012-0193,0,0,ad05cbafef18266025cce0d74b2bd89fa440ee1e8a13faeb8211039df341bf4e,2024-11-21T01:34:33.400000 CVE-2012-0194,0,0,a17b086ca3f3d2af33b31539322b3b64fa1570429f300aee9b40d3ec1e3bd6e4,2017-08-29T01:30:51.757000 CVE-2012-0195,0,0,bfc173063e5d7592e5217847e3c45f09a4b40171d15798bb56b7814480b99b41,2018-01-10T02:29:23.957000 CVE-2012-0198,0,0,d708c8f1ebdd4bb46a6ee259388686f4d5f1f547e2dc77071688cfa0ebaec055,2017-08-29T01:30:51.913000 @@ -52072,9 +52072,9 @@ CVE-2012-0262,0,0,39c77c3ab7e56d11d9c06c3fb42825d352a9c713839b64a9f90168c0478eaa CVE-2012-0263,0,0,7197475bdc4ef87d3d31f1b492c98fa3dbb906821237283eeff3dc212d1f282b,2014-01-02T16:35:17.313000 CVE-2012-0264,0,0,9606f8842d64b5056749d2b32fffb30317ead9d9c7a69b47c776060e5cd9a6aa,2014-01-02T16:39:19.037000 CVE-2012-0265,0,0,afbca559a9547453a362a8ebfb62737876e7373056a31a21161da9dbc9f4af6f,2017-09-19T01:34:32.277000 -CVE-2012-0266,0,1,3e439b4d07ef7df190646e214496fd7961884e655b268b14b5be498a2b0ea335,2024-11-21T01:34:41.570000 -CVE-2012-0267,0,1,7da08a20ac73383d09ceb95bc961e996bc101751e3a4d649bbd943d58dc8e986,2024-11-21T01:34:41.683000 -CVE-2012-0268,0,1,57f2ef15f068aae1a5cc32ec2e34d15089098812eb025d84f797a0ebc41f9fc7,2024-11-21T01:34:41.790000 +CVE-2012-0266,0,0,3e439b4d07ef7df190646e214496fd7961884e655b268b14b5be498a2b0ea335,2024-11-21T01:34:41.570000 +CVE-2012-0267,0,0,7da08a20ac73383d09ceb95bc961e996bc101751e3a4d649bbd943d58dc8e986,2024-11-21T01:34:41.683000 +CVE-2012-0268,0,0,57f2ef15f068aae1a5cc32ec2e34d15089098812eb025d84f797a0ebc41f9fc7,2024-11-21T01:34:41.790000 CVE-2012-0269,0,0,3568c1ddc07926942b89f009d26fd7967b9f2e290fa8cfa1e0dcc5c3d3f85621,2012-04-30T04:00:00 CVE-2012-0270,0,0,7fda578504c80bad2e19c768a9d324bde753e2609d47505c896a224a05ec3eb0,2014-02-18T19:49:13.147000 CVE-2012-0271,0,0,819c81b282b5c8c22b942fb70ec5a9f475c81fb0cc4eb86fee7fe542f2ef0120,2013-04-02T03:14:42.513000 @@ -52088,9 +52088,9 @@ CVE-2012-0279,0,0,b0223554499357b1239330f01f8e77590b9e96b6cfd06abd346849424234ea CVE-2012-0282,0,0,bdb68675f4609cb1bb2b869308db154da47a920c4b62fbc007d24d221a2fd3c0,2012-07-18T13:15:12.830000 CVE-2012-0283,0,0,78a8c6980feb018e04becc79ef3ed45d0851e2f7abe70ba49e7de98634095455,2013-08-22T03:50:41.290000 CVE-2012-0284,0,0,f993338a533df4425efe6445fbd8bcc11ff0b6ac30e18471c380a2fd5966e13b,2017-08-29T01:30:53.897000 -CVE-2012-0285,0,1,e3a2601b1148871f5077251ec74dfbbbd3dfbcfc3f00167f074d582d24b275b7,2024-11-21T01:34:43.267000 -CVE-2012-0286,0,1,f76aeeda64041fed9f8907c3136d6e4c57078a772727a8947d1fcc9d7af30601,2024-11-21T01:34:43.397000 -CVE-2012-0287,0,1,f26fe7dec9681f098f525579626e89143edd6b608269bd09f48808aa882d037e,2024-11-21T01:34:43.543000 +CVE-2012-0285,0,0,e3a2601b1148871f5077251ec74dfbbbd3dfbcfc3f00167f074d582d24b275b7,2024-11-21T01:34:43.267000 +CVE-2012-0286,0,0,f76aeeda64041fed9f8907c3136d6e4c57078a772727a8947d1fcc9d7af30601,2024-11-21T01:34:43.397000 +CVE-2012-0287,0,0,f26fe7dec9681f098f525579626e89143edd6b608269bd09f48808aa882d037e,2024-11-21T01:34:43.543000 CVE-2012-0289,0,0,64a4d194b5352d44b68a6718ca2ae04ac04e4c9d567ee9586044d30a72986ada,2012-10-30T03:59:57.970000 CVE-2012-0290,0,0,8f9c9f586ea78608c269d2575d23c2ec5851b68ae0cc6c01f01cba31f5ab17a2,2018-01-06T02:29:28.973000 CVE-2012-0291,0,0,116483de4be7af458f614ec36d872a15d92b2e943e095853a4b83fab621e9795,2018-01-06T02:29:29.050000 @@ -52111,11 +52111,11 @@ CVE-2012-0305,0,0,a3c58a6f7acb4a1245a2929617ee7b0df691cb814d6d000483d047879f2812 CVE-2012-0306,0,0,8756216f31073046826cfd652adc21755172f9b43f0070edba95d3cc181cf56e,2013-02-14T04:48:34.117000 CVE-2012-0307,0,0,27576367476ae3bc475ed57f0682c0de234fffb3f74b46a39e5689fd75cd30c8,2017-08-29T01:30:54.070000 CVE-2012-0308,0,0,a8d2937f7b4ef788b91c98bbf453786c196422ee5ae063829641c487449c5141,2013-10-03T18:00:31.657000 -CVE-2012-0309,0,1,113a5f89ade9cc7caad9dc95405a37305d9b9878fe6ea6516a2228b87915dac9,2024-11-21T01:34:46.393000 -CVE-2012-0310,0,1,c088e3746f3c3f4ca80dc17195d7d6ad9d9278116ce1d244e9465d06919177fe,2024-11-21T01:34:46.497000 -CVE-2012-0311,0,1,271f1e458ce59b67cbbed608b7aeb69cef7166aa8ee2df308514b8e9a9f967eb,2024-11-21T01:34:46.600000 -CVE-2012-0312,0,1,96713d57af26f618a51309f903553a17f7168ab78aa53e3235c2438323b3817c,2024-11-21T01:34:46.700000 -CVE-2012-0313,0,1,31516a984436f18b3eae43d6dc14b4d8caa361995564b1de401f93ccf640f76b,2024-11-21T01:34:46.800000 +CVE-2012-0309,0,0,113a5f89ade9cc7caad9dc95405a37305d9b9878fe6ea6516a2228b87915dac9,2024-11-21T01:34:46.393000 +CVE-2012-0310,0,0,c088e3746f3c3f4ca80dc17195d7d6ad9d9278116ce1d244e9465d06919177fe,2024-11-21T01:34:46.497000 +CVE-2012-0311,0,0,271f1e458ce59b67cbbed608b7aeb69cef7166aa8ee2df308514b8e9a9f967eb,2024-11-21T01:34:46.600000 +CVE-2012-0312,0,0,96713d57af26f618a51309f903553a17f7168ab78aa53e3235c2438323b3817c,2024-11-21T01:34:46.700000 +CVE-2012-0313,0,0,31516a984436f18b3eae43d6dc14b4d8caa361995564b1de401f93ccf640f76b,2024-11-21T01:34:46.800000 CVE-2012-0314,0,0,1c35d825a9fa1f82811b2260e9a2fa54856d7f685faf8f54356447a76934d39b,2012-02-09T04:10:12.143000 CVE-2012-0315,0,0,127033dc1c0442c8348b53501197bf9a971015ab202e214d38836ad231346423,2017-11-22T20:09:24.323000 CVE-2012-0316,0,0,3b4c0bed9e4e7dd4d7a7f650613ddc3fbf1862e7be4ee3e442ea455c4a7afbda,2018-01-11T02:29:00.950000 @@ -52131,7 +52131,7 @@ CVE-2012-0325,0,0,70db62b4d44c32de306ae0747e058ea276c81473a78ebb7156119cee08a03c CVE-2012-0326,0,0,4f4163b33e318d73bc9bb95a5af74953cee807fd396fcc93d8ae2521e11c683c,2018-01-11T02:29:01.217000 CVE-2012-0327,0,0,219855163ea47b7b460a6f40d8c36f3e9e7f56fa4fcb0516de802e9265e11c3c,2012-10-30T04:00:07.970000 CVE-2012-0328,0,0,51df25d456428511493a6a721bca3c2f345242cfe50752c43433d3b0d726fcd7,2017-08-29T01:30:54.320000 -CVE-2012-0329,0,1,3f47921328463768c36b041958ff8371979198e5a42d551da0d5ce2f5fa8905e,2024-11-21T01:34:48.720000 +CVE-2012-0329,0,0,3f47921328463768c36b041958ff8371979198e5a42d551da0d5ce2f5fa8905e,2024-11-21T01:34:48.720000 CVE-2012-0330,0,0,00e570a1645a5763037178cccb8dcea5213ffc7e436eb6197cf3ac8818bd5064,2012-03-01T05:00:00 CVE-2012-0331,0,0,24e17cc23ef8f21dbff57cbfbb3ef9db126030d5ce2e872eba6ff67e61fd95ba,2012-03-01T05:00:00 CVE-2012-0333,0,0,3f13624eb16cd343ce96e02372477a5f63f7cd75988276c1a350c111bf247cb9,2012-10-30T04:00:10.220000 @@ -52170,13 +52170,13 @@ CVE-2012-0385,0,0,95657eaccdbbc99973834884446d313d3d6951a358aabd544a70afea321c2f CVE-2012-0386,0,0,6ef2458270711f5409fd435f975c45829280f6b879100c0fab66c14ba10f7a08,2017-12-13T02:29:00.670000 CVE-2012-0387,0,0,7c46f81c9027259fe5d4625fff8ef375df97cfbcb99ba57983845da1c9e39a32,2017-12-13T02:29:00.747000 CVE-2012-0388,0,0,228cf39184f4ac5bdd4eb87aafd2ed4e7482a5cdb3b63beca0d0cf5450962bb1,2017-12-13T02:29:00.810000 -CVE-2012-0389,0,1,980674bd9023348dfca1c04f6b0e475739c4b86d4aabdeb8895fe7426fd2a9db,2024-11-21T01:34:53.210000 -CVE-2012-0390,0,1,90d06b98931656f40826983e9e11803a14c0822cb258ac166639070e18a8fd1a,2024-11-21T01:34:53.377000 -CVE-2012-0391,0,1,e010d9c0c9be611be508b0bccece868a76f621dd016d86d50b74e130c7ed9c0d,2024-11-21T01:34:53.520000 -CVE-2012-0392,0,1,f45ccf3374822980607341402dc3671f0cc8341c62a4169f29afea45a929637b,2024-11-21T01:34:53.673000 -CVE-2012-0393,0,1,7e5b8b0b0f2102f125347b019883af4a197e76ad2d195b7d26ef13f85f7755e1,2024-11-21T01:34:53.817000 -CVE-2012-0394,0,1,486e3333682e8168671f2bf0f3bcb5b2d72e33ad3b2f9bc60bdb0ae82f9add31,2024-11-21T01:34:53.950000 -CVE-2012-0395,0,1,c14172acd84502b281a68b3eb1fdec2a81e0c6e0de5f69d0c4784d1df8ff9171,2024-11-21T01:34:54.090000 +CVE-2012-0389,0,0,980674bd9023348dfca1c04f6b0e475739c4b86d4aabdeb8895fe7426fd2a9db,2024-11-21T01:34:53.210000 +CVE-2012-0390,0,0,90d06b98931656f40826983e9e11803a14c0822cb258ac166639070e18a8fd1a,2024-11-21T01:34:53.377000 +CVE-2012-0391,0,0,e010d9c0c9be611be508b0bccece868a76f621dd016d86d50b74e130c7ed9c0d,2024-11-21T01:34:53.520000 +CVE-2012-0392,0,0,f45ccf3374822980607341402dc3671f0cc8341c62a4169f29afea45a929637b,2024-11-21T01:34:53.673000 +CVE-2012-0393,0,0,7e5b8b0b0f2102f125347b019883af4a197e76ad2d195b7d26ef13f85f7755e1,2024-11-21T01:34:53.817000 +CVE-2012-0394,0,0,486e3333682e8168671f2bf0f3bcb5b2d72e33ad3b2f9bc60bdb0ae82f9add31,2024-11-21T01:34:53.950000 +CVE-2012-0395,0,0,c14172acd84502b281a68b3eb1fdec2a81e0c6e0de5f69d0c4784d1df8ff9171,2024-11-21T01:34:54.090000 CVE-2012-0396,0,0,7b53d7a309e873f139c0b9008a8200b1e52459f44a33fba25bd1ec04182eaedf,2017-08-29T01:30:55.287000 CVE-2012-0397,0,0,77ce46d0203e7e30b3908cd538db6366d044d0f2ab1de2d9b3b7d24fb79eb047,2012-03-07T05:00:00 CVE-2012-0398,0,0,7afc47f76677d2304ebe5faa5de29a2b20bc29b177daa50477553054dae921fe,2012-03-15T04:00:00 @@ -52212,15 +52212,15 @@ CVE-2012-0435,0,0,ea4dc0b8f75e2c93fd211b80d1e9814edd7b4c3677b46b29add1cfd680f750 CVE-2012-0439,0,0,a459ebcbeabb41907cb0de05670f8a80d7784105a9a6cb4a4c43f7e8934bbd51,2013-02-25T05:00:00 CVE-2012-0440,0,0,839733946b2942be1a7be185390a41e7e61177227878d6da241774da8bbe5db5,2017-08-29T01:30:55.647000 CVE-2012-0441,0,0,90a472d07b1f31c2d6d7aa25cac4a78917ea30f5894db3fa286104be2584243d,2024-10-21T13:55:03.510000 -CVE-2012-0442,0,1,4e476d13e5f3d21aef84513d87ae80b1de04e43ba1d074b5ce583bf97c025ac6,2024-11-21T01:34:58.410000 -CVE-2012-0443,0,1,51daf9a871047137e3f88e60a4861051694cc4a1cb12e78e94246ba248c5bbe9,2024-11-21T01:34:58.567000 -CVE-2012-0444,0,1,b51dee9ea90e7771cb915dedd30c332340c5db3b7a2adf349bad98196db66041,2024-11-21T01:34:58.733000 -CVE-2012-0445,0,1,98aad96a0f1b44b514ac7f13f1433345fd9e2ca124253c7d84c0ea9e8d9ba899,2024-11-21T01:34:58.897000 -CVE-2012-0446,0,1,f240c8629d5e6451a84b567304a9cb5d8784cc82c9bf4e9fc052b03d9e70e7bb,2024-11-21T01:34:59.057000 -CVE-2012-0447,0,1,f757322f13e7bc9147c4c54e6bd38a028db13fa9058c990755006c5cfa716984,2024-11-21T01:34:59.227000 +CVE-2012-0442,0,0,4e476d13e5f3d21aef84513d87ae80b1de04e43ba1d074b5ce583bf97c025ac6,2024-11-21T01:34:58.410000 +CVE-2012-0443,0,0,51daf9a871047137e3f88e60a4861051694cc4a1cb12e78e94246ba248c5bbe9,2024-11-21T01:34:58.567000 +CVE-2012-0444,0,0,b51dee9ea90e7771cb915dedd30c332340c5db3b7a2adf349bad98196db66041,2024-11-21T01:34:58.733000 +CVE-2012-0445,0,0,98aad96a0f1b44b514ac7f13f1433345fd9e2ca124253c7d84c0ea9e8d9ba899,2024-11-21T01:34:58.897000 +CVE-2012-0446,0,0,f240c8629d5e6451a84b567304a9cb5d8784cc82c9bf4e9fc052b03d9e70e7bb,2024-11-21T01:34:59.057000 +CVE-2012-0447,0,0,f757322f13e7bc9147c4c54e6bd38a028db13fa9058c990755006c5cfa716984,2024-11-21T01:34:59.227000 CVE-2012-0448,0,0,6546ca67318680261e5318342759f5a7d15c25c7f26d612ea648213541b5f94e,2017-08-29T01:30:56.210000 -CVE-2012-0449,0,1,bcf5b035ae543b6a09da3f865a2d922913ad3e8db87fd5506ba1ad4419028c5f,2024-11-21T01:34:59.577000 -CVE-2012-0450,0,1,8ec4ed8fd2eb126584a0c209b135b2e23b849ca562a7ba28b7bf7cf8d2731c32,2024-11-21T01:34:59.740000 +CVE-2012-0449,0,0,bcf5b035ae543b6a09da3f865a2d922913ad3e8db87fd5506ba1ad4419028c5f,2024-11-21T01:34:59.577000 +CVE-2012-0450,0,0,8ec4ed8fd2eb126584a0c209b135b2e23b849ca562a7ba28b7bf7cf8d2731c32,2024-11-21T01:34:59.740000 CVE-2012-0451,0,0,d102cee94e7b4ae3e0fa7d4a186c0b6e5101e347cf45bf542b8cc50b506b38f3,2024-10-21T13:55:03.510000 CVE-2012-0452,0,0,8fc21a8f9ffafe7707bbd7d2d9ceac85dc97dbc4da93819364faa188b08040af,2018-01-10T02:29:24.037000 CVE-2012-0453,0,0,4eb81232bcc2ba03a1498eb74744b779677505d5430b849e2aabe33ef92bb910,2018-01-11T02:29:01.670000 @@ -52249,19 +52249,19 @@ CVE-2012-0475,0,0,d7152190d71aa2f129cfc81e1598fd9b999a7de247f81704d9611e0ecc6766 CVE-2012-0477,0,0,baf2cbd278ed051840fb0c037e78f23e300d3fac81d16314854093750bf280e1,2024-10-21T13:55:03.510000 CVE-2012-0478,0,0,75388cf80facb62e685c258b746b19b21dc51c023c7955a3163b9d13d97795c0,2024-10-21T13:55:03.510000 CVE-2012-0479,0,0,a5626e329159d4a677ccc5396438c38666549c08d0031ae67fb50e26372b3903,2024-10-21T13:55:03.510000 -CVE-2012-0484,0,1,e1b322d6903433360617a10c7f7bdc798b020255e85b02f6f73374fa670a9ba5,2024-11-21T01:35:05.253000 -CVE-2012-0485,0,1,08522cbfb0fbab41c92944d811a716e84752ba07a50890ade97bdb2265f5a3af,2024-11-21T01:35:05.420000 -CVE-2012-0486,0,1,40247bc5fc5d7983ab1000baba42f74e3c21207d4ff9fb6d55e6cdb09038f60c,2024-11-21T01:35:05.570000 -CVE-2012-0487,0,1,133c2176be25a33b278f041084303bb6604cf825c82025fb839ba3dcdd3e4b82,2024-11-21T01:35:05.707000 -CVE-2012-0488,0,1,593df1504eb3f6cc60260b55f404c27cc98687ca7549be0d11dd151fc94f4e91,2024-11-21T01:35:05.823000 -CVE-2012-0489,0,1,40325f02c86d03309291b0e7d527eb84f92626fb7c7a51674f032ebf834df0dc,2024-11-21T01:35:05.937000 -CVE-2012-0490,0,1,d0f279c7e0e34ddeae0e75103be74d35db0a795184c6600ff654b6dba07d108b,2024-11-21T01:35:06.053000 -CVE-2012-0491,0,1,a9806051915a07be7e6f9bc53adc22f51e299595dd5ee7ffd10ec965e049a914,2024-11-21T01:35:06.197000 -CVE-2012-0492,0,1,b16866edc82b9fdc878182daaa78960b3593455b2ffc235ea34bbea616f2dc69,2024-11-21T01:35:06.313000 -CVE-2012-0493,0,1,8e533054a99c804fa773fb3ca2cbad1e2dd4f9b825197df7f17359b005e0d68b,2024-11-21T01:35:06.453000 -CVE-2012-0494,0,1,11451b57eb68ec63123ec004cb14c54bc09487f938d7d171ca13d58fa64e16c1,2024-11-21T01:35:06.577000 -CVE-2012-0495,0,1,05f8083c91e77ef4acf65166bbf81ee4b974f3aa00cd640eee2b9dbb85ff74e5,2024-11-21T01:35:06.683000 -CVE-2012-0496,0,1,51ae4b9173e35d9eb721fae48fcb3840faf450e98b1a7a41eb12d03c8341acd4,2024-11-21T01:35:06.803000 +CVE-2012-0484,0,0,e1b322d6903433360617a10c7f7bdc798b020255e85b02f6f73374fa670a9ba5,2024-11-21T01:35:05.253000 +CVE-2012-0485,0,0,08522cbfb0fbab41c92944d811a716e84752ba07a50890ade97bdb2265f5a3af,2024-11-21T01:35:05.420000 +CVE-2012-0486,0,0,40247bc5fc5d7983ab1000baba42f74e3c21207d4ff9fb6d55e6cdb09038f60c,2024-11-21T01:35:05.570000 +CVE-2012-0487,0,0,133c2176be25a33b278f041084303bb6604cf825c82025fb839ba3dcdd3e4b82,2024-11-21T01:35:05.707000 +CVE-2012-0488,0,0,593df1504eb3f6cc60260b55f404c27cc98687ca7549be0d11dd151fc94f4e91,2024-11-21T01:35:05.823000 +CVE-2012-0489,0,0,40325f02c86d03309291b0e7d527eb84f92626fb7c7a51674f032ebf834df0dc,2024-11-21T01:35:05.937000 +CVE-2012-0490,0,0,d0f279c7e0e34ddeae0e75103be74d35db0a795184c6600ff654b6dba07d108b,2024-11-21T01:35:06.053000 +CVE-2012-0491,0,0,a9806051915a07be7e6f9bc53adc22f51e299595dd5ee7ffd10ec965e049a914,2024-11-21T01:35:06.197000 +CVE-2012-0492,0,0,b16866edc82b9fdc878182daaa78960b3593455b2ffc235ea34bbea616f2dc69,2024-11-21T01:35:06.313000 +CVE-2012-0493,0,0,8e533054a99c804fa773fb3ca2cbad1e2dd4f9b825197df7f17359b005e0d68b,2024-11-21T01:35:06.453000 +CVE-2012-0494,0,0,11451b57eb68ec63123ec004cb14c54bc09487f938d7d171ca13d58fa64e16c1,2024-11-21T01:35:06.577000 +CVE-2012-0495,0,0,05f8083c91e77ef4acf65166bbf81ee4b974f3aa00cd640eee2b9dbb85ff74e5,2024-11-21T01:35:06.683000 +CVE-2012-0496,0,0,51ae4b9173e35d9eb721fae48fcb3840faf450e98b1a7a41eb12d03c8341acd4,2024-11-21T01:35:06.803000 CVE-2012-0497,0,0,d2202a1384319cedc5cbac361693b4c6027f78032d38b0042d4a4e71bcc7cc60,2022-05-13T14:52:52.650000 CVE-2012-0498,0,0,39c5839a79c7de8de40171936a4c131e35a3bb9d902285a25dc277a85cbbac0b,2022-05-13T14:52:54.630000 CVE-2012-0499,0,0,03ceee0e053daf6d6bd2ff22ed4dbceea20da3985a0a27f64fb8244110ce9210,2022-05-13T14:52:55.650000 @@ -52457,11 +52457,11 @@ CVE-2012-0689,0,0,413a080b8830b9c40e841008b1ca66c916a24e04b81a60755b1e618f65507d CVE-2012-0690,0,0,e2f81a70755dfa768fd8cdec3e1cde7da1652cd18026b60c107378821ce37b49,2012-03-13T10:55:01.150000 CVE-2012-0691,0,0,1bb4826c1da3413bc2af96109f2bc86b9dcffe4e102467d6c3e5185db4596634,2023-11-07T02:10:00.963000 CVE-2012-0692,0,0,b6ea72caefa9847f87752ab71aa90cbe645b8c67b7857607e6f39de2a5c3fd81,2023-11-07T02:10:01.043000 -CVE-2012-0693,0,1,98ca1ead1b12d3c8084172a5152d6d3f9695ae4fed21165478096a833c439492,2024-11-21T01:35:33.157000 +CVE-2012-0693,0,0,98ca1ead1b12d3c8084172a5152d6d3f9695ae4fed21165478096a833c439492,2024-11-21T01:35:33.157000 CVE-2012-0694,0,0,ca2f6f876c723353ec838e85bf9a66f8eb62e79c7b19198ec2a931c9b867e41f,2019-11-01T18:32:26.297000 -CVE-2012-0695,0,1,c1ea7369dcaf8692125a28b76b6fabff1093d8963370ab918def5c571f3b63b5,2024-11-21T01:35:33.440000 -CVE-2012-0696,0,1,9e60f6e386fdf04e9648709c65870cd850332625033ae80268b3b87a108c10b2,2024-11-21T01:35:33.573000 -CVE-2012-0697,0,1,f53f0ffe69f874ff9af25fdc602219aacce9b5bee8843e52bbdc53c59a054304,2024-11-21T01:35:33.713000 +CVE-2012-0695,0,0,c1ea7369dcaf8692125a28b76b6fabff1093d8963370ab918def5c571f3b63b5,2024-11-21T01:35:33.440000 +CVE-2012-0696,0,0,9e60f6e386fdf04e9648709c65870cd850332625033ae80268b3b87a108c10b2,2024-11-21T01:35:33.573000 +CVE-2012-0697,0,0,f53f0ffe69f874ff9af25fdc602219aacce9b5bee8843e52bbdc53c59a054304,2024-11-21T01:35:33.713000 CVE-2012-0698,0,0,05da53978df14676843f1f7114e5a241bb82e5c09456bd24dfd0af9e2fbf4c91,2023-11-07T02:10:01.203000 CVE-2012-0699,0,0,da246ddb1f1be81d0a53a6afcca588948b9e23a345b26a53898ff2a825a387cb,2018-01-31T14:31:32.807000 CVE-2012-0700,0,0,3a285e806db8aa3bba0880f633e9ce07baed2982e1db115f60c4d751d089190f,2017-08-29T01:31:00.147000 @@ -52541,15 +52541,15 @@ CVE-2012-0777,0,0,6ade45bdd610b8bae61e6138821f8fdde659b9e2c678e6095f7a9195ca3595 CVE-2012-0778,0,0,81b36ca7434615b7ac4ae5f87cd9d5aa92151dd588117ee5e4761f0c50cb6a14,2017-12-05T02:29:03.277000 CVE-2012-0779,0,0,cbd9d4e5f8663a070dc6e3937371d4a2610d4feb654b32ec703a257a13d719ba,2019-07-18T12:21:41.267000 CVE-2012-0780,0,0,05f8cea9997beccc8a88711df32079ae09b473f194014cf33a3f04aaa0e6c1d4,2017-12-05T02:29:03.340000 -CVE-2012-0781,0,1,c3de2adaa0661729d2ae894ee19479220ccb9c372938a498979d71bc2cfa6447,2024-11-21T01:35:43.010000 -CVE-2012-0782,0,1,0644a30db9e8517bf879f44794666a951dd388ebea397fd5296094739143d572,2024-11-21T01:35:43.143000 +CVE-2012-0781,0,0,c3de2adaa0661729d2ae894ee19479220ccb9c372938a498979d71bc2cfa6447,2024-11-21T01:35:43.010000 +CVE-2012-0782,0,0,0644a30db9e8517bf879f44794666a951dd388ebea397fd5296094739143d572,2024-11-21T01:35:43.143000 CVE-2012-0785,0,0,84363aa75fa9e4100abc05d76b5da7af983867628e46ea9fbaeb90978f848b07,2020-03-04T17:31:08.700000 CVE-2012-0786,0,0,5d7464aa91e985a8ddf2e42c3adcf2f3509d40dc66640e266160640db06bffc8,2014-01-24T04:24:33.383000 CVE-2012-0787,0,0,5ad95f9b086e4d36fe39c66ac60a320efe164066ccdc5cc69eb3ff1e4c5ebcc0,2019-04-22T17:48:00.643000 CVE-2012-0788,0,0,319f14f24e1c081dd97ed7d1d6b4bc6ab2b0e70469900d5598accf63657e5a60,2018-01-09T02:29:02.020000 CVE-2012-0789,0,0,b7c34386558609a0554dee2c365316db284a6836f7eabc811bdfdff9df23a9c3,2018-01-09T02:29:02.097000 -CVE-2012-0790,0,1,eb7500a2c34794cfc2f0e539940ef6f103aab269e1d71b254885632b6e737c52,2024-11-21T01:35:43.867000 -CVE-2012-0791,0,1,11220bc23e93fa649d2a5f8fd99b7a27227d31e30bdb745941173e7e4e6907c4,2024-11-21T01:35:43.977000 +CVE-2012-0790,0,0,eb7500a2c34794cfc2f0e539940ef6f103aab269e1d71b254885632b6e737c52,2024-11-21T01:35:43.867000 +CVE-2012-0791,0,0,11220bc23e93fa649d2a5f8fd99b7a27227d31e30bdb745941173e7e4e6907c4,2024-11-21T01:35:43.977000 CVE-2012-0792,0,0,89ed545e70b4acfe6018617a9d46ea0385f95c8a4bc08a40bdcfa16b7a8f6f94,2023-02-13T00:22:43.593000 CVE-2012-0793,0,0,a7e59a634f4c14057fe5bb12a968fd4e921b5908303670eec521fa237fd63819,2023-02-13T00:22:46.530000 CVE-2012-0794,0,0,9eee896cad8126a931a6052f400917eb982c37d04ce6eebe2ec1cc98c9950861,2023-02-13T03:24:58.710000 @@ -52564,18 +52564,18 @@ CVE-2012-0802,0,0,9a42f7b39460cf5496292738bf0d7cd7ddbd90766c105db16329857d9d4b05 CVE-2012-0803,0,0,c53c8e9cf3fdc0efd615fa32b253ae1ad66ef6f0221d0b41b8f63cfbc476acd1,2023-02-13T00:22:50.263000 CVE-2012-0804,0,0,38f87dbebf918d1594b4bda241ab873f41db42fb920b1711e917b6ce4ee5f381,2023-02-13T03:26:10.177000 CVE-2012-0805,0,0,73c20e177f7ed93295b00bda698f294c70ea50cf7f3557d44293625fc6c0ff1b,2018-01-18T02:29:07.507000 -CVE-2012-0806,0,1,f4a39b123dd3d2bb73ed8ed8d179113bd60fb5349d6b05c47e9b035c39942deb,2024-11-21T01:35:45.680000 -CVE-2012-0807,0,1,fd938203f9e6ec4cad3b0697416dc2e0ba557ecb96e31399565ac1dd699408ed,2024-11-21T01:35:45.787000 +CVE-2012-0806,0,0,f4a39b123dd3d2bb73ed8ed8d179113bd60fb5349d6b05c47e9b035c39942deb,2024-11-21T01:35:45.680000 +CVE-2012-0807,0,0,fd938203f9e6ec4cad3b0697416dc2e0ba557ecb96e31399565ac1dd699408ed,2024-11-21T01:35:45.787000 CVE-2012-0808,0,0,cadfc73dace434a7345a86f4bce601c77cda101be937022aebcef1275cf936a0,2012-09-05T03:21:00.350000 -CVE-2012-0809,0,1,aaeaccbe1b99c5b7b48fff61e82517b5c7b3a07b6cd6be17e7665b5d6028d428,2024-11-21T01:35:46.013000 +CVE-2012-0809,0,0,aaeaccbe1b99c5b7b48fff61e82517b5c7b3a07b6cd6be17e7665b5d6028d428,2024-11-21T01:35:46.013000 CVE-2012-0810,0,0,1ca455a0673b969b1a6d2bc4fdfc076934bb27ed47dc8c2c2f2c806f7c91902c,2020-02-14T18:56:26.757000 CVE-2012-0811,0,0,7f2a55c54e7d2b6dd1fc14caf2ff65fbf9f3d6e99bad80d17a87e22305ed4f3d,2014-10-02T16:39:19.863000 CVE-2012-0812,0,0,c6e371960b255ce4afb83ec48e330ea06a19645e6e5ea83a1e904b09c832e44a,2020-08-18T15:05:58.063000 CVE-2012-0813,0,0,4fb7ec478339e1de37e36a38d4d7da870b89d63bdd5edd5af7a54124156f5b78,2012-08-01T04:00:00 -CVE-2012-0814,0,1,f134c436b92e1d7ce531c3c2f6ce52772422e8f5d260f6dc2d43e0292c711dd6,2024-11-21T01:35:46.573000 +CVE-2012-0814,0,0,f134c436b92e1d7ce531c3c2f6ce52772422e8f5d260f6dc2d43e0292c711dd6,2024-11-21T01:35:46.573000 CVE-2012-0815,0,0,d36bb490bb17f4be41c6431fccbea1f8f54c50195b9ecc38c67e61f3745e9aae,2023-11-07T02:10:02.923000 CVE-2012-0816,0,0,c2c4e33efe1828a904f1a56d6ea6374f9e3de37cdd26bd457caaff6193a4c29f,2023-11-07T02:10:03.043000 -CVE-2012-0817,0,1,11270abd65335db714e699f47348ed5a41fae0cfb827b7f08d040d9be07bbbc0,2024-11-21T01:35:46.850000 +CVE-2012-0817,0,0,11270abd65335db714e699f47348ed5a41fae0cfb827b7f08d040d9be07bbbc0,2024-11-21T01:35:46.850000 CVE-2012-0818,0,0,8f4ba93316fd2ee478471d18f44ad7c00c8b71c71513b4ddec4dd737940cbe93,2023-02-13T03:26:21.480000 CVE-2012-0819,0,0,40a1cb5b24b3386f54570a9ae678a4bd85a865d0736e35f075d5642f13bac02d,2012-09-07T04:00:00 CVE-2012-0820,0,0,bd64ad15ecef25900229dff7b111919929f471cc72527a16706deaa8f28c7307,2012-09-07T13:22:44.837000 @@ -52643,32 +52643,32 @@ CVE-2012-0881,0,0,163575cf2e5382dbff868b604233cb018980f33020dc2548863ff0b6244d84 CVE-2012-0882,0,0,91ec579fd83449636810d2cdd7df7266e915102f70b753bc646e36d36b64ebfe,2023-11-07T02:10:05.233000 CVE-2012-0883,0,0,ee7c16c523bd3b4ce7c40f66c81cf341fc1cb1973b096885c57e15000fa23e07,2023-11-07T02:10:05.350000 CVE-2012-0884,0,0,96dc7818190bcc190a7283e0004907ae7adc22d59616213f67a757cc2ae77c39,2018-01-10T02:29:29.427000 -CVE-2012-0885,0,1,2f30662a47043d1bffa4c583c1ac00a754339bd714186089614455cbacefe9dd,2024-11-21T01:35:54.737000 +CVE-2012-0885,0,0,2f30662a47043d1bffa4c583c1ac00a754339bd714186089614455cbacefe9dd,2024-11-21T01:35:54.737000 CVE-2012-0891,0,0,a5e17987460a55eae1968a392b391d0935e6ddfd9ea329b8efe6446b0d65bdea,2019-07-11T11:43:45.493000 -CVE-2012-0895,0,1,4b6dfab1b2a9e8faf9a1f6dc65a502778995a62a95b098b21c80b26301294887,2024-11-21T01:35:55.033000 -CVE-2012-0896,0,1,820c7e2a92630b149448a9c06cf492661fbb78b131940d9e1c1d610f7864c594,2024-11-21T01:35:55.187000 -CVE-2012-0897,0,1,31e97451e1036b845acf037e015b9f71d5a61b0b3866899f1de9e47a71a9ab78,2024-11-21T01:35:55.373000 -CVE-2012-0898,0,1,03fa49b3c7036bb260938c6bd36c65c2a4eb2bbf512c849b97cb5b399fb66046,2024-11-21T01:35:55.543000 -CVE-2012-0899,0,1,96d4a28759ccae3769e5d3ef97293f28c45c0c5bab1ad6e78f4fbbcc288cbee3,2024-11-21T01:35:55.683000 -CVE-2012-0900,0,1,1f500976abfed932c2489ee963ecdfcd7ea94cf6056ac1225eaf6b76ad3cb41f,2024-11-21T01:35:55.837000 -CVE-2012-0901,0,1,72e3fb92fa2165feaa62bcd2d8ece094c1979c61abc1f7f7274f9a1167a28ac0,2024-11-21T01:35:55.973000 -CVE-2012-0902,0,1,032225e6b4667b56be6a12d1c7b03ba1c7b5fd4e83f3d9fe2cb2e77db02bea3d,2024-11-21T01:35:56.100000 -CVE-2012-0903,0,1,dc56d70e603b09a6c99e980adbe6d4239a47d5bb819c4b27aae3dd793e26a108,2024-11-21T01:35:56.240000 -CVE-2012-0904,0,1,9234840f90a4823a0bbcb9af632d2de6ecc2fad116da40650d988176101f577e,2024-11-21T01:35:56.377000 -CVE-2012-0905,0,1,f3bb87116146ee5cddecf2ff22937a47c79443e2b4bf4b411aa4c606364dc424,2024-11-21T01:35:56.507000 -CVE-2012-0906,0,1,22c0a261646f2f4f556dac5cc8486bc082f47673a292f93d72d55afc8fe90727,2024-11-21T01:35:56.640000 -CVE-2012-0907,0,1,e117505408de94976ccb0826aef9ec5238dd73d36ac432ee1be9c81c2e52ba00,2024-11-21T01:35:56.767000 -CVE-2012-0908,0,1,b2d3aaf7e81f294fe98df822d7dd492ecebe99d795afadecd8fc615f0ee5351d,2024-11-21T01:35:56.883000 -CVE-2012-0909,0,1,923e66df07527581ae21aeea446aa903314b2f75bdd753fdce97c9d883e26a7f,2024-11-21T01:35:57.010000 +CVE-2012-0895,0,0,4b6dfab1b2a9e8faf9a1f6dc65a502778995a62a95b098b21c80b26301294887,2024-11-21T01:35:55.033000 +CVE-2012-0896,0,0,820c7e2a92630b149448a9c06cf492661fbb78b131940d9e1c1d610f7864c594,2024-11-21T01:35:55.187000 +CVE-2012-0897,0,0,31e97451e1036b845acf037e015b9f71d5a61b0b3866899f1de9e47a71a9ab78,2024-11-21T01:35:55.373000 +CVE-2012-0898,0,0,03fa49b3c7036bb260938c6bd36c65c2a4eb2bbf512c849b97cb5b399fb66046,2024-11-21T01:35:55.543000 +CVE-2012-0899,0,0,96d4a28759ccae3769e5d3ef97293f28c45c0c5bab1ad6e78f4fbbcc288cbee3,2024-11-21T01:35:55.683000 +CVE-2012-0900,0,0,1f500976abfed932c2489ee963ecdfcd7ea94cf6056ac1225eaf6b76ad3cb41f,2024-11-21T01:35:55.837000 +CVE-2012-0901,0,0,72e3fb92fa2165feaa62bcd2d8ece094c1979c61abc1f7f7274f9a1167a28ac0,2024-11-21T01:35:55.973000 +CVE-2012-0902,0,0,032225e6b4667b56be6a12d1c7b03ba1c7b5fd4e83f3d9fe2cb2e77db02bea3d,2024-11-21T01:35:56.100000 +CVE-2012-0903,0,0,dc56d70e603b09a6c99e980adbe6d4239a47d5bb819c4b27aae3dd793e26a108,2024-11-21T01:35:56.240000 +CVE-2012-0904,0,0,9234840f90a4823a0bbcb9af632d2de6ecc2fad116da40650d988176101f577e,2024-11-21T01:35:56.377000 +CVE-2012-0905,0,0,f3bb87116146ee5cddecf2ff22937a47c79443e2b4bf4b411aa4c606364dc424,2024-11-21T01:35:56.507000 +CVE-2012-0906,0,0,22c0a261646f2f4f556dac5cc8486bc082f47673a292f93d72d55afc8fe90727,2024-11-21T01:35:56.640000 +CVE-2012-0907,0,0,e117505408de94976ccb0826aef9ec5238dd73d36ac432ee1be9c81c2e52ba00,2024-11-21T01:35:56.767000 +CVE-2012-0908,0,0,b2d3aaf7e81f294fe98df822d7dd492ecebe99d795afadecd8fc615f0ee5351d,2024-11-21T01:35:56.883000 +CVE-2012-0909,0,0,923e66df07527581ae21aeea446aa903314b2f75bdd753fdce97c9d883e26a7f,2024-11-21T01:35:57.010000 CVE-2012-0911,0,0,504116589e9209cfdd02aff6911b1ff8aaec0bb237d09a2e329c5fd339b2a393,2024-01-21T02:50:35.533000 -CVE-2012-0912,0,1,b78f0f775009b4a10ee9851c961006bcd4f9e1f6a140dd077b7346c0f32079c1,2024-11-21T01:35:57.283000 -CVE-2012-0913,0,1,350709d5a21847496532ec6f435fe5e30a68212a3213fc1edda5b1715a3968c1,2024-11-21T01:35:57.413000 -CVE-2012-0914,0,1,2c4d03a9c6bfc248ae0f2fbbe8668345cfc5f4dc7c2ceae85dea8dd9410a335e,2024-11-21T01:35:57.537000 -CVE-2012-0915,0,1,4f8d91774c838d475b3c04e8e9a297bed4cc2ee492affe4f4b7acc3d9675aa22,2024-11-21T01:35:57.680000 -CVE-2012-0916,0,1,4142bc9b279be4b81dfa24458a494ddfe1f8ffb6123863187590f73cb9c81e8c,2024-11-21T01:35:57.807000 -CVE-2012-0917,0,1,ce160ef8b6d1389415fdcd8606ba67d4edd2017b2c9da98abf38c7b5e073fd2e,2024-11-21T01:35:57.930000 -CVE-2012-0918,0,1,d1755ff7fed5afac6ad5e8cd562dd23485309a8c2c104e863559a28951175366,2024-11-21T01:35:58.060000 -CVE-2012-0919,0,1,8d732d59271b81731707b169890a4518652033a5849adf886fb72323648bf505,2024-11-21T01:35:58.200000 +CVE-2012-0912,0,0,b78f0f775009b4a10ee9851c961006bcd4f9e1f6a140dd077b7346c0f32079c1,2024-11-21T01:35:57.283000 +CVE-2012-0913,0,0,350709d5a21847496532ec6f435fe5e30a68212a3213fc1edda5b1715a3968c1,2024-11-21T01:35:57.413000 +CVE-2012-0914,0,0,2c4d03a9c6bfc248ae0f2fbbe8668345cfc5f4dc7c2ceae85dea8dd9410a335e,2024-11-21T01:35:57.537000 +CVE-2012-0915,0,0,4f8d91774c838d475b3c04e8e9a297bed4cc2ee492affe4f4b7acc3d9675aa22,2024-11-21T01:35:57.680000 +CVE-2012-0916,0,0,4142bc9b279be4b81dfa24458a494ddfe1f8ffb6123863187590f73cb9c81e8c,2024-11-21T01:35:57.807000 +CVE-2012-0917,0,0,ce160ef8b6d1389415fdcd8606ba67d4edd2017b2c9da98abf38c7b5e073fd2e,2024-11-21T01:35:57.930000 +CVE-2012-0918,0,0,d1755ff7fed5afac6ad5e8cd562dd23485309a8c2c104e863559a28951175366,2024-11-21T01:35:58.060000 +CVE-2012-0919,0,0,8d732d59271b81731707b169890a4518652033a5849adf886fb72323648bf505,2024-11-21T01:35:58.200000 CVE-2012-0920,0,0,56c5e3fe61938cc51734d3b6dab0ba608f96bb909793570c876b6a9038a0f587,2018-10-30T16:28:04.047000 CVE-2012-0922,0,0,795ff52ca8b55b2f4341cd8b76a6ac0788b5a75c4e099f88d1a23e26123c476f,2017-08-29T01:31:06.507000 CVE-2012-0923,0,0,d58b3993db66c85a74ed5a2e3dd8953b6bf2a5d84c3893f353a2e8e8b2987f49,2012-02-25T04:21:15.933000 @@ -52677,15 +52677,15 @@ CVE-2012-0925,0,0,e941306bf7b5da9aaabbf0ab71c32ae84ca7a20f7b78c136eaca9cb855e75e CVE-2012-0926,0,0,992835932dfd1adcc257aa8528d1c84acbf2f76d80cc7cd44bb25cc044a44343,2012-02-25T04:21:16.417000 CVE-2012-0927,0,0,a4e220c40f0bbfe05d4422dbc4aa6804269dc09d13a356a0f2dc1cd86e42cc59,2012-02-25T04:21:16.573000 CVE-2012-0928,0,0,1fe6dc5b5dbaa7759e9c7774bbf0a6e2629c2b3a2b72be34d9cb3e79bc27745c,2012-02-09T05:00:00 -CVE-2012-0929,0,1,96ac852087aae08eda5aee960507e248a48244bd705f6276a4f0d41dbebe0092,2024-11-21T01:35:59.387000 -CVE-2012-0930,0,1,36dda1923bf7d4ddf2caca30f6c1bfb694e9dc32df00db8e7d7d16f4a13e0164,2024-11-21T01:35:59.517000 -CVE-2012-0931,0,1,23b2ce45da78df5e90984c4c0250691e3892c665a334dd4a7ac6360e02daf6e3,2024-11-21T01:35:59.653000 -CVE-2012-0932,0,1,f40f3dee45fd895e66ebed3fa3f2d49ea4635f250f8cd2429a3202041d58f4d6,2024-11-21T01:35:59.793000 -CVE-2012-0933,0,1,4bde74a6e4e806f878929c4e9359cfc7a6c885021cee6e2b7452c0b88eb27463,2024-11-21T01:35:59.917000 -CVE-2012-0934,0,1,18a6b289b2f14588b083ee96fa09d54b983271daf5e8c02f2f8cd3e54f81d0d0,2024-11-21T01:36:00.047000 -CVE-2012-0935,0,1,3714fe1dda07d4c5bb242d37deecf2a72e381efef9009c3fd59b604f900e268d,2024-11-21T01:36:00.183000 -CVE-2012-0936,0,1,95302fb4ae9e05d63926ae0ec2eef8c444fec66dfcbf27134caf8f42be214e1c,2024-11-21T01:36:00.307000 -CVE-2012-0937,0,1,82ac5ec02a74b5b4b015c9f800bbcc47508d762ee7171ec686337fd8ba30df70,2024-11-21T01:36:00.460000 +CVE-2012-0929,0,0,96ac852087aae08eda5aee960507e248a48244bd705f6276a4f0d41dbebe0092,2024-11-21T01:35:59.387000 +CVE-2012-0930,0,0,36dda1923bf7d4ddf2caca30f6c1bfb694e9dc32df00db8e7d7d16f4a13e0164,2024-11-21T01:35:59.517000 +CVE-2012-0931,0,0,23b2ce45da78df5e90984c4c0250691e3892c665a334dd4a7ac6360e02daf6e3,2024-11-21T01:35:59.653000 +CVE-2012-0932,0,0,f40f3dee45fd895e66ebed3fa3f2d49ea4635f250f8cd2429a3202041d58f4d6,2024-11-21T01:35:59.793000 +CVE-2012-0933,0,0,4bde74a6e4e806f878929c4e9359cfc7a6c885021cee6e2b7452c0b88eb27463,2024-11-21T01:35:59.917000 +CVE-2012-0934,0,0,18a6b289b2f14588b083ee96fa09d54b983271daf5e8c02f2f8cd3e54f81d0d0,2024-11-21T01:36:00.047000 +CVE-2012-0935,0,0,3714fe1dda07d4c5bb242d37deecf2a72e381efef9009c3fd59b604f900e268d,2024-11-21T01:36:00.183000 +CVE-2012-0936,0,0,95302fb4ae9e05d63926ae0ec2eef8c444fec66dfcbf27134caf8f42be214e1c,2024-11-21T01:36:00.307000 +CVE-2012-0937,0,0,82ac5ec02a74b5b4b015c9f800bbcc47508d762ee7171ec686337fd8ba30df70,2024-11-21T01:36:00.460000 CVE-2012-0938,0,0,04b32dd73f2f90ad1d15f679169effb303e3719e817c5d23917491e042fcf0ce,2017-08-29T01:31:07.193000 CVE-2012-0939,0,0,b97d624ce98903cb6eee4231830e37329372071dc09bdcbd8f036e0bbf2eb7e8,2017-08-29T01:31:07.257000 CVE-2012-0941,0,0,2b13d23354ddbbd49d994d967c8528a055eec86fd9df757e5b3dbff945a31b55,2018-02-27T19:44:58.543000 @@ -52722,32 +52722,32 @@ CVE-2012-0971,0,0,351c489d5a359e5dde9005e5b457795fe1aee80990652bc1b848f70638e95a CVE-2012-0972,0,0,d96b2de383ff925bf47d02ba07e755352e0ebd8402ec7eeea756e870f9a862ad,2023-11-07T02:10:08.343000 CVE-2012-0973,0,0,9b739ddc12521c00db4d2cb540a3489fa0b198ea0d5edc15e2436e7f7d2817b4,2012-09-26T04:00:00 CVE-2012-0974,0,0,75aa5ef6bde2d5a38ee418c621b25fc58b32b29b42fb3f9368e31478ed2e47b8,2012-10-15T04:00:00 -CVE-2012-0975,0,1,1008f872819a9e3828a85dec478ccdbc13a28e24049f94027b00684b69f89b5d,2024-11-21T01:36:03.870000 -CVE-2012-0976,0,1,98a74c9c6090f309e9684f48048678152e0d7ddd16483abbaee5ad02624b1d09,2024-11-21T01:36:04.010000 -CVE-2012-0977,0,1,9415e469ffae4df8e8213a5e4385a2a7e2457c18b76ed23451d027dba0e25e4c,2024-11-21T01:36:04.157000 -CVE-2012-0978,0,1,4182605ac004a98fcdd906b81e3cdffcec291fe6011ffb6f1ed1959b8d11bba6,2024-11-21T01:36:04.293000 -CVE-2012-0979,0,1,aaa7b3eec3233cb857e0609690f192cd7f8e77a47a3262a64b9e0c691487cf36,2024-11-21T01:36:04.433000 -CVE-2012-0980,0,1,8a8e9c795c3707b0e0d82f4238fb139ae665a686fa814d7f9743fec753737826,2024-11-21T01:36:04.580000 -CVE-2012-0981,0,1,a48fffbcbd1bbda880f1e0ec3878d7d2e671156eb1c3bce25d619746142e7e0d,2024-11-21T01:36:04.713000 -CVE-2012-0982,0,1,03e6e9723d0fbce9f4aaaaa6a5b2d63eda320f179c9da60f9ddc0053a88efef9,2024-11-21T01:36:04.853000 -CVE-2012-0983,0,1,23eda2c4063c10af87da12e701b6198d4b2b3380b318f21a4f3838a7fdb7ec9b,2024-11-21T01:36:04.990000 +CVE-2012-0975,0,0,1008f872819a9e3828a85dec478ccdbc13a28e24049f94027b00684b69f89b5d,2024-11-21T01:36:03.870000 +CVE-2012-0976,0,0,98a74c9c6090f309e9684f48048678152e0d7ddd16483abbaee5ad02624b1d09,2024-11-21T01:36:04.010000 +CVE-2012-0977,0,0,9415e469ffae4df8e8213a5e4385a2a7e2457c18b76ed23451d027dba0e25e4c,2024-11-21T01:36:04.157000 +CVE-2012-0978,0,0,4182605ac004a98fcdd906b81e3cdffcec291fe6011ffb6f1ed1959b8d11bba6,2024-11-21T01:36:04.293000 +CVE-2012-0979,0,0,aaa7b3eec3233cb857e0609690f192cd7f8e77a47a3262a64b9e0c691487cf36,2024-11-21T01:36:04.433000 +CVE-2012-0980,0,0,8a8e9c795c3707b0e0d82f4238fb139ae665a686fa814d7f9743fec753737826,2024-11-21T01:36:04.580000 +CVE-2012-0981,0,0,a48fffbcbd1bbda880f1e0ec3878d7d2e671156eb1c3bce25d619746142e7e0d,2024-11-21T01:36:04.713000 +CVE-2012-0982,0,0,03e6e9723d0fbce9f4aaaaa6a5b2d63eda320f179c9da60f9ddc0053a88efef9,2024-11-21T01:36:04.853000 +CVE-2012-0983,0,0,23eda2c4063c10af87da12e701b6198d4b2b3380b318f21a4f3838a7fdb7ec9b,2024-11-21T01:36:04.990000 CVE-2012-0984,0,0,80fa2407800bd4383dc1caa5ff24917727cf385cd06c6fb91612e6a33169ab14,2017-08-29T01:31:08.163000 -CVE-2012-0985,0,0,b896e636319b47697d16289258ea4ba82dcf737d945ea2a00b7f48db947e2038,2017-08-29T01:31:08.227000 +CVE-2012-0985,0,1,0ea9bed6b286425fe1375d652954470ac29c6220fa3fe9555ec80f7fa955ca31,2024-11-21T01:36:05.270000 CVE-2012-0986,0,0,e6a1ba334cf73b50cbae114be731b21729fc9b3dd6c072b21174c959b4430c99,2017-08-29T01:31:08.287000 CVE-2012-0987,0,0,4f573f0a810ecfb479f63d31af67c77a4eb92d542e69633d1b27ea56eda210cf,2017-12-01T02:29:00.223000 CVE-2012-0988,0,0,ae0ba54e55e663aa4f931b4043b17f9576776de710aab13d72a526f32be9d266,2017-08-29T01:31:08.397000 CVE-2012-0989,0,0,3319c323a3316c0865f5a217317c690fa810821646eb412f129299c039deba21,2017-08-29T01:31:08.477000 -CVE-2012-0990,0,0,bf8835fccc3839153649acd9d86e028ae1c3fa29d37522e952442777475f78a0,2017-08-29T01:31:08.537000 -CVE-2012-0991,0,0,08f905892ce421df03c36eaee79d268d1cb0f39fa0059b2e41fb16a50faf37c0,2017-08-29T01:31:08.617000 -CVE-2012-0992,0,0,2179de12428e21843564833383d06e5c018ba9977efe67ca3739acb3a1f63f51,2017-08-29T01:31:08.663000 -CVE-2012-0993,0,0,a1077a059d7845003015c4d26b2398be51f0714f0eac28efcc356f456789fbea,2017-08-29T01:31:08.727000 -CVE-2012-0994,0,0,e1a06f116296696895677e5260febf393c84426786471705a60e1a9dde1abb38,2017-08-29T01:31:08.820000 -CVE-2012-0995,0,0,d9e26df140e4eda57b908c84b626629082ba98ecda051123a524c407c400b992,2017-08-29T01:31:08.883000 -CVE-2012-0996,0,0,7db54a219c0cb7b6990f8655148d70e2527b860cdca9b2ff875a2860a8193de6,2012-02-24T13:55:02.733000 -CVE-2012-0997,0,0,6a0a5bb0bf8f4848fd2929dc3a3d0c532127438c2becf977567398a440d20680,2012-02-24T13:55:02.780000 -CVE-2012-0998,0,0,64653514a5ca3c648cc16e456990086c6d9b0b7dc4b3987bf155521cc8581983,2012-02-24T13:55:03.217000 -CVE-2012-0999,0,0,ca35c1ff95b85af7258a717a2ca9017291b4744ff0239d04ec4ab59e3353a663,2012-02-24T13:55:03.267000 -CVE-2012-1000,0,0,bb92a802703d6b0cb3843dfa29be6442f1a63fccee403540146e0d900755bf45,2012-02-24T13:55:03.313000 +CVE-2012-0990,0,1,4997ddc6a3883308c3ded146b0dac9829c27db3c81098844ceb4bc60913dafa5,2024-11-21T01:36:06.043000 +CVE-2012-0991,0,1,a45cc884bdacbaa5cb513c3dac38e4d3b12600a76d625b22ba016e6307fb952f,2024-11-21T01:36:06.190000 +CVE-2012-0992,0,1,3fc631120963b3b84f442bb981ef684ff476dc4c284f707a40ae3b79e54a5cda,2024-11-21T01:36:06.343000 +CVE-2012-0993,0,1,ac8f68e6430fc18f706b4be23ee74da36155be50285cc153888b6119e141d263,2024-11-21T01:36:06.493000 +CVE-2012-0994,0,1,e91f48c2360af5598d50005f11fb2b786e0a1d2f72698cd97a81564f0fe0df70,2024-11-21T01:36:06.640000 +CVE-2012-0995,0,1,f3b97c91ecef771c92cbd1a2318cad9f793e426b26e570b69c8a5f936ed61409,2024-11-21T01:36:06.790000 +CVE-2012-0996,0,1,19ffbc8494dde419476c7a5ade35bb9645f773433c20a121d584a219899b8810,2024-11-21T01:36:06.937000 +CVE-2012-0997,0,1,2ac2b7038fbd4238551c3f277801666259ec64c7e6734a2c1b72dff3c31c9684,2024-11-21T01:36:07.077000 +CVE-2012-0998,0,1,562afc110e9e0da20473e53c2b540b5968479491507d704f6ad43456aeadfeb2,2024-11-21T01:36:07.213000 +CVE-2012-0999,0,1,8f09dbd0f185557c00ec96f5847eed2b2ed71f7b12b703eb6e855470fadf0e46,2024-11-21T01:36:07.357000 +CVE-2012-1000,0,1,c9a3e449f6929e7aa519d0894a1cb142f99d0c665a6217c5ba0e366416ed1655,2024-11-21T01:36:10.020000 CVE-2012-10001,0,0,3a06baeabff833732a3694ec6ced07116b99a6ba1bea7206e1d0f466fe630b0a,2021-01-08T20:19:33.640000 CVE-2012-10002,0,0,bb6f0201707e6221d334a7a658bffa0e34973d845296a35048dee895347a99a7,2024-05-17T00:51:45.187000 CVE-2012-10003,0,0,1a950b28321efece16de202f41adea2cf5ddaaf731b4ee80177bc9fb36b09bae,2024-05-17T00:51:45.303000 @@ -52767,151 +52767,151 @@ CVE-2012-10015,0,0,24891fb06d64dcdbe29bc3d68dc58660842ac01174efff223a8a3dc4d809d CVE-2012-10016,0,0,50b0be84a632fcfd63c5683132c72829cfbba19e76fa7d1e8b2308b8e62659b3,2024-05-17T00:51:46.860000 CVE-2012-10017,0,0,cd8d899c12955d758ae3dba50c52117997a0233c9fcc21f11c8e13713fa40567,2024-05-17T00:51:46.963000 CVE-2012-10018,0,0,71d8c7a4de4e41d21f0f7c59e05e8fe01f28703a6cf56aebd1002f5c36a1d48a,2024-10-16T16:38:14.557000 -CVE-2012-1002,0,0,510ae0fa015c89254219ee968a42064a352242d7e82a140cbbb23a59f8009f93,2017-12-07T02:29:10.350000 -CVE-2012-1003,0,0,8b64c365043997636a4a30596e670f2397029fa9c3a8b88f62aea985930dc202,2017-08-29T01:31:08.943000 -CVE-2012-1004,0,0,d8a090792d926eb721787b604fedfde9d2238b34407308a190cfed04a1fe6687,2012-02-08T05:00:00 -CVE-2012-1005,0,0,511a6f8ee3e52f2cad79b2ce0e82a6c798a56ba2fa70e7a6cb79c475a0c12d06,2017-08-29T01:31:08.990000 -CVE-2012-1006,0,0,3f8aa85ac3eeebe91cd1a089957a752fc3a0e6f8edd36eea97c5a816acf373d3,2017-08-29T01:31:09.053000 -CVE-2012-1007,0,0,8bfcd27ec628bc80a4172357dca194bc6de51b85102f53520729bd53292d4c2f,2018-10-17T01:29:00.740000 -CVE-2012-1008,0,0,5b39fed2af6df1f24b0cd283eff20b261dde4928985a8cbe87aacee1cd8cc134,2013-07-26T06:40:59.807000 -CVE-2012-1009,0,0,20d4624a9489f422157d2a19f5c3cb0c6fc0cb22be0c226901c1203aaeff1518,2017-08-29T01:31:09.163000 -CVE-2012-1010,0,0,a99673662bb2b9d75c28f17d2db179ad3d0c1cfa02e17fdd07d312b79085294c,2017-08-29T01:31:09.210000 -CVE-2012-1011,0,0,bebff1aa2225eaccf047118d66a0ce1e03f8cd511f8f5ce5abd12ee72bcc88a4,2017-08-29T01:31:09.273000 -CVE-2012-1012,0,0,7309cfd062fca58cf85815552ac40805947c282b04f5bc53dab3bedaab3f35de,2020-01-21T15:46:22.213000 -CVE-2012-1013,0,0,b7a7c84677c89429415d10a304f58e3029c1054dc98632483a16b82facff62e2,2020-01-21T15:46:22.213000 -CVE-2012-1014,0,0,581d0bbfa357e754480f8db3d81151de15f4abeb09c10fc56d68392e8544fd1b,2020-01-21T15:46:24.010000 -CVE-2012-1015,0,0,fdb11489a1aaaa1d7e7dc83ad53f408d03a6b192a7b76599c26d334bac269be9,2020-01-21T15:46:24.010000 +CVE-2012-1002,0,1,a1ea114a00464c6cdeabb58d43d93ab30589444abc565005961d8f67c2735b39,2024-11-21T01:36:10.323000 +CVE-2012-1003,0,1,f30b13f4c4e2877ad818c2e77038eedca1f3173e92b6b436c1638c1381a307f5,2024-11-21T01:36:10.463000 +CVE-2012-1004,0,1,abd1996f6edec5bd2f02fb09dbd268067b423a8887c66bca53abb832be1e4085,2024-11-21T01:36:10.620000 +CVE-2012-1005,0,1,b0f25ba2d09b547a99b90f19ba07de69af2682b0b4d8c9b1b5b37b63d7aff360,2024-11-21T01:36:10.757000 +CVE-2012-1006,0,1,f19003dbd088f3ac5d793ef2cb18ddb8961e6ad90f7f47a1e1301c8ce4a0523d,2024-11-21T01:36:10.913000 +CVE-2012-1007,0,1,d0739ac6a33eac813df492a3c9a86f511ef5ca613a44b361b11daf648fdf7460,2024-11-21T01:36:11.047000 +CVE-2012-1008,0,1,b643e4cc51bf356357d146e1fc54a83457151263b062c252df0337218ee990fd,2024-11-21T01:36:11.190000 +CVE-2012-1009,0,1,46ab41e3956957a918f803d07c1d3efab40eb89c5206049fd98c7df52df828d1,2024-11-21T01:36:11.327000 +CVE-2012-1010,0,1,a198d9ea6bcfb8a9dd8b2cc94d0fe338a498cbc105c612162c9a5ac96391dc59,2024-11-21T01:36:11.467000 +CVE-2012-1011,0,1,10a03ad5fea9b90092bd8ac6d6346c4acb8874a0f5581e41ce3eedee8d0c03ef,2024-11-21T01:36:11.613000 +CVE-2012-1012,0,1,741388d13cc91a30583e0364faa58d0c1d817055b80121f5cae130373b0f7f31,2024-11-21T01:36:11.753000 +CVE-2012-1013,0,1,179f57fd8b212802913066c710b90e019d49d5e9f1a764bc7ad83b98d01b57a8,2024-11-21T01:36:11.890000 +CVE-2012-1014,0,1,76eaf7396b64603c442eb7352854529e7a6ff4757748587038340e05b566d0ee,2024-11-21T01:36:12.037000 +CVE-2012-1015,0,1,cdae8ead2b65821bf638fd1890215d272078cbf7189a89d4c23f17e79a39875d,2024-11-21T01:36:12.170000 CVE-2012-1016,0,0,2c3c757c629a232015f3ee2d5b1c2fe0b7ace6cdd8a50aae4af8b143522be784,2021-02-02T18:37:52.757000 -CVE-2012-1017,0,0,0e1ba5d01e25a1bf9f105dd6c69ce34ed65d3393f9fc40b92b8641efc4d15b77,2017-08-29T01:31:09.320000 -CVE-2012-1018,0,0,74c9a859f922f79b915f32b2f4e3569a03ee7daca307f37fc7e268ea0a66dc74,2017-08-29T01:31:09.397000 -CVE-2012-1019,0,0,a4390d6a270300e5c8ca262772363a3953b076b85f409946f2a15b20fb478410,2012-02-08T05:00:00 -CVE-2012-1020,0,0,540e5986c8077e90d872e2433126ec66d6d5be513a5407d3bc1cbc4282a1aa60,2017-08-29T01:31:09.460000 -CVE-2012-1021,0,0,a3f06374edf1a69e42417140397757e4325e4389438051f6be77c84f5053f9a7,2017-08-29T01:31:09.523000 -CVE-2012-1022,0,0,e8c33b091d15831b07fedd2e1ca26918e31396ebab2a779306bb2eca9089aff4,2017-08-29T01:31:09.600000 -CVE-2012-1023,0,0,7c1ddbe8888ecfcb161d090ebfb898dea00caeccb049d2c8a039fecbd1869640,2017-08-29T01:31:09.647000 -CVE-2012-1024,0,0,82659d5b371780070b248e2ec88d8432ba31e6906d38cc536c96c5212e1263a9,2017-08-29T01:31:09.710000 -CVE-2012-1025,0,0,7f1dd3400724b87f2c0f67157909e72c54941b6d9c719427f1d6b533cccbe498,2012-02-08T05:00:00 -CVE-2012-1026,0,0,f8e96ce4b8714e4cba81238248f37c8e4ac063b2c084f92061dff730b2cc77e2,2017-08-29T01:31:09.883000 -CVE-2012-1027,0,0,0f61e67a8735df214e94af06273d843148e57b7494fea510902360a3fdc0111d,2017-08-29T01:31:09.977000 -CVE-2012-1028,0,0,d37c9915f40b77d2e33aa7b11653f9251ae30a1e811f223c5710717cc4304681,2017-08-29T01:31:10.037000 -CVE-2012-1029,0,0,bc2e9f1ebf7860b841661640b7720c745fcda54f4bc721bd0f32c20f9631ee7f,2017-08-29T01:31:10.100000 -CVE-2012-1030,0,0,948ecc2aecbb36bfa0f1ef11caebe967e6bf4a51f557b5efed422373d11bd283,2012-04-11T10:39:26.340000 -CVE-2012-1031,0,0,a713c058d9e03830e4b08b835aec6128cef90d8c2f8336ac98ff275eb4754bbe,2012-02-14T04:11:16.507000 +CVE-2012-1017,0,1,384d70f04be6f056be700728d5c3536fe29f8288992f98442578e66816f83209,2024-11-21T01:36:12.443000 +CVE-2012-1018,0,1,e9e19ceddfbc2e7559a32d8047b34bfbd8e382faf362d3858519b9c1ed4cb461,2024-11-21T01:36:12.570000 +CVE-2012-1019,0,1,b81e2c9869ab04eb04a18dac3cee5ca1ee996e47f40c79b58c59dfc2ea9368b0,2024-11-21T01:36:12.700000 +CVE-2012-1020,0,1,6dfea93760457956fa1815a3d715948dd5c4fda44f2e967148fd9d638a662c69,2024-11-21T01:36:12.853000 +CVE-2012-1021,0,1,822ee0fb823736872d13287689f66bbc3b49034050c51c516dcb6efe28f08aa8,2024-11-21T01:36:12.987000 +CVE-2012-1022,0,1,647ac8d191dcb55f0ca7bb5fa54594f429b5daf52dd2897b2ac2c0c908952c93,2024-11-21T01:36:13.127000 +CVE-2012-1023,0,1,b8abc5c5b72f6e415ce12462069db027358d7f1b5974ec5d03bdd84761bd49be,2024-11-21T01:36:13.260000 +CVE-2012-1024,0,1,ce51ef86e53c48f87fdcbf21141575965938f60076c73072b8bb2b2f4df541c1,2024-11-21T01:36:13.400000 +CVE-2012-1025,0,1,4e2e969f7a60613332720bfcf9540bf1f0364973e22d62cc46c710de12fb04eb,2024-11-21T01:36:13.533000 +CVE-2012-1026,0,1,fde8808d2815a8a38ffed3c50add098e338e4272843f0732f0adedbe9495bc6c,2024-11-21T01:36:13.660000 +CVE-2012-1027,0,1,da183a02bdd565ed5fe7c3e88b82cdda46742ec6a88d6a57bcc86be5615292a9,2024-11-21T01:36:13.793000 +CVE-2012-1028,0,1,14c611504498b955c35150385aa575a8b0990cc04b925ff1fb7f5f5eba8b49c1,2024-11-21T01:36:13.933000 +CVE-2012-1029,0,1,0e7660d2a15afd062791e9a8b6b69702cf11722af63edf655d9738b076df0f74,2024-11-21T01:36:14.067000 +CVE-2012-1030,0,1,b02c50efda61f2baf57c55d7ed9af81ee29454206325486f359578fc60c2e2fd,2024-11-21T01:36:14.203000 +CVE-2012-1031,0,1,afbf298bcaaf7d1c407a3a64f88e337d6cf0fb2189e7f060d0739bc56b8c403d,2024-11-21T01:36:14.333000 CVE-2012-1032,0,0,e24bd4c23212e440768d87e7a67ad3d34cca83cee5438552a62d680e3f8027bc,2017-08-29T01:31:10.180000 -CVE-2012-1033,0,0,e98d479a1fce289ecf16a45c293b798ba05003e362c6610f75ee62a0a77cfbe5,2018-10-30T16:27:02.577000 -CVE-2012-1034,0,0,f4de061912e6b1ed97320cb49fc81c1a3ddfc0b4d65555aad51936a1b9550226,2012-02-14T04:11:16.837000 -CVE-2012-1035,0,0,86463f0a74da1ddc4f08432b946fe02592e9ebef2d8254f76ca824a5e86dfe88,2012-02-09T05:00:00 -CVE-2012-1036,0,0,1789c4da51a5f618d67fc9dadb6e7692289834ee78f8ca9c7ccdef6e364a30e5,2012-04-11T10:39:26.387000 -CVE-2012-1037,0,0,e73c5dd5a604e4522009d9d595163c9338ad7b9fe5f8a839a6801b3c5f09597b,2012-07-16T04:00:00 +CVE-2012-1033,0,1,a28794c3d12c83b57110259bd14add9ea44b9ee8c389a4bb69f2140377995743,2024-11-21T01:36:14.607000 +CVE-2012-1034,0,1,aed553be880d51962d5776a355fd475a33b159d04ff577bd775b1d5605771e48,2024-11-21T01:36:14.777000 +CVE-2012-1035,0,1,64f6249ecc9f7ae45934242d2d417385084b0b4c5dd8bd759df1c46f77948b81,2024-11-21T01:36:14.917000 +CVE-2012-1036,0,1,fb78a6ecfe66d14c154fa1fe8af85c42b2234b21b76ab900ea54892350c729b1,2024-11-21T01:36:15.053000 +CVE-2012-1037,0,1,709192f05710e504ffa240d4e79b60eac3c82b815ec22389ff1eb44ab0090db7,2024-11-21T01:36:15.190000 CVE-2012-1038,0,0,7e74fe85e0b03417fe5c0a23e64c97747e7913a758b5a87d2c51e49dd4389ab1,2016-09-29T18:35:07.783000 -CVE-2012-1039,0,0,5a2d15a31afa69c936651c3a1962e51512570e10f3d26bdf4d03117672a8e254,2018-01-11T02:29:03.527000 -CVE-2012-1046,0,0,35026bead57c6fd987b26dc404c3b82f61edfb95ae198388c7af12ccea0fe9dc,2012-02-13T05:00:00 -CVE-2012-1047,0,0,076e0bc52a40e88e82feda77188cbddb0195ddae4997f16efccab848ac7db655,2012-02-25T04:21:24.917000 -CVE-2012-1048,0,0,686e890b43372b28748eb4a797f856e3148ad8929e9e01254e5b5289eaad0e71,2017-08-29T01:31:10.320000 -CVE-2012-1049,0,0,94c44fae9a1aac1b1bdc73646db0a601a7384949c65d76727447abb5288ab9b7,2017-08-29T01:31:10.383000 -CVE-2012-1050,0,0,3267b169160ba32ab2c1901a883fa5183a2d4300954c94e421da10f7230e775d,2021-06-01T14:08:09.717000 -CVE-2012-1051,0,0,e54c140be6b823277a9451bac35d6473b2712f79ef58cfb686c79444a1ef4cb1,2017-08-29T01:31:10.490000 -CVE-2012-1052,0,0,ce1fe866330aafd6ef993d90fb4d16553e40e10fc44c14470e8674954ff205cd,2017-08-29T01:31:10.537000 -CVE-2012-1053,0,0,0b89a23798ab518bcf8f5e9a3f01d154acdc764114b1b9fd233db941387e3ea3,2019-07-11T15:09:06.720000 -CVE-2012-1054,0,0,5e05fa143b52729ecda36d90a87694d7b77916437d75e305bb702acc910677db,2019-07-11T15:09:06.720000 -CVE-2012-1055,0,0,c08c7200260f7bdb516adeaeae662f6fdc42399fc4bbbb6267b8427798c740ae,2017-08-29T01:31:10.757000 -CVE-2012-1056,0,0,971001588726621d2a34c79fc76d18d34933345e96ae1fd9a7fe3bf6274a1930,2017-08-29T01:31:10.820000 -CVE-2012-1057,0,0,e65b784322ee6f8013f79412a44e827431d39de78d210ab4c53dd472655f260f,2017-08-29T01:31:10.883000 -CVE-2012-1058,0,0,818f25613b43351ec947e8f2ad4266848e979a5243d78611b416c980e0e87a72,2017-08-29T01:31:10.943000 -CVE-2012-1059,0,0,157620dcb7cc50b26cd6a50b4de5c3c3cb7aa4a569c7a724f1bb61e3190e866e,2017-08-29T01:31:11.007000 -CVE-2012-1060,0,0,8949d26004266622bbe0026725d18b0613bbeccae28c3cb48cee184291992411,2012-02-14T05:00:00 -CVE-2012-1061,0,0,4d252e4919dbf35c5b4aa94f219a5e1f81235666fa1dd2b150892e8cd4321496,2017-08-29T01:31:11.070000 -CVE-2012-1062,0,0,ae634d197adaf8c7dd425551c8daaff7c8617360478f7df19d0ca304c4f1bf7a,2017-08-29T01:31:11.133000 -CVE-2012-1063,0,0,3a09f5ea16640d6466e314abe4dc03a773a37d5f43f57483fb03a2cdf172bca4,2017-08-29T01:31:11.193000 +CVE-2012-1039,0,1,8b492fa339c6131a4a2dd4dcb68d96bd4ab315ca545968d6c7f7b71f7566e1ff,2024-11-21T01:36:15.473000 +CVE-2012-1046,0,1,3c38bc78087266f4e1c224f1043ab06cfedd09a9063455d6ed5360fcd42d5a94,2024-11-21T01:36:15.620000 +CVE-2012-1047,0,1,bfea6c41025895445883d7f38cebb408ba1470a5f4116a87ed591fe999d2d0df,2024-11-21T01:36:15.753000 +CVE-2012-1048,0,1,5d1a191fb820d5709bccaed0ef0cbccde9f3b46521d17247de46bf4892c6d33e,2024-11-21T01:36:15.890000 +CVE-2012-1049,0,1,7a6a13e467f60a60075373534b51469b7ad679b7e49e5d23f340f90305f31938,2024-11-21T01:36:16.050000 +CVE-2012-1050,0,1,1959d390554f95ca46db004ea2897894c2e8cf0253effac45a0dc8c4afc7df74,2024-11-21T01:36:16.210000 +CVE-2012-1051,0,1,3fa87a7f032104ffc8c190bedc2022d98934eee7754085b37d08a9c90468bf27,2024-11-21T01:36:17.223000 +CVE-2012-1052,0,1,4ba8213685446e0e0d312b3647fc7da958b08481aed1cad887e1098f243b4aa1,2024-11-21T01:36:18.143000 +CVE-2012-1053,0,1,d33907dac423b6ce79202f70841caabbbaa355abacb7b860c0496f3d08f88174,2024-11-21T01:36:18.293000 +CVE-2012-1054,0,1,3fb9997d7600217b05b244d34bbdd9336f28976e5006052971498fa208053441,2024-11-21T01:36:18.460000 +CVE-2012-1055,0,1,7f4a015abae9560b9e899095d0069f40e9026a74da8ed068a2f939e235a2342a,2024-11-21T01:36:18.627000 +CVE-2012-1056,0,1,bc3287c30dc4059397a443aae9818522ff251140adbdaaddc2c9ca1f8516d068,2024-11-21T01:36:18.767000 +CVE-2012-1057,0,1,8d3804adabdcace6e692861856ec77a4264f009b6d5ab9104ae0f207dbd39d6d,2024-11-21T01:36:18.930000 +CVE-2012-1058,0,1,102a114661ab23998f961984b06fcb019ce52048deeaa58ab619879f2683f9aa,2024-11-21T01:36:19.083000 +CVE-2012-1059,0,1,15c3a4ba1959109b1084201afcf6ec09426fcce5eacae6ea6700875e34d79600,2024-11-21T01:36:19.230000 +CVE-2012-1060,0,1,1fe9154d81bd6219879f2f1c934d8b28bd98c26c6cf6ec03d6708942102f63e6,2024-11-21T01:36:19.370000 +CVE-2012-1061,0,1,7380234ce209afcaac1a9cf440e101d118c3764c67d46549466a5cfb313c9758,2024-11-21T01:36:19.523000 +CVE-2012-1062,0,1,80db20db5ee69e80e82b961ce060e73f577a6cc011a57bdf94dc199a6ad45166,2024-11-21T01:36:19.667000 +CVE-2012-1063,0,1,0aca14feda3d90102578177a99cd6c2b619b3a43e7a35cd22f9761f6bc0c3f8c,2024-11-21T01:36:19.813000 CVE-2012-1064,0,0,ba57365bc66c4ec574676ca1206f84ede9775ad26288581ed2523e2c07a061f1,2013-02-07T05:00:00 -CVE-2012-1065,0,0,cb8229982fea5f27021552307f0fcc8316e76de75ac96993f79c5a2710e890bf,2017-08-29T01:31:11.257000 -CVE-2012-1066,0,0,3463e6046d96f914de8536d6fbba82948f3d58c4c0a15b94cb555f6a3c68b72a,2017-08-29T01:31:11.320000 -CVE-2012-1067,0,0,0150059c2aff26f64d67c2266edcf51de75a4e510b57ddf343e89f8d4eb9b5b4,2017-08-29T01:31:11.367000 -CVE-2012-1068,0,0,8a046ec9bc507156a22360f45b9757bdf549bcbd4b755a0426150989926ac006,2017-08-29T01:31:11.430000 -CVE-2012-1069,0,0,c523af2c85d29662494fcb1fca0e5c7ef8d000d1f99ef950557ddeee9003e2da,2017-08-29T01:31:11.477000 -CVE-2012-1070,0,0,08b9e7fa127e2b9e359ac4ddbfb1abb1667f2d8c10f582395876366ca9cf2e50,2012-02-15T18:18:50.737000 -CVE-2012-1071,0,0,d287b5643bf2e1810b47ab6c0e5610ab0679308a2d93612686fd9be6f09d231c,2017-08-29T01:31:11.537000 -CVE-2012-1072,0,0,6258b667a6b2fb2e184b343cce8a4e3cbfdf192e37795067f7502ef6686d3b01,2017-08-29T01:31:11.600000 -CVE-2012-1073,0,0,1c56773ecb59777a7846697bcd4ebc74da797352e01c5ced7ed2123025f6b418,2017-08-29T01:31:11.647000 -CVE-2012-1074,0,0,bbf3bac30718c62d69e0148eeeb0f3cf6520e5c5f3465ce8752f463d98a83b7c,2017-08-29T01:31:11.693000 -CVE-2012-1075,0,0,1d16cddc4f397440b6ad7f37a784453cc1ae33761e4a58a6861a32ef296daf84,2017-08-29T01:31:11.757000 -CVE-2012-1076,0,0,25a23bb2d1f5535f41d212faf354c28b4ee2c418604c9e9fcd1950163d616ac2,2017-08-29T01:31:11.803000 -CVE-2012-1077,0,0,c33e03678c45e83fcc2fd0ff949911231bc21d5cd28e07f3be4cd1e57d0f35dd,2012-02-15T05:00:00 -CVE-2012-1078,0,0,91440b34b502dd5bc79d13d2b3de1084631f1b169f45cd9f5ffe82ab135d0ac3,2017-08-29T01:31:11.867000 -CVE-2012-1079,0,0,ae33aea7a3515fe3932481eec09fe8dd5646f878cce4574695aaf6fac1326b9d,2017-08-29T01:31:11.913000 -CVE-2012-1080,0,0,f13f1d8e1b6a98810326227f88cb85932a6fbded075a19043f46cd7b15e11aff,2012-02-29T05:00:00 -CVE-2012-1081,0,0,7f0affde2695ad78b7b52050b06a8d66d379ee6a549e2503a1adbc203795eddd,2012-02-29T05:00:00 -CVE-2012-1082,0,0,016b750a09506e4fc8712e98ccfae6d9aca10faf5eb664650b902ba520feaf28,2012-02-29T05:00:00 -CVE-2012-1083,0,0,48f39f2d68d763137c299702571ad9844655ad9a9d96864d439f7e608f1494ed,2012-02-29T05:00:00 -CVE-2012-1084,0,0,08d1889847818758e6d47bf7ae93ff347d324fe21f0a6e76137e319147c9cfda,2017-08-29T01:31:11.977000 -CVE-2012-1085,0,0,97a7a103b5e5605c957664da0d74e8aee7f7e3cc323b86929be751ef96210dd4,2017-08-29T01:31:12.023000 -CVE-2012-1086,0,0,91a88b550cb1845deb21f653f67d27c9fd357a67e314f453f4bcb112845fa428,2012-02-29T05:00:00 -CVE-2012-1087,0,0,eafcacd2202b7936a04281e38060f2c3fbeb3e0b8f7f50d510e55058721491c5,2012-02-29T05:00:00 +CVE-2012-1065,0,1,2c91b52d3c3d94dca79b61f94d9d5685411e2fbecc9c80912116c7e17affe9d6,2024-11-21T01:36:20.093000 +CVE-2012-1066,0,1,23a4dcc2dd347cc60f85e0c27efb104e3b445bd803a64e75e05decfac978e936,2024-11-21T01:36:20.257000 +CVE-2012-1067,0,1,bfeb457274344c23761d1f4a3df6976f3582ae971c1f8c99a005aaf0388d14cc,2024-11-21T01:36:20.390000 +CVE-2012-1068,0,1,d6c3d1f238a7a9e9a89349ff4f8d1b776cccd4574228c417c306abdb3af18bc2,2024-11-21T01:36:20.533000 +CVE-2012-1069,0,1,783d6152ea745580673c747483e3a98e0ea862747ee5ecab8315a3986c8d9456,2024-11-21T01:36:20.680000 +CVE-2012-1070,0,1,166c35dcbde2a0439f442f86a619b46dfa26ae6276c6c0babe3b4238db60dd64,2024-11-21T01:36:20.830000 +CVE-2012-1071,0,1,2ebd6c5d176f6e4205a06fcb1b83c32232b892f9203b19d658b596b25cb23b9a,2024-11-21T01:36:20.963000 +CVE-2012-1072,0,1,f915d493e4667739197a8a839a99fcac24758b6a17723c4c2dd0ef7c4efd6e07,2024-11-21T01:36:21.127000 +CVE-2012-1073,0,1,2886cca37e5346c999a135874a9b2d2dbecb1729159d0f13c6595825359207d9,2024-11-21T01:36:21.293000 +CVE-2012-1074,0,1,26e44053e4f33d48ad0fa30503df3be4304d655dab824d6a26230252bfe809bc,2024-11-21T01:36:21.423000 +CVE-2012-1075,0,1,b84879a0afd39af773e4825feea694ef34d155b2bd7be1534c446e5456ccfe0d,2024-11-21T01:36:21.557000 +CVE-2012-1076,0,1,a9b05a4ce918ae2ebf1f125c1f551fa0fa4b33bcea062e2e2a0b00ccbb48bcfa,2024-11-21T01:36:21.693000 +CVE-2012-1077,0,1,bc2001fd252b6b115d91e4c1f7d58208042bcbc5875c2eb63aceb1c45766c50b,2024-11-21T01:36:21.830000 +CVE-2012-1078,0,1,269cc41459d2f8b2c520dfc019847fe8511141eead3ae708cb6d825e9d542cbf,2024-11-21T01:36:21.960000 +CVE-2012-1079,0,1,77bb968954de277cc2d43fb316aeb21cda13d1c2d34b7bc791f7c4bf9434b5f9,2024-11-21T01:36:22.103000 +CVE-2012-1080,0,1,1f62aaa7cba03ece7ce510543f545ea28cd1f566498bfd797caf515ecb207391,2024-11-21T01:36:22.233000 +CVE-2012-1081,0,1,b914079e304974e7578f19cd7302573e4b16e86bf8cb1f8343832ebf76f9aa30,2024-11-21T01:36:22.367000 +CVE-2012-1082,0,1,aa99633e0cffc2a52212f912317f627d20dafefd914a20bfef9109cc0ea0f296,2024-11-21T01:36:22.500000 +CVE-2012-1083,0,1,55f1b459cdab18f3b2f772c609fa9de92e25cb95e247def2a9680f3250877aa3,2024-11-21T01:36:22.630000 +CVE-2012-1084,0,1,78a894eeec3984d90383d8d1d2638bd1207fb80e9aa10fcb64eed16318d1b252,2024-11-21T01:36:22.757000 +CVE-2012-1085,0,1,1d5c4a9a52303d18211285ed18afa28c4f7187e0d85192b3bea5ef92701bae0f,2024-11-21T01:36:22.893000 +CVE-2012-1086,0,1,4fd3b21b3149d80a0be762d4adb418c14737ad4e183686b2ba569ab07a20c8fe,2024-11-21T01:36:23.033000 +CVE-2012-1087,0,1,ef7475bfa4f6b07f2d3cfe45b9e8d0c84c6c990b9d5470bd4c3765041787ea9f,2024-11-21T01:36:23.170000 CVE-2012-1088,0,0,a4e216b12e10844fcdde69fc94db18a47cdd434721e902d563864bf509d0e181,2023-02-13T04:32:54.550000 -CVE-2012-1089,0,0,1e71c4484338b2b7f669c0ed7da7b70b7b99ef618ea40d8141358c8f1e40fd75,2017-12-13T02:29:02.547000 -CVE-2012-1090,0,0,54ce8a4e5dcc86dba4e7da6dbd5bc440e031c1cc21ca3c62fbc1a672e27c69de,2021-07-15T19:16:09.750000 +CVE-2012-1089,0,1,b43fce994a3fd6e75d8800db988cb620149e1a3ea063e69daabd3af2cb29137e,2024-11-21T01:36:23.420000 +CVE-2012-1090,0,1,c64e867950cf848892a2f88ecc802c6886d385925c93b7ec1a1ee1803ed6a077,2024-11-21T01:36:23.570000 CVE-2012-1091,0,0,836536415ffc07699011b7a1362f667c4ac0e74eaabb6dde5ba186de478ef2a4,2023-11-07T02:10:12.240000 CVE-2012-1092,0,0,3b3cc0bf71a38cb6fd798eba55d43f44b223ee38bbe0b42cac0fd85c5d751a4a,2023-11-07T02:10:12.473000 CVE-2012-1093,0,0,87b562e4cdfce85398ca0270f9d18481f72b82818e6cc75d6a48eb9cc5fe452a,2023-11-07T02:10:12.693000 CVE-2012-1094,0,0,d299d89b4f81e7fa03abef417b95141546da3ab9659010c53a0518ae1d9c0ed6,2020-03-10T20:57:31.657000 CVE-2012-1095,0,0,58e93f606b2c11f94cd92b339666133a4273fa1fae7549c30625e2e70396b373,2018-10-30T16:27:33.653000 CVE-2012-1096,0,0,f2ca067a3719af9103d1f1ed6911accabc51ddae6b4014c01c5c8110b8b49259,2020-03-10T19:45:45.800000 -CVE-2012-1097,0,0,d45e6ff308b29d7946cf8fefe91e6e034b8942bb2c448051e06f960781f352c6,2023-02-13T04:32:55.757000 -CVE-2012-1098,0,0,d69a94c84273c12234d03770830fa8428ffcac82965740f199cef4b10c175a15,2019-08-08T15:42:29.590000 -CVE-2012-1099,0,0,1998747390cd1156e4a31296d0013cc6a16693998fef6638dd53568867e68ea7,2019-08-08T15:42:29.590000 +CVE-2012-1097,0,1,8d2df051d8abc140470831c2656a02ccbbb1618371d5a1db7811c31c50597b60,2024-11-21T01:36:24.783000 +CVE-2012-1098,0,1,02b5a6660c1b6612d9af2b068956c7953a8422596bc748b4b0d73e0615fb0db3,2024-11-21T01:36:24.913000 +CVE-2012-1099,0,1,a50f3a0e5176811388728d5c3933eb28afeb03b0fa12350dde6cbce92d9c9ba8,2024-11-21T01:36:25.073000 CVE-2012-1100,0,0,9509172daa4cc5160d13815b1ba2f5243a47a2e782749b203a7ae75021b084ab,2014-02-14T19:19:22.383000 CVE-2012-1101,0,0,ef66cfd4ae9458dff227938bf4a4fcf592f2df028553a7d1d76ec52446583154,2022-01-28T19:12:14.023000 CVE-2012-1102,0,0,15181e9fc527eb3b3f0cb6531fb236b4aa1e9d1a8c4ec67420b4db5edfefbb07,2021-07-13T15:21:08.517000 CVE-2012-1103,0,0,6069f2c293418eee68d7ad6c88abc1e71709c461b29dfff481af0cabfd182dbe,2012-09-26T04:00:00 CVE-2012-1104,0,0,3b12c2b014e8d9f3955f74097a77daa262c17c943beb9a9d9503ab0b83324de8,2019-12-30T12:59:20.843000 CVE-2012-1105,0,0,1210dc4eb0c67c2a0647569e4957eac426c857be03abece68706e0191ad8418a,2019-12-17T21:27:34.320000 -CVE-2012-1106,0,0,bcb5617690f707455b1d8f4dc45bcede042507f6787a7e61ac92da2e4ff802e4,2017-08-29T01:31:12.180000 -CVE-2012-1107,0,0,4daa2488a5513e19d8a384dffc258ec9d91824212b4de9d9f3238a05cc398820,2017-08-29T01:31:12.257000 -CVE-2012-1108,0,0,b50eb3b1ea017f5526004fd8c28985e26d86b5e9c4db884d1c7255d6ca9786bc,2017-08-29T01:31:12.320000 +CVE-2012-1106,0,1,97223718c746d0f493bea05a4b0f24031e518c8d7d3a181a129372bdc71ead0c,2024-11-21T01:36:26.500000 +CVE-2012-1107,0,1,dc449f900c2c3b5bf9b0865d0a15fb8cf7f90a55b44e745bb5c8d1827c199c61,2024-11-21T01:36:26.627000 +CVE-2012-1108,0,1,c0bed04a93dcfe32f5646d770310ec1ba9e92c5902a9b21a7d026d2e2189b975,2024-11-21T01:36:26.763000 CVE-2012-1109,0,0,247fc508eb01ea5a619550bc02473c462d63f09b815668304e21ffceb394556e,2019-11-14T18:32:06.697000 -CVE-2012-1110,0,0,f60d02602e1be760634fd91257c9f5e86557756862d374fdd5b1a4d85c3cb899,2017-08-29T01:31:12.367000 +CVE-2012-1110,0,1,abab66165d8854b3630fa6d175f13ea59a1afc156d5e57542c48453219919fac,2024-11-21T01:36:27.003000 CVE-2012-1111,0,0,829a2f7ff7cf769a905d684c838299d6bb7275c19a28cae57a239a4e58df0985,2014-10-29T01:10:29.733000 -CVE-2012-1112,0,0,4fd902b8044f2b5a60a7813b1c4403baf0654f7ff85d90767435806930063e19,2017-08-29T01:31:12.430000 -CVE-2012-1113,0,0,93a7dc6953647ae3f87b741f0c498a335e101761d2df48a3cba52bb15ed31f53,2017-12-07T02:29:10.413000 +CVE-2012-1112,0,1,c0e230730a988c06cbee8f098e625960a944bb18738c2dd9dd855c440c841392,2024-11-21T01:36:27.270000 +CVE-2012-1113,0,1,e9e5170a047a8e347d95595b8b06c17c754c3ba14c041fa1f5837798f55ac0bf,2024-11-21T01:36:27.393000 CVE-2012-1114,0,0,ae64df18e3c2e0077d4e5adabb5964685851e6bca4ab0ead1916e14eff37b62c,2019-12-12T19:02:37.997000 CVE-2012-1115,0,0,dd451ba0232dd98cc79be90f247128db07e5fdfc582542b7a6877347efca902a,2019-12-09T20:20:42.983000 CVE-2012-1116,0,0,577af356519a60c1b3c9269aba0cdcb483cf2d39aee3e2fea9d3a1adc5838b39,2017-08-29T01:31:12.553000 CVE-2012-1117,0,0,83b73616d0152d7f2acf4081dd276f2894f0834f6de53566937d55f6ac0d7401,2017-08-29T01:31:12.633000 -CVE-2012-1118,0,0,31f5efb3d53cd94e04477176b5a37fd82d329bf9e646e53a2d6d9c25daa09706,2013-08-27T03:21:46.090000 -CVE-2012-1119,0,0,2f15e45a0073eed614028970ca57ed92484993ace1c2d746da2b51919621536a,2021-01-12T18:05:59.507000 -CVE-2012-1120,0,0,d4c01f74797c7de9e2b9b1f350da707eff239a00b47955c085ba9ff2de26ecd9,2021-01-12T18:05:59.507000 -CVE-2012-1121,0,0,ab7096023905cdb3dc3d3f9e379f84d0fdd36c6d79bf1365baedb306c7060ab0,2021-01-12T18:05:59.507000 -CVE-2012-1122,0,0,ecb42e2cef3b43b41bdd512ca44149d9cc8e22d02d0039df04946dbead8394d8,2013-08-27T03:21:46.477000 -CVE-2012-1123,0,0,ee55eb8beb4c3729c74d43761b9160c5beee4582415284bd07165ffa8598b6c9,2021-01-12T18:05:59.507000 +CVE-2012-1118,0,1,f86cd8d401ab051c5e95ba9641ed6775828cd91e3f13665df71ba5fcf23dd2b9,2024-11-21T01:36:28.333000 +CVE-2012-1119,0,1,32a25c7074e564e570a71e565122b9281d8d608402f2d19b656d96b5cb630b2c,2024-11-21T01:36:28.453000 +CVE-2012-1120,0,1,5f1dd4675ebbea0d0bea32a337a0774c95fb1e2b8843588cd47d08290dd39d97,2024-11-21T01:36:28.583000 +CVE-2012-1121,0,1,f03f5ee6e5f3bc9244a3a386c6d936cfa096e831e59a9a51844305f4b0c7aead,2024-11-21T01:36:28.703000 +CVE-2012-1122,0,1,316af558dc554562a27381dc78c1fe72bca18e12fa40e1a41d598bbdc5381c5b,2024-11-21T01:36:28.823000 +CVE-2012-1123,0,1,ec9b28db0e0dc26ce3c7893044055fc882518af99bf50b7383394caa00e3a521,2024-11-21T01:36:28.940000 CVE-2012-1124,0,0,79751e906652e6e0e25a762240c08a0a3661e4b5a196c10b94af8388dddb90ae,2020-02-13T13:24:02.090000 CVE-2012-1125,0,0,333b83b238227e338bd7c8abcd2a1c66b73c076258f1dc3906dc671f03b0ba66,2017-08-29T01:31:12.693000 -CVE-2012-1126,0,0,10ec7465dcbdfb22b177ae5d0a6a97fd72bf0326aa2cc05e4ae9a66c7c0a15ef,2023-02-13T04:32:58.693000 -CVE-2012-1127,0,0,6ae9c438bafdb078f78f7c29484b5eb7eec3e5e844b048272278d0f008ad1c72,2023-02-13T04:32:59.470000 -CVE-2012-1128,0,0,2918ae53c6e45cfc58e4783e462c11c3d1954bf70806e2f152ab1cd100732a01,2021-01-26T12:43:34.040000 -CVE-2012-1129,0,0,8aa5969a4c688d00db3803cdc71e3931edced661870503bc05c5e87d8d4a2c04,2021-01-26T12:43:34.040000 -CVE-2012-1130,0,0,7715dec918656b153ed44ed8dcc1a229402adfff397feb7024f27683b3e523ed,2023-02-13T04:33:00.570000 -CVE-2012-1131,0,0,b7a9cedfe79298af593c4b7d5afd5a4bacd0246b99e27b64306ff3fc77d63d19,2023-02-13T00:23:21.923000 -CVE-2012-1132,0,0,2f80cfd975c46b376a4f3dab28864cbd00d28a5dffdd57b957959142a66d85f1,2023-02-13T00:23:25.037000 -CVE-2012-1133,0,0,4ca1941b1f3514497d7be7559a9265464d46e72277e9cc968e4362f4b46263ba,2021-01-26T12:43:34.040000 -CVE-2012-1134,0,0,7f43e906c7acc163f1c8a8a09a31df6e368ce6527af9ca8a8679a79bf421f0ac,2023-02-13T04:33:01.747000 -CVE-2012-1135,0,0,6ede58b135b977144b759d411f67058ab6a5de846aa91401de82068b7cb45c2d,2021-01-26T12:43:34.040000 -CVE-2012-1136,0,0,3651edf60c00b3ffdb68404f7f7fadfa43e843668b998c3511199c3cb493d5dc,2023-02-13T04:33:02.933000 -CVE-2012-1137,0,0,a6b45684b390807f12403d7b1aefbe43c3ddbe52ed138360060709cda6268972,2023-02-13T04:33:03.947000 -CVE-2012-1138,0,0,079e22197e48ac04f63462a0650bf6d1f3b706620576c89c1159cb9608c02b9c,2021-01-26T12:43:34.040000 -CVE-2012-1139,0,0,e62893c19af329b3e51f943495bb442001718290e90485847e19fa72325d6521,2023-02-13T00:23:25.857000 -CVE-2012-1140,0,0,379cc394717effec1a57e4a6e02a7b6e34470c3a93936b25e98af17bf2ca3d34,2023-02-13T04:33:04.987000 -CVE-2012-1141,0,0,33836612553349452e3f5d1b4b95d8ccad8ada6c416244c112df147054045e7b,2023-02-13T00:23:37.737000 -CVE-2012-1142,0,0,ce0f011ec766be5be7bb9fef16b85f28ae4b66034d549c6c5ce24d408b2cdb43,2023-02-13T00:23:39.990000 -CVE-2012-1143,0,0,7126aa42a93b9829c881c1501d591661002f168dad72fa72796a96f8f81bc4fa,2023-02-13T00:23:52.013000 -CVE-2012-1144,0,0,b6bf2ac5f28b9dc618ffde5c978a949a7c67f51ac70d889e8d05b9644e42c5bf,2023-02-13T04:33:05.753000 -CVE-2012-1145,0,0,00671becf4bf0c8601a9472a6887542bd9c9bc801c193c261826c75465ffead3,2022-02-03T20:00:08.163000 -CVE-2012-1146,0,0,c6ec93c8e3a96c29c04b52e79f80129497e16a3dbfebd6da44eaf5b85e48b5eb,2023-02-13T04:33:06.237000 -CVE-2012-1147,0,0,3f3ba7b947851921f8ab2307851a7d11f162720d755d85885de004d7ae430b29,2021-01-25T15:44:35.543000 -CVE-2012-1148,0,0,255eb4da726bb352387eb0d8a0b2ba6d1d16a9878b8298bf538caa0b381b0188,2021-01-25T15:44:35.543000 -CVE-2012-1149,0,0,55af12ad4e62cad9d7daee85a7f22b7bd32883d78f3c8ed5c6c8235187d96a34,2023-02-13T00:23:54.857000 +CVE-2012-1126,0,1,024a2664e97e3c8d9a1944b218bab65cb2e7e90465b8495810956f2b5708fff1,2024-11-21T01:36:29.280000 +CVE-2012-1127,0,1,12b2136de8fb00f905b247ca222169af71e267ee9064a69120794f1b82e611c1,2024-11-21T01:36:29.407000 +CVE-2012-1128,0,1,56cf81031121c526edbdb54a87bc67325fe558fd015c1a79628c6a7f432140a7,2024-11-21T01:36:29.537000 +CVE-2012-1129,0,1,0c719cef651b5e9cbb5c20b36881d429936d3ea82b35bf84cf1b5ed8472053f2,2024-11-21T01:36:29.657000 +CVE-2012-1130,0,1,927fd85c5d2717f66c7fc8130ea7149b63562b238c905b9adf1fa3972678d70b,2024-11-21T01:36:29.787000 +CVE-2012-1131,0,1,911f9de74a30fc1c03ce71a8d64a906343b4481b14d8ef156c8552140cfa8e3b,2024-11-21T01:36:29.920000 +CVE-2012-1132,0,1,d7fc87e20e22e363dcdbaa414b32ac9ca09b5985b72253f99c9c2e40c21fb976,2024-11-21T01:36:30.063000 +CVE-2012-1133,0,1,24feda6ac6383dc81bbdd80665f8cd7a290dc4fa0cc104585979258c78641137,2024-11-21T01:36:30.203000 +CVE-2012-1134,0,1,3699ac395908a6229d68f44a735f9c4f3130d04ae6bcf12ae60d41ebe4bc82b9,2024-11-21T01:36:30.340000 +CVE-2012-1135,0,1,41215396cca0c23ca71977f54b079970ced7a08715604b3bff9788848a89a897,2024-11-21T01:36:30.490000 +CVE-2012-1136,0,1,b6231bed735835a61e26870db831bab6e94e38d4ad42d813e6c2868a2b940abe,2024-11-21T01:36:30.627000 +CVE-2012-1137,0,1,f7548cade869c846dfc3a21fe95efc2aa2426723fb477fd55c89cf165f34a189,2024-11-21T01:36:30.773000 +CVE-2012-1138,0,1,2aa6c019581e804b41d467821fdd0f4aa9d6114111f85d1d2e156632d597bdbe,2024-11-21T01:36:30.910000 +CVE-2012-1139,0,1,e1aa3e7f70a28bb96c5d18b02f57b43a32c838790a0159becadec3b3b549c92b,2024-11-21T01:36:31.050000 +CVE-2012-1140,0,1,791214038ef42c765fdcf65c4da80240ff7d123709ebb37e52f31e998627aae5,2024-11-21T01:36:31.190000 +CVE-2012-1141,0,1,faebb41a8fb90e761271495850746d41726cada496d7cfab184f32db64c69af8,2024-11-21T01:36:31.317000 +CVE-2012-1142,0,1,b7499c9a48f7119732e77c1355134a3ff23ae761de1b521112d052e0de66af19,2024-11-21T01:36:31.487000 +CVE-2012-1143,0,1,f102cf5165c061c10e873d7a076d33de6bbf9fa46ba9454b8d24720d73cc2389,2024-11-21T01:36:31.630000 +CVE-2012-1144,0,1,2dedc2bc9ae8c8d5b45f3e50dab57434379af1ffda3960a316a2ab9e97683129,2024-11-21T01:36:31.777000 +CVE-2012-1145,0,1,b508e92a709f90cbd315e2a9dc7730b615fd852445dd3aab3e57cbed3424c9f4,2024-11-21T01:36:31.910000 +CVE-2012-1146,0,1,c5de2d04dab71f5134d8ef74564f6544464861d2a289f2b53a82ac45225b8d65,2024-11-21T01:36:32.017000 +CVE-2012-1147,0,1,9860d4e0a6142075b1d8ff6cd14c9a6cb548387a41f283b0b9bdb00bab8f0a64,2024-11-21T01:36:32.140000 +CVE-2012-1148,0,1,b805f46d63a3141a41fc4e5bfa98c1ecd094ac8c75f2eb33f385b818191c3b23,2024-11-21T01:36:32.257000 +CVE-2012-1149,0,1,261c05446e9f5fc84b7611581da126daee8ec1c92139f449a6cf0c581966b1b2,2024-11-21T01:36:32.383000 CVE-2012-1150,0,0,0bd691b2448b4e98186eb5f801b48b9d1950a4d5e1009b59eec11cc6dbae0330,2019-10-25T11:53:59.117000 -CVE-2012-1151,0,0,4fa2edada667fd4726cd686f8e02e9cda7ed1aa3d0a7f83ac89891ebdc6f8c2e,2017-08-29T01:31:13.287000 -CVE-2012-1152,0,0,707ff0068f8c8e54eb2e95f505ccdfdafa193ffc2403e770ac83af6e338fa981,2017-08-29T01:31:13.383000 +CVE-2012-1151,0,1,f113d4f7dc02fa35be7bb692a571d52eb3883ac02e9c5f176597edf46696ac07,2024-11-21T01:36:32.673000 +CVE-2012-1152,0,1,829635ff8638c270c86e9efd14c3b09930a41029398cfffe9f35f9c4aad94e02,2024-11-21T01:36:32.807000 CVE-2012-1153,0,0,01dbd656bbfa10640a402a9fe1dafad32b7486b062401ae4c8a634beeb8f77a1,2017-08-29T01:31:13.430000 CVE-2012-1154,0,0,af363b7bf2805be39db4d11c07ed2b2081a8fc8bb7f0f35121f53cdd86f07808,2012-11-08T05:00:00 CVE-2012-1155,0,0,9810f712d7104b70bbecbe20ea31148f7c723420ad0dd4776af16a1118da0ded,2019-11-22T18:44:24.030000 @@ -52921,275 +52921,275 @@ CVE-2012-1158,0,0,6cd0d951823d72d07f8b27c44b1f3da6fc2e085c94c0ea131f51dc35fb670c CVE-2012-1159,0,0,582bbbe7c07ba788541074854cf557696335f9c8369f095715a24be7aa184fd4,2019-11-15T15:55:26.417000 CVE-2012-1160,0,0,005b08d2560c7cdb70fbf8ff6e27658ab13340a1ec9e7b18a4cce85a1c9c2c15,2019-11-18T15:13:06.407000 CVE-2012-1161,0,0,a49877367ad93403c9b79154ae72b2a74017942f85d5e4b929a6f84668dcf5b5,2019-11-15T15:51:49.643000 -CVE-2012-1162,0,0,4b8d0d7aa0a5f524260c23875ca91becc068540dab2ad78c0b2d1ef3f090ecc2,2012-07-13T14:50:48.640000 -CVE-2012-1163,0,0,ae11d1b622246c2268e389c40eebd64a9aad022ff5409633c9df42b427794fba,2012-07-16T04:00:00 -CVE-2012-1164,0,0,f1743974266779f74ea329053925abb811c3f43fe0634736144ca2f1e3204d93,2017-01-07T02:59:04.543000 -CVE-2012-1165,0,0,303f8062ec0234b44cdcebb5b04ac415004e641d9e9a1a1fb29921d6545f5058,2018-01-13T02:29:11.537000 +CVE-2012-1162,0,1,f78ebbb40ff26f1e631ed8e10438759a56e9e79c121d0fbc0dd16b5a93573180,2024-11-21T01:36:34.033000 +CVE-2012-1163,0,1,75a3fcb99ea2bebaafd0e6aeb07eb1eeb267bc80ed411cfbef750db6b6f367d4,2024-11-21T01:36:34.147000 +CVE-2012-1164,0,1,a2f05af24fdfcc43bdedafcbfa0b19feb61c75b4f85362ec3d2a3cd1d4b947bd,2024-11-21T01:36:34.260000 +CVE-2012-1165,0,1,3f29038059b6ce79ca535c5bee4185bca0fd8ec612ff74a97f1abe42af805054,2024-11-21T01:36:34.397000 CVE-2012-1166,0,0,e57a173064991fc32e11e11651134cb9dec41df0ce8647e088baa757bf682432,2014-05-31T04:09:22.870000 CVE-2012-1167,0,0,9784d461a2f452273e65e99bd2e700f8282f004b19c93cc6c867711106f4dde0,2017-08-29T01:31:13.507000 CVE-2012-1168,0,0,3af852a56bdbc4096ac29985078894644d610fe74121e71f533da893a3fd888d,2019-11-22T18:32:38.437000 CVE-2012-1169,0,0,40fa9f2e9fad03d078f8417b1e0a44fd79a9cd7c6c9a0173ff7d558f19e64a40,2019-11-18T14:46:21.657000 CVE-2012-1170,0,0,56300907cc738a809d14d3a06bc440f6c237818fe7f9c177a1b6604d91f4a55d,2019-11-15T15:48:21.820000 CVE-2012-1171,0,0,37d0528527349c103f7cd657903b162d9a7908c95b3809c7eac97566af07bf04,2014-02-18T18:57:53.637000 -CVE-2012-1172,0,0,abc5320687bac6531727d32e24e516b4ef1d8d0a0e7a1fa63bea9d340b78a7db,2018-01-18T02:29:12.023000 -CVE-2012-1173,0,0,19f6dc42e64ee535fbab338d8b1fcce968f9ec7b8154512b95cec103b72ce0f5,2023-02-13T00:23:58.090000 -CVE-2012-1174,0,0,4249acd2c0b50d014f2550b5b94fa7983ae46dd8b9efc20b7ecfc0981acd84a9,2012-08-14T03:35:28.973000 -CVE-2012-1175,0,0,5cf562073a9ef7b49ba72c7b767a2dec2046253cce81d3441cda1a9b58193fa5,2012-08-27T04:00:00 -CVE-2012-1176,0,0,e68db93a04393d67fd226edb68aed5b596f4b0958d670c7c912f5c6c0a1d0a8b,2017-08-29T01:31:13.647000 -CVE-2012-1177,0,0,a44399d63ce40f54cef70762b5042ffde67d0b4c36cda4a8190ea6378ec87ecc,2013-04-05T03:09:06.800000 -CVE-2012-1178,0,0,1220c562f792dcd8302aad9168f63faca132680943dfd4edf96ee54508a163be,2018-01-18T02:29:12.240000 -CVE-2012-1179,0,0,adaad6361372469105c89b5f0946c70461447e09a66631b49c5ee60f49fe2616,2017-12-29T02:29:12.957000 -CVE-2012-1180,0,0,f4f55282250e889791ca5c76e90252e7cecc76a2efe8094036256c7b935068ac,2021-11-10T15:57:01.280000 -CVE-2012-1181,0,0,14bb59d3ef3a291d4a4d894c194534e04ecd500a95e1d6159595578dac7b3cc7,2017-08-29T01:31:13.867000 -CVE-2012-1182,0,0,f1cfee3f12b523c2ec7ad75e8779cd46b9dcbcf81fd9b70173a2f5039ee00f4c,2018-10-30T16:25:59.730000 +CVE-2012-1172,0,1,ced465fbe0651694836abbb6dd75e6626e1c2bccf55b2ff031d8e3de4986455e,2024-11-21T01:36:35.330000 +CVE-2012-1173,0,1,cce977017a8f030f1745262fcb2c65920a636081beb95c353fcf713c16d6f79e,2024-11-21T01:36:35.487000 +CVE-2012-1174,0,1,c15f7544f18380061a210965b72002eca661d209cc7d91eefb093ac5f72df64b,2024-11-21T01:36:35.637000 +CVE-2012-1175,0,1,47daf62ca1e16b1241c984dc7351b883579a0b476cb983625d27125baee7aa72,2024-11-21T01:36:35.750000 +CVE-2012-1176,0,1,11c5c90c40e392af1920c0c26761a747acf7ba564ba8e56cbe9da6e8d531000b,2024-11-21T01:36:35.870000 +CVE-2012-1177,0,1,6e877067a3f02516f92080159c746539b616215bb3d101668689b67bb3f9b9f3,2024-11-21T01:36:36.003000 +CVE-2012-1178,0,1,5a7da3582bbfc15ef01f911d50711e47219cf94a610d075c5c4289f91293db52,2024-11-21T01:36:36.127000 +CVE-2012-1179,0,1,8acf9fc0a1959235e68a3dac0582014531903e90642980a328cf55701fc162f3,2024-11-21T01:36:36.260000 +CVE-2012-1180,0,1,ff878ada90dc9a7691757ede80bbac3243d8f3068b80c6812095b35f846e3a38,2024-11-21T01:36:36.380000 +CVE-2012-1181,0,1,64df570a6c8fc2eeee249e758396cca8bc0818e67a59c88f3672a4d2b62d693e,2024-11-21T01:36:36.543000 +CVE-2012-1182,0,1,2ba8f4b24a7a0bd87e8af425e4575315e919bbcb66c17e9c39880da51b189078,2024-11-21T01:36:36.700000 CVE-2012-1183,0,0,5f66dae79e3c48bee8ff98da9679fbe89c5adb78cff771a20ae509ebe2401d66,2020-08-25T20:24:01.097000 CVE-2012-1184,0,0,cb85700da47ce04d33fb75b8f08928323fc6f7c448f9b532b1f5b83fb1e5953a,2017-08-29T01:31:14.070000 -CVE-2012-1185,0,0,21001acf4ebaa935be79a4fa4a89ab7968d4402cb97c789c023f3b47a2cb1e8c,2023-11-07T02:10:13.767000 -CVE-2012-1186,0,0,c5f5a75029a41ac35b9eb15f928f7358c846f471fbefb51b02f5d99662dcead9,2023-11-07T02:10:13.830000 +CVE-2012-1185,0,1,702e3231728ce75869c8fd12c02342ff018e9a1292185f79850f4b2b1f6d64df,2024-11-21T01:36:37.110000 +CVE-2012-1186,0,1,76b319eca482d514bf119cf9aa40927834aba53d710a7180b65fdd665bfcddd7,2024-11-21T01:36:37.250000 CVE-2012-1187,0,0,ad3fd9efa94d8835367981a0d3748735c3647b26b8b4474b8ab95e5bde1f3c28,2019-10-31T01:27:42.627000 CVE-2012-1188,0,0,1da6bf1740935af0b47d1557fd200307f0facf3b229f6563287d251a64cddaa9,2017-08-29T01:31:14.477000 CVE-2012-1189,0,0,9a2be6b635c4eb920c9c6c2e5bd85abdc0202be51aa0c375df20867a6eb723df,2012-10-09T04:00:00 -CVE-2012-1190,0,0,9c005e06d829dd4dc94cfca4bb4b1dad2b0981da15ce4f0292680a2dca3a5406,2018-01-18T02:29:12.773000 -CVE-2012-1191,0,0,e34c45894a8cac61448e64df064ba3a6b8984b5c59a697e7be720c17e6b46b3a,2012-02-20T05:00:00 -CVE-2012-1192,0,0,03bc27f08525376dc79d992efbf953db19c9b2233522e7351fa06e0876734732,2012-02-20T05:00:00 -CVE-2012-1193,0,0,cd6adbb734b8feaff5968e382b979daf3833562a374de84763e40a76cf5cf240,2013-12-13T04:57:32.960000 -CVE-2012-1194,0,0,3e9223678229a5ef7c5b75c7496865e9ae955737ab38303298fe08fd92149950,2012-02-20T05:00:00 -CVE-2012-1195,0,0,119ad12c243a9752fa16620ed215034c528b3de7fda1cd18a29d664b46cee951,2017-08-29T01:31:14.537000 -CVE-2012-1196,0,0,1b24173d03d8540d8f46af02f08748d059e90f95799a266a5588efe39bf17a2e,2017-08-29T01:31:14.600000 -CVE-2012-1197,0,0,f1c8285786b533f73effd5785eb4c3a844c4451baadd12544185c35be3a0b1bb,2017-08-29T01:31:14.663000 -CVE-2012-1198,0,0,8762871953d24c5ca6b5e59a0e0b38a636d2ad414552ffc1c8c0553e61853548,2017-08-29T01:31:14.710000 -CVE-2012-1199,0,0,5c95e98fb002632a5827adc8d479553bcf73d6f280b0e52900e516bc5c0c48a6,2017-08-29T01:31:14.757000 -CVE-2012-1200,0,0,0f74b5489410493540c725343aed7f74f2d37c9c132608e201f0f2c0f567962f,2017-08-29T01:31:14.820000 +CVE-2012-1190,0,1,a3625c136e7034ceb1cd9e36ec77821a88f25f062b1cc078e93e982a12d09fb1,2024-11-21T01:36:37.833000 +CVE-2012-1191,0,1,22c042399f56dab20e5676630ec73519194a9f399f8013bb16acdd01e5a7b8b9,2024-11-21T01:36:38 +CVE-2012-1192,0,1,ff362a2a4abd6ab19fa8a514b148a7a2485e1fdf801710ab49aa70b02f6561fe,2024-11-21T01:36:38.137000 +CVE-2012-1193,0,1,b9ccf11482ecbaa87965378df5bc5c3708a018dc8542161aff2a2e5371a741a2,2024-11-21T01:36:38.280000 +CVE-2012-1194,0,1,7eb2d4a0a6876b24b5a026972d7345299dc53b63df192bd6627271f050a51983,2024-11-21T01:36:38.423000 +CVE-2012-1195,0,1,0037426bd850d2bd62a1a5f84ae440cc9ad04e984b39b6b731b101c3444d09e0,2024-11-21T01:36:38.557000 +CVE-2012-1196,0,1,f85d0471e5b57b45911e03bc4cb338ad19e9d783f6b597feaf3f2f9070289c24,2024-11-21T01:36:38.690000 +CVE-2012-1197,0,1,598342d904b93bac9dd077f1cf0122eaa59a353c1d112eaba28bc1168df7511a,2024-11-21T01:36:38.830000 +CVE-2012-1198,0,1,6127445f403e068548a04ecba00ff51bb932c4ad06b70cceb445eef4c4cd31b7,2024-11-21T01:36:38.977000 +CVE-2012-1199,0,1,b5905f7b302933620bd70b48f69040481f750b3bb1f638020d808f1e4deb7c11,2024-11-21T01:36:39.113000 +CVE-2012-1200,0,1,17fd69622500bc5c63522d0d0ae4759a422cb1c95ab4abd10d0c516d64e3a565,2024-11-21T01:36:39.260000 CVE-2012-1203,0,0,a4e728c8bebd434587f56adfed2998f79235d63767fd86b9194d24625ff13e9d,2014-12-29T16:20:24.170000 -CVE-2012-1205,0,0,ec6bfdba933b053c59805602b8e4351a2908ba9be2033e4f770df7a920405f1b,2012-02-24T13:55:05.127000 -CVE-2012-1206,0,0,3b0cced3820d5ede06ee53e7e5f2160b90db65da37f949011a4423e23448fd1a,2017-08-29T01:31:14.913000 -CVE-2012-1207,0,0,3b951717e52c80567d7e1f696c08a08e1d6f0a6124150a43b366428a6c5aea84,2017-08-29T01:31:14.977000 -CVE-2012-1208,0,0,6c87b361b82aef5695ac96a9de28a5f6f9515cd44a5395e5cfa007d10f6598fc,2012-02-24T13:55:07.390000 -CVE-2012-1209,0,0,990e33766855855a6873e1a251dda099df3add160de3b9946329f614ea18fd7f,2018-01-11T02:29:03.733000 -CVE-2012-1210,0,0,4c13e680841ddc0e1f8d979d4c7df2b8dcba66a0afd30f0f7d3dc5e3b992b2e4,2017-08-29T01:31:15.023000 -CVE-2012-1211,0,0,43b63dca70396daa6e1cf9a4f4dae281d31bd44b2dfce036f696327f7c1b0be7,2017-08-29T01:31:15.087000 -CVE-2012-1212,0,0,d128b77a3bd892372f26e80b0efbcadf7cb7ebe1b3293a6506981f1354e392b3,2017-08-29T01:31:15.133000 -CVE-2012-1213,0,0,ee39d62bcd83d43d4d6e4f3e0810c22d8bc53bd289533205f5717c16039b6097,2017-11-18T02:29:00.260000 -CVE-2012-1214,0,0,065134a5f125d70b0ded6f620e8bc7c0765baa8c4842a9cbe25b8255b5a73834,2017-08-29T01:31:15.240000 -CVE-2012-1215,0,0,ced95c87d6674678f8c29fa2844526e8e4ebe7c90097f91cf2e8d1d69c24ee73,2017-08-29T01:31:15.287000 -CVE-2012-1216,0,0,cd4ab851724bd39d2ccbbbe7c6150cfd9ccbca8af5b8a7fec6a9ed2691e8c5cb,2012-02-24T05:00:00 -CVE-2012-1217,0,0,50f87cdeaf064550482095e2924dfbd84072f5bbad4a419fad3c465365ed6765,2017-08-29T01:31:15.350000 -CVE-2012-1218,0,0,55c828a3efc0b46d3709f4ae9e0778eb68a9740b4f8e83654b2340e7087a3cf5,2017-08-29T01:31:15.397000 -CVE-2012-1219,0,0,50b07e6a160bd70a4020036b95e5ced04a2bd2214f1bc20c1dc3fd3b98a1c0b8,2017-08-29T01:31:15.447000 -CVE-2012-1220,0,0,9944f7c9f6d224eba3693e5f6a450d9e57f7104f6d3a2ea0b56fd22689842f22,2017-08-29T01:31:15.507000 -CVE-2012-1221,0,0,ad8a08e2ded769bcd1da0706577b1358604db5601fe099da9f2c4458233667bc,2017-08-29T01:31:15.570000 -CVE-2012-1222,0,0,db149b1d9ad4624ae4b40044309256dbd1582417cf5c43e009d791d9b3b661b4,2017-08-29T01:31:15.633000 -CVE-2012-1223,0,0,a975a41dc3d7dce03daeb02202b3e6539a7ebcfbdaa85146b30c2dd9223432c2,2017-08-29T01:31:15.680000 -CVE-2012-1224,0,0,4fd76512ec19c5524ab39e85afde16253c7fa0268a37a3d994808416b3839cbd,2012-02-22T05:00:00 -CVE-2012-1225,0,0,af476f9e46a1bb4455f5222c84b61c18945196ad5c509c8f80657f18ad64604a,2022-11-17T17:21:59.260000 -CVE-2012-1226,0,0,56fe9070f05b51ef0cb4923543d19d0c94ad31f35d3b96fd4f33021a6cbfb9dc,2022-11-17T17:21:59.260000 -CVE-2012-1227,0,0,8e521306fbe887582d46eac9b9b3693f53e7cb93f951a18804209f1a395b482a,2012-02-24T05:00:00 -CVE-2012-1234,0,0,92053f2a5eb5e99b0b2932c81317fbdf16f6c160c59625506b07276f082fbad8,2012-02-23T05:00:00 -CVE-2012-1235,0,0,d8fa085524906cb9f7d3c03dd1db35f475d7c400dcf9d0494fa8b8335feb5bf1,2012-02-23T05:00:00 -CVE-2012-1236,0,0,2d3a5c68ad27e273f5b6ad99ad975080c4b2dc82699ed60c35fbb41272b58f87,2012-06-09T03:41:31.540000 -CVE-2012-1237,0,0,1914d76776efccb88685409b3b602d89c147cc16cc1edbf435d63231a0f01710,2012-11-20T04:42:55.750000 -CVE-2012-1238,0,0,61172857c99e9efc0ffe430c39322a4de255ea0311dfd6a1bd0ea17d89466781,2012-11-20T04:42:55.987000 -CVE-2012-1239,0,0,e6212464877ed5cb8f9411a48e09973c575e24f2ab3442fee811a0f0c1d290b5,2012-04-09T04:00:00 -CVE-2012-1240,0,0,70815939b8a25bb3f3f2b2bd2491bb3e076b911150986f8c8bb9348277fcbb3e,2017-12-29T02:29:13.033000 -CVE-2012-1241,0,0,c6636951226b628a4e82bd7039e5caeb288406d009bd10b27f4825c2a6bbd2dc,2017-12-29T02:29:13.113000 -CVE-2012-1242,0,0,ca4128ad69c8771bd13fe37228eddb2be8b8aeb9a74b1c2259345648b24863b2,2017-12-14T02:29:00.433000 -CVE-2012-1243,0,0,b22be444ac6dbdeb4cf7c9c706122a816bca8b53499763bd73ff2a606ce00a9c,2017-12-29T02:29:13.190000 -CVE-2012-1244,0,0,4f2c033af38a26a6ce1e2ea30b176351478c05dd73ce7f6e5372b1cfbcebe00b,2017-12-14T02:29:00.497000 -CVE-2012-1245,0,0,0ae888e377e9673c9dcdb6a114853d46e7b8b4b6fb066f156ffdb4dc7ee37135,2017-12-14T02:29:00.560000 -CVE-2012-1246,0,0,ad5a7c81b28d7f16cf0e77622613a58afe1167cc4f6fc9edfbbf98b78efb96a0,2017-12-05T02:29:03.467000 -CVE-2012-1247,0,0,14748c5549915e4c1e910dbb3f020ea41d98e0684d57dc7fba28791ab222e3da,2017-12-05T02:29:03.527000 -CVE-2012-1248,0,0,91751571b61247cebc4cb8475394575e00c1f47a5f57b762e6801795f2a826f9,2021-09-14T12:10:01.390000 -CVE-2012-1249,0,0,69dd23406209c78b72ad041074e2ca95cb88f38c9baf8188659cfcc7b4af8b31,2013-01-04T04:36:51.133000 -CVE-2012-1250,0,0,0a96094b249292f87a871bae43ec0c90d0026643c36e3b62c2c7318ab4d3ca31,2022-02-25T18:40:35.437000 -CVE-2012-1251,0,0,39651720d13d80f7064f20dd4d5160be35661ca283ab6745195d44885dca4b10,2014-03-05T19:12:54.933000 -CVE-2012-1252,0,0,d5aa71ee173cf5baad1c7c15f8843db8d967d7e0806c38657fef13ffc307a7a8,2012-06-05T04:00:00 -CVE-2012-1253,0,0,a7e2c975651c8e333bec28e3f3725b3d00b834681afd0a2ad88257ba020693ba,2012-06-28T04:00:00 -CVE-2012-1254,0,0,f87f16ece23f6ff634ffa882079aa4ce6d126fb5f225142f25968b1b20466334,2021-04-06T13:27:48.527000 -CVE-2012-1255,0,0,2978673cb0b4534bc329c61c733afe57e68c899fbd9f0a91d0d256afb13c4571,2021-04-06T13:28:44.437000 -CVE-2012-1256,0,0,89177ea9ba7ce7077cb9e36276f74f1997a25ebbdb5d6ec44b9aaab2f53ccb15,2012-03-21T03:54:00.630000 +CVE-2012-1205,0,1,f492e5f7333ac9352641b3adf2d4ede85a58df482a85a9aba0976b034b3374e8,2024-11-21T01:36:39.540000 +CVE-2012-1206,0,1,c5820b30965f2a801275de788b640c491b8af23df9bc291bf0921bda1f56250f,2024-11-21T01:36:39.683000 +CVE-2012-1207,0,1,96e24da27ccfdcdfdd0fd17c91355fb7cff912479d4cd2d083694c9a99259b2f,2024-11-21T01:36:39.823000 +CVE-2012-1208,0,1,e0eb57d1c21a560eca440ecc40a74bbbdd5ce4ea71ba6bca553318bd0af81464,2024-11-21T01:36:39.967000 +CVE-2012-1209,0,1,6b43ff11b983e8d8923a5983ea762ef3a296b6584d6ef6b3137c076dd7ed8efb,2024-11-21T01:36:40.117000 +CVE-2012-1210,0,1,d33c7201ae127d78a6a88e27464d56ca0a104201cd40a245bd0d7e299e3bf813,2024-11-21T01:36:40.270000 +CVE-2012-1211,0,1,102529db3a0a5fce8cc3deac276606a83c363833f9460b74d739e530bd5c924f,2024-11-21T01:36:40.410000 +CVE-2012-1212,0,1,817277e035a78a9a147a8a819b6344158000e60a22ac75d7c28e1c736e470c69,2024-11-21T01:36:40.547000 +CVE-2012-1213,0,1,ad915618ed7452f58b971c5ef0e8d9baa0f6171742c954611a68fc9ef8424f92,2024-11-21T01:36:40.690000 +CVE-2012-1214,0,1,360b8c6421f74280ee94b324f77970e0b1bf8c05d974fc3cc928b9c341c011d5,2024-11-21T01:36:40.833000 +CVE-2012-1215,0,1,1543c7a629988196507133973e1c178f4262220a3f2fe9032f35f6a3cf59d021,2024-11-21T01:36:40.987000 +CVE-2012-1216,0,1,4b66f100584188d6dc77870c22693318fa86df90db1cec72a8c7f3dc440ee6be,2024-11-21T01:36:41.133000 +CVE-2012-1217,0,1,b80e0b49487e3520672b3b3cb52af197ce749a4e304dd702a05f3aad5ec40ad6,2024-11-21T01:36:41.273000 +CVE-2012-1218,0,1,dff29d3e95a68b2e16e67a67ab400d42622abe07c276895b44ab9e42a716d248,2024-11-21T01:36:41.413000 +CVE-2012-1219,0,1,b3c693cef4050de0c59fb5cdab1258adcb2a9d2011b1af026c3abd9e5caf7cdc,2024-11-21T01:36:41.553000 +CVE-2012-1220,0,1,b010b3c3e7412a95ea079a81b21019f6d8055955f17bea6b8f9c2c72bd85834b,2024-11-21T01:36:41.690000 +CVE-2012-1221,0,1,f0c2d9af0ac692e9b7bed384d10bcd5e0a1e29bd5acd27c25b7a0445fbe10d2a,2024-11-21T01:36:41.853000 +CVE-2012-1222,0,1,b50c92fefe1a73cf8aafe5b10f96644acd41d7b0d2d6933a6eaa9da4f2d87153,2024-11-21T01:36:42.003000 +CVE-2012-1223,0,1,921eb4decf89ee46c3c6b9f221f4e8cd76e0bbe0dd3d1ee3fb711a18b3b3861a,2024-11-21T01:36:42.140000 +CVE-2012-1224,0,1,c36119a9c0d15de973a1af099bf4870a590943da55fac11ddd683fe40e3867a8,2024-11-21T01:36:42.283000 +CVE-2012-1225,0,1,38910f054330f985f37ed5f1e77d5d9ea99af2a88f6efcea62e3fdb561919596,2024-11-21T01:36:42.420000 +CVE-2012-1226,0,1,2dbb1526620c13092ab2991e12ae05962a8488e027b1886fb4410c026ca855db,2024-11-21T01:36:42.553000 +CVE-2012-1227,0,1,715538c9b7b3bfeb6fdcb8489c7a66ef919f8a24d1629348af5b937ef369502c,2024-11-21T01:36:42.693000 +CVE-2012-1234,0,1,dc3bc6f52325c02dd350890d4281ec883c720ef7ef4848d8d17f0fcadf7648ee,2024-11-21T01:36:42.830000 +CVE-2012-1235,0,1,d1bbc8a1bb5d6b01c6341fb570b7aa9b05406092ade74cef1a93ca4dd927f025,2024-11-21T01:36:42.960000 +CVE-2012-1236,0,1,13fff46a5d44f18a9269cf42757d004e6a5273106ba90f43e836147d1ef65d21,2024-11-21T01:36:43.090000 +CVE-2012-1237,0,1,01d01bc2e1bc1ae547d4ee8dd2449eb40998e3fa8c032fe6f46b8e7021a41172,2024-11-21T01:36:43.200000 +CVE-2012-1238,0,1,848fdd37b26e386bda3667ef1c93842b5b1298062b09fbc8ae1a14fc8ca36065,2024-11-21T01:36:43.303000 +CVE-2012-1239,0,1,49326458aadf9cf01bd4e2c23c3457ddaf59385528b6ff83d46ad79a1b4454bb,2024-11-21T01:36:43.407000 +CVE-2012-1240,0,1,4a5337fe736c43e5dcf6e98e508d2ef00a8ca3a8ff0afb5e1a5afc0433e38c0f,2024-11-21T01:36:43.523000 +CVE-2012-1241,0,1,d9c553131a7650cc9ed6be8b65862b6e083bc181541992fddda597dc3d3b9da4,2024-11-21T01:36:43.633000 +CVE-2012-1242,0,1,fb1cab11573423a9b899ba4899fe4ee51ba1e54fa2277fce3ba38b79610b0ddb,2024-11-21T01:36:43.757000 +CVE-2012-1243,0,1,d5e81732be8986ef7e951a0c0f2da42b775bc25a136c7f5e791558a5769196c0,2024-11-21T01:36:43.863000 +CVE-2012-1244,0,1,566d1586e536d0ffcac3e54f71d4045e3b86fd07acca1858d80d581b55f09859,2024-11-21T01:36:43.970000 +CVE-2012-1245,0,1,d59c735d54137d2d7fce2558b67d8439c9b3eaadcf9565d395c7672a2212e4cc,2024-11-21T01:36:44.080000 +CVE-2012-1246,0,1,d39fe736cec8afe239925ebcd44b6d510017864e222489d6491fd6c954e2b058,2024-11-21T01:36:44.183000 +CVE-2012-1247,0,1,b9d051e645a5d0220ed3a91cfa87c9b16fe02f5431eca193b5c0fed39a4609f4,2024-11-21T01:36:44.290000 +CVE-2012-1248,0,1,26bc2bb53da386e3869b1f2f4608ed42f72b3b8d64f221b89fe60e0c4d426b2f,2024-11-21T01:36:44.397000 +CVE-2012-1249,0,1,45a3201b1cc478598b85510aba8e3081b24423bc9167dbee29bd33a4259538e7,2024-11-21T01:36:44.517000 +CVE-2012-1250,0,1,980e1b4616e09ec6d6eee4602a225f6e9230283e3cc95790f0247651d8ae4146,2024-11-21T01:36:44.627000 +CVE-2012-1251,0,1,c9df26672e69927a012a5aa8083ac67cbd0f9f160ce14000f41356fd58f0f871,2024-11-21T01:36:44.740000 +CVE-2012-1252,0,1,8c7c32336bf14bd0d05d9770ac6c60cd1e06175963394d93b375e6d2cbecd73c,2024-11-21T01:36:44.860000 +CVE-2012-1253,0,1,0b704ba28f1c556c1781e9c7583ee81077361a29c52195b0273771118b1c00a6,2024-11-21T01:36:44.980000 +CVE-2012-1254,0,1,e5dfa467072f0af4a2d62e6ede135dcebe1ea3765e54d00789c59dcbcfcf0cfa,2024-11-21T01:36:45.097000 +CVE-2012-1255,0,1,bc1d6913be2f7f6a958e77a901b59f21f30ee6a57c0da3b3d024d5d0d062153a,2024-11-21T01:36:45.200000 +CVE-2012-1256,0,1,8760f7c8715c9aa172fd81f031d20127bca20a824cca3e372964b7c885864a99,2024-11-21T01:36:45.300000 CVE-2012-1257,0,0,7ed547b146bef73b9bb29ec82fcc209b9fbe68d6299d902156105bdc851e81ca,2019-11-21T15:05:31.157000 CVE-2012-1258,0,0,9a784a7261922dd2f532087a845ac77a066d8aab44a6379cab9c083b77709c63,2020-01-22T16:27:58.860000 CVE-2012-1259,0,0,f12654e38372eec6c198b86509f6407ee85ea8befdd571f9b6195dd7b26085a4,2020-01-24T19:19:44.977000 CVE-2012-1260,0,0,0652ac3245c163a3d5ca60f9c0d7d4938b0a156a5c6a66f1e9803e95700dffe2,2020-01-22T16:28:25.597000 CVE-2012-1261,0,0,f7fc81ff434eb5b4d48b38bdca2dda08b127c5a2045ebb260e8a0400f14e204e,2020-01-14T16:16:48.703000 -CVE-2012-1262,0,0,2cd5b9eb67ba1f21bb2d5343848de9f09f4e7990c756c28fd91275cee21709ac,2018-01-18T02:29:12.927000 -CVE-2012-1264,0,0,b5efcc695e18e031e1ddaea86f3c21006904faca99c3d9c6c68f73b6ab4a8e8b,2018-01-11T02:29:03.793000 -CVE-2012-1288,0,0,833da6ee3e451b56eb2a58b1c3d0e2613cf67b8e9011cd8e50d612875e0609a0,2012-02-27T05:00:00 -CVE-2012-1289,0,0,dc3ca87e9e810003d6a82bdd1386310c1051ba30d819c79655c0c6e760ca00f5,2017-08-29T01:31:15.990000 -CVE-2012-1290,0,0,cec3432e46fdfdd033298bd052a1c93d290b101e7e09f3dbe9c79cb10b806d20,2012-02-24T05:00:00 -CVE-2012-1291,0,0,ad9be1b9244b05d92b3318e5dcb0c5a6c3a37d0835869e7b1b311e9a8ba6c706,2012-02-24T05:00:00 -CVE-2012-1292,0,0,8b3984116c62837df129150acf728cb071d95d1d0cfd086805f4c0606e8f1a84,2012-02-27T05:00:00 +CVE-2012-1262,0,1,f438464d1134ebd2dda75b0eae0518512d9e3654d7b3a43aea674c996e740f4c,2024-11-21T01:36:46.160000 +CVE-2012-1264,0,1,6dca4a63c44013ad12e315af450ad0a66b15376127972aa51f7fc489e630d8cb,2024-11-21T01:36:46.327000 +CVE-2012-1288,0,1,53c5c95214c1349809d07fd26f638be35a5850a47db7c2f972d9bb30e531fca0,2024-11-21T01:36:46.467000 +CVE-2012-1289,0,1,ff375ba9473458f4d7153b417cd643d6458362ff9136853da2f51376f8cd18e8,2024-11-21T01:36:46.600000 +CVE-2012-1290,0,1,16ec46c45ceadc20aebfa12386e87cd14fde39f9faa17fc1529eb239305b2908,2024-11-21T01:36:46.737000 +CVE-2012-1291,0,1,d630d83dedfa637298947f0a0b0b03991e7da991d7ff51f173f58bdfa55bc566,2024-11-21T01:36:46.870000 +CVE-2012-1292,0,1,7efd254533fb953ac71e3ef179900c61fdbf8d690c8648572151d4cf7e4b222d,2024-11-21T01:36:47.027000 CVE-2012-1293,0,0,de56fca5bfd889a8c6ea382cdb8ab040c294ce7e231e8d7995c3b17b1ed55116,2012-10-30T04:02:22.250000 -CVE-2012-1294,0,0,2dd4917ddf2619db2606153a969212f33dbf6364bfd0066f29722bfe9529f650,2017-08-29T01:31:16.053000 -CVE-2012-1296,0,0,f6716c9e4e764e89af40460c68560fb884263e3ab247cdc2e013bae7b236fe78,2017-08-29T01:31:16.117000 -CVE-2012-1297,0,0,b03af40dcf440920cde6a3b4febf638f65a298c87bc384ca1bc920aab071091e,2019-06-11T13:02:30 +CVE-2012-1294,0,1,bb5764f12196bceb8f7f54bc58eef09c4457d4fbdc4c2b5019e73218f2b3f94f,2024-11-21T01:36:47.323000 +CVE-2012-1296,0,1,a5d9ae86abd448d57ee0e9e3047a2256def74c924441b7e98596a3ec6155b3b1,2024-11-21T01:36:47.460000 +CVE-2012-1297,0,1,729e51afecb34fffca16dcb3ef36de43d29f6ec27783ba81e5956c208ce0a328,2024-11-21T01:36:47.600000 CVE-2012-1301,0,0,1286bb38cac91a2ccdf1505bf81c7b3aa50ea6b7c39563db2b19e7ca6245a4b1,2020-06-11T12:45:02.887000 CVE-2012-1302,0,0,4000904deca26beefe14fa15a3ecfde24a7aefcf652fdc5d882781d4f44c808f,2017-07-17T13:18:01.767000 CVE-2012-1303,0,0,d1cffbb8fa76c6354796aa87527c49e5a26df228750ac79ceba90f1bfdde0a1b,2014-12-29T16:20:50.497000 CVE-2012-1308,0,0,dd3303e26c63d17f974d78b88cd8d016a79e07d05c940a53bf0b57da049599f8,2017-08-29T01:31:16.273000 -CVE-2012-1310,0,0,f88d321983dc7b6be9ec04d510ffdc6061e968b0eff350ddbf3183b8c3ead05b,2017-12-13T02:29:04.607000 -CVE-2012-1311,0,0,ba89aba0dc607b6e86187455aa127c86916a733198043b0d716f15f5a2645ad0,2017-12-29T02:29:13.253000 -CVE-2012-1312,0,0,5c6debd9214c8e43b33bf09b207e0ba4058723e0270cc9dc1b4aee58ed5d0b9d,2017-12-29T02:29:13.300000 +CVE-2012-1310,0,1,63ee13f5a82c203dda499b946323098815c0e444090fcf0bd13d812b5355eaaa,2024-11-21T01:36:48.360000 +CVE-2012-1311,0,1,bd2e73495f033301df2e974740f08c834ed6ace934d1a84abb0044f5f9c0d6ad,2024-11-21T01:36:48.470000 +CVE-2012-1312,0,1,a94104ff5bf02a7f95a47ebe565d377de1dfbde7cdf22428cd35fa161a2649fe,2024-11-21T01:36:48.577000 CVE-2012-1313,0,0,771769addd43bc01faf69ca4b9c8f9071025a26bdab72d97e653806af0505893,2016-11-04T18:34:50.297000 -CVE-2012-1314,0,0,373ff44b7c9d4df7ab802dbd93f3e2d9bf0fb4a5c5e7367f48806ec57e1ca816,2017-12-29T02:29:13.363000 -CVE-2012-1315,0,0,0fd015b2e895af5f96acc5c65f06b8667f1516f3f4992b3dfd131b41c05f3a02,2017-12-13T02:29:04.670000 +CVE-2012-1314,0,1,74a8e9971e5b83ac5d4a525960c3458d80e125385a7c90a4230efcc1d4c7ce1f,2024-11-21T01:36:48.790000 +CVE-2012-1315,0,1,0c8e0109fcf9cf6d3260c0d443c591295c4329a67ebc99e4a1eb8d29024298e4,2024-11-21T01:36:48.903000 CVE-2012-1316,0,0,c49d9ed7b9b2a3bd6713658d42addb18899cff5c328645156975f4773e363aba,2020-01-23T03:24:27.427000 CVE-2012-1317,0,0,5225890ff19ee7b2512e46e7bff37672220e03bc1709c055c047fd3c26dccfa4,2014-04-23T14:21:24.100000 -CVE-2012-1324,0,0,8b38ac3865ec326b2fd7f24bd13e5113ba1846b8e9c36ea7ec2292b7f1db71f8,2017-12-07T02:29:10.460000 +CVE-2012-1324,0,1,17c6f7b66de14db79df363b181777ba1978c046dbff76494959970650dd17e31,2024-11-21T01:36:49.227000 CVE-2012-1326,0,0,8ca2c5b2efba13f853b4edf647b4f0fc7f81d9c342172248e5d6d9056b8f8f07,2020-01-23T03:27:13.747000 -CVE-2012-1327,0,0,3c4cdffd01472baa1a05e26b9b2825ad3ff51470b167f99ffe21c55b0bbb9f83,2017-12-07T02:29:10.523000 -CVE-2012-1328,0,0,8048fb3d00b4bc88dac28167f951430e9830c682019981c064abe30f8dc0e45a,2017-12-07T02:29:10.570000 -CVE-2012-1335,0,0,d86d2bde471b1966b0782477ff012f7c8a8e1489c512c424188f5f2b5e2d3328,2018-12-04T17:06:00.967000 -CVE-2012-1336,0,0,5a88b9d3008cdbac5f35e3c163fba2bce1876c578b2e2f3fbc4daec6d7ace850,2018-12-04T17:05:55.030000 -CVE-2012-1337,0,0,4346764bf2179558fc99bff44dab004141c0e10240a57c7c3a9dd14abf6cdc43,2018-12-04T17:05:47.907000 -CVE-2012-1338,0,0,d90697679d23709cb72c037f203c3f63e505b64c980acc95e1e0c78ada973230,2013-04-02T03:16:11.813000 -CVE-2012-1339,0,0,258f8372aaf444271688c2b0c72f7b577094d540da6911f2cd2ff7e09f6ed30a,2018-10-30T16:26:47.373000 -CVE-2012-1340,0,0,fb6bd4ef8982451e38b58e86aa67fbe36a4029920929c9dc5adf1f2de25b2732,2013-04-02T03:16:11.947000 -CVE-2012-1342,0,0,dce92230d127b9b52c4df766369c20cabcc3c2f100b7e16e2613a03e4b7d5d08,2020-03-24T18:19:35.727000 -CVE-2012-1344,0,0,2aec5129e93fb7ad6d0f626a8173edaf9641fb57a9f618daca312da72f438863,2013-04-02T03:16:12.077000 -CVE-2012-1346,0,0,dd9ce9cd1c6a8538f09bcc678b6907fe97c6c12b32c59589d8d4b531d52372e3,2012-08-07T19:57:04.517000 -CVE-2012-1348,0,0,da81d1901527462dfc5bff818d3138dfc70ffe75e3cc495331c7847cb6f64a5e,2012-08-07T20:02:35.780000 -CVE-2012-1350,0,0,f1a9f64f30bea9852cf5ffdb2381347efa6903f2d9f15c05772ba8c5cbe98d6a,2012-08-06T18:55:00.977000 -CVE-2012-1357,0,0,bfe1c909b2f90a0a5f67bc8c408e61ae2a1ce2462e6692ccb1bafeaee6e7c224,2012-08-07T20:14:30.860000 -CVE-2012-1361,0,0,4b06f340e419b5533361f986cbf7545018d328cfc51f516c4bac831a0c0d0beb,2012-08-07T20:17:31.047000 -CVE-2012-1364,0,0,cb1c520b85238fbc76fb1ee35732abdc77c0e641b217445945ff787c968ce08c,2018-10-30T16:26:47.373000 -CVE-2012-1365,0,0,749cc1d292cc4c4ab5126e9e5aa8ab0ea4358b6f537d5deb80db8724af3edf5f,2018-10-30T16:26:47.373000 +CVE-2012-1327,0,1,794873807dc249cb1b3d518e3152335c1afc62b2ef92c4dc4b743d033906d0d4,2024-11-21T01:36:49.430000 +CVE-2012-1328,0,1,b28f39ef50b35b16dcabaa52bcf70331fee33db991deb17b16ac21924791c00f,2024-11-21T01:36:49.533000 +CVE-2012-1335,0,1,68bf3cdbae6b8b1a8f6d8c369239fd41b1ba70741964b8aeaaefcd276df613e9,2024-11-21T01:36:49.637000 +CVE-2012-1336,0,1,9784a838cc05c79e4aeea19f350098af22a67a46ffe315bd91329a0d57992243,2024-11-21T01:36:49.740000 +CVE-2012-1337,0,1,618e0adc8d91378d45ee7e15a8a788ec7380af70a7dcd2b6dbbee62eee3fd7b9,2024-11-21T01:36:49.850000 +CVE-2012-1338,0,1,35e25d2f2f8e991fa91a0ec51609c9124ce52364264c22ccaeb3a21bbfae1d67,2024-11-21T01:36:49.953000 +CVE-2012-1339,0,1,b1577c27bbf953ec5859b72e97c6c12778cdce3a64c21a068528e2a2805d780f,2024-11-21T01:36:50.053000 +CVE-2012-1340,0,1,93e7e0814a6b63b35f01503f8085837c31c48310819465368477fd9d9cf49a0f,2024-11-21T01:36:50.157000 +CVE-2012-1342,0,1,ef809b5bf062f03795a092a848c867ae159dda45608764b58d6d7094577d069d,2024-11-21T01:36:50.260000 +CVE-2012-1344,0,1,044c3d1daa26f33f5683cca6c919a6a7a3c497bf7eb81bc30541c07fdaf563e0,2024-11-21T01:36:50.363000 +CVE-2012-1346,0,1,5467c08d3970f333679c04d22f32d87e16b8c7eb154edab9e6a5bb547259da5f,2024-11-21T01:36:50.463000 +CVE-2012-1348,0,1,e237f84be1ef6c31d423d98f6be54d3f9f7b4bd870e1f1a06c0c0b13f78cbbb5,2024-11-21T01:36:50.563000 +CVE-2012-1350,0,1,ae6fb30dace88dd32b9c9f727fd555dd79518963742c7c1760a1798f86fc48ac,2024-11-21T01:36:50.663000 +CVE-2012-1357,0,1,5a334d32fff628e994d2257c4d5e238b8dea5436d7feef527e5aba48270bd171,2024-11-21T01:36:50.800000 +CVE-2012-1361,0,1,e457c95fac84a4658c2c08fabc079c71d009ef7a3fd369fd2846b1a11a8c4fa5,2024-11-21T01:36:50.910000 +CVE-2012-1364,0,1,d1deab4146e12abae2107f798e5115c32a8ece672fab861acbbe6e96f7f381c6,2024-11-21T01:36:51.010000 +CVE-2012-1365,0,1,b28133639d3e8285c629929462a94ab11667b0ef895d37de0360470d6378ace4,2024-11-21T01:36:51.130000 CVE-2012-1366,0,0,93ae297d656c1c75dbcd1c59cb48e154a219f1c1cfcea2d4811dc5efb8ceb56d,2021-10-05T14:51:27.063000 -CVE-2012-1367,0,0,2a091ccb47e7d0ca5d25de03b673e4026fa6af74c3574e94390f66d3e412c1f5,2012-08-06T15:55:01.243000 -CVE-2012-1370,0,0,0c9a1e62e8e4763ebe24e5bae7b8b45b1f848623ed38afd7e265a3bc0542897f,2012-08-06T15:55:01.290000 -CVE-2012-1380,0,0,88241656ca62d9cda4781a3a0877943c20cae9f236c9f981c3b405e185437fab,2012-03-07T11:55:03.350000 -CVE-2012-1381,0,0,937c45642beb792e103d71e5b25e7f227fa227d0534e659de4187decf72695cc,2012-03-07T11:55:03.427000 -CVE-2012-1382,0,0,92f7ea8abdbfa37937c9b76a3000ba2776897b7c73cec748acbab5413f75c04b,2018-01-13T02:29:11.613000 -CVE-2012-1383,0,0,ec569675bdbfba6fef84ab4c3819593c00f199fbf35427a8c181b7398a9e0079,2012-03-07T11:55:03.537000 -CVE-2012-1384,0,0,2326abf55f8ed5547b37b81bfdc7b30bd6d2d51c8f866e54fc571811e10392e7,2012-03-07T11:55:03.583000 -CVE-2012-1385,0,0,15fe9d796772644bbe2c07b64762ee4381711cb93e3e735c0a00dbfc700d64a1,2012-03-07T11:55:03.617000 -CVE-2012-1386,0,0,60da7ad5c1c3e7dd94235adbccdecc70fa0349eda9125af95aaf7be78938cc75,2012-03-07T11:55:03.647000 -CVE-2012-1387,0,0,5f9b5b202be6b3f800e6febaffccf0cd38f78c419c6b875eeb84c1519feb4db9,2012-03-07T11:55:03.677000 -CVE-2012-1388,0,0,a81148ce7074eaaf9a462f0e3a0cc8a874066c6ef1ca0864a89f272870f45ee5,2012-03-07T11:55:03.710000 -CVE-2012-1389,0,0,25baec71c47bfc347f31f1037c2dcdc4585bfddab22d8ed8c7b2dcc40c4b954c,2012-03-07T11:55:03.740000 -CVE-2012-1390,0,0,e96e37e2a2ada15e5a7cd2c041110414050fb9c9310f91cedbb12ecda626b8e6,2012-03-07T11:55:03.787000 -CVE-2012-1391,0,0,96c0929e4300ab18d86adc23f9ea4f97ab298cd828087368b844bd9ee4383e9f,2012-03-07T11:55:03.817000 -CVE-2012-1392,0,0,f5aaec1fdf7442f7c49185fc8fdfb029ddc15dd89cd2dd4663297342da5091fa,2012-03-07T11:55:03.850000 -CVE-2012-1393,0,0,73eeeef3265755442153474517c890347cc10cab6bec9c6d91ee23b58151bba5,2012-03-07T11:55:03.880000 -CVE-2012-1394,0,0,9c1c6229c1a6450b981f7134add650329bf8450e688098973721ac5142aa4661,2012-03-07T11:55:03.913000 -CVE-2012-1395,0,0,19901ea2e7bdf72d494e7bde29e6a0c4161ad1dd236e130cbd1ee8c711ce6a2e,2012-03-07T11:55:03.943000 -CVE-2012-1396,0,0,6251e7d581068dc01c92e9ea357adf1bca3bf69ea8e1338142cec762bd58699e,2012-03-07T11:55:03.990000 -CVE-2012-1397,0,0,aefa331fefbad441338ad389db9277afa644774f47c1e8ed422a07e87625f41c,2012-03-07T11:55:04.020000 -CVE-2012-1398,0,0,4584bfd26339a9933b5b224145d8267e8311f26a438353435ca10e01e7bd1178,2012-03-07T11:55:04.053000 -CVE-2012-1399,0,0,61a7820196e5cbccb6931115ad09890e6b763f78c22d3a3c4de7514b22d9d058,2012-03-07T11:55:04.083000 -CVE-2012-1400,0,0,9716aa98b2bdc24cec7202ef05b6d4b361a04d274a52cbba7e1eaf84f8ce731f,2012-03-07T11:55:04.117000 -CVE-2012-1401,0,0,0d3243b55e38540be75236d5de23a26ea3c62d7931db42c3834ccdc1ae4bc32b,2012-03-07T11:55:04.147000 -CVE-2012-1402,0,0,2b62aabbda1bf29bb9f34439eb613b9ab9a17658bd404d9f4afddc6515e8bcf9,2012-03-07T11:55:04.193000 -CVE-2012-1403,0,0,1cbb2a82366d4aec27855f8e3c5abf06db023adc216da7ce45b4eaeded5a5d95,2012-03-07T11:55:04.227000 -CVE-2012-1404,0,0,e084b7f227a1d0d4dff7b63a1cc2a9873fd34a915f2c49e2eeea03906dc8f35a,2012-03-07T11:55:04.257000 -CVE-2012-1405,0,0,5e9935e59dd4d2ace3a5b8220c8e65fa41eca3bee6fdb6f425ed0288d610dc2f,2012-03-07T11:55:04.287000 -CVE-2012-1406,0,0,fe24f1514f82eb3d2f4b80549f989069b53ebf3a81eb7daa1900bb9a19c76127,2012-03-07T11:55:04.317000 -CVE-2012-1407,0,0,5cfc437703796e36fa84325be1dc8009944b0270cf0e2d35a3d06f4016ec79fc,2012-03-07T11:55:04.367000 -CVE-2012-1408,0,0,7a0cc44ae944ccb0c761814269f529e4ffdced211ff17e16aee55d7fbf9d89ab,2012-03-14T04:00:00 -CVE-2012-1409,0,0,d6c3cdb4bd053064934905eec05f2689ff3b6ce8cccc98f0512d5bbc7b594c11,2012-03-14T04:00:00 -CVE-2012-1410,0,0,d577adf950c7f46b14f1fc7533da48a4bfd95af779f273a4d5d496c9a3dfc655,2012-02-29T11:55:05.940000 -CVE-2012-1413,0,0,a241b970e42fba76b3f447fddfced95202b37072a94b721d80342947bfe52c08,2012-05-28T04:00:00 +CVE-2012-1367,0,1,4e7928b108e6fb53343712f6898393eec14795ee02f8c5a23d2abaf4f553f61c,2024-11-21T01:36:51.337000 +CVE-2012-1370,0,1,91668cdaaa4b1a8007de3d4317389662de6832f806c1e916c5104032c979e3ff,2024-11-21T01:36:51.437000 +CVE-2012-1380,0,1,1b3c69ae736cf702c2227d18ce1cfbc601827472a42d058d60faf976b599a767,2024-11-21T01:36:51.533000 +CVE-2012-1381,0,1,916e2a66079d1a1cffea0bdc5fdab71cddd4c8ccb1865f03acea137d5fcecb98,2024-11-21T01:36:51.660000 +CVE-2012-1382,0,1,85e910db863f4a91044ed72ce298cafb68bf98d3b83518c1bc961b2e8418fd80,2024-11-21T01:36:51.790000 +CVE-2012-1383,0,1,df04caa09e34a157c7ce3a7de3dcb039116b968b9c8ed0deb383345fcf5ae13c,2024-11-21T01:36:51.923000 +CVE-2012-1384,0,1,4259c0f2f5c4b7aeaa6e6003b42b2359397c517c485a30b64e29091a20419eea,2024-11-21T01:36:52.097000 +CVE-2012-1385,0,1,0f45317e5d4d0e685081852dd19a5f9a4e1e929022e242f86f8104f61e8e7307,2024-11-21T01:36:52.230000 +CVE-2012-1386,0,1,3e8072438feb318af38468cdbb4576e49eefbfd80f71c447b465a6823fbbf660,2024-11-21T01:36:52.360000 +CVE-2012-1387,0,1,5a518b8b443486ea776f58cf54e820119b41fced9c75bf2c91b975dc6b6abe25,2024-11-21T01:36:52.487000 +CVE-2012-1388,0,1,118d89d3da53cccccd69e8d41ac9afbfcb5be5e8c7cd5e0e6f0c86e6b201dd0a,2024-11-21T01:36:52.613000 +CVE-2012-1389,0,1,7088da4a508f8be8070ad957a1164759b400a5a7800f739cb1b095291fc5cfce,2024-11-21T01:36:52.740000 +CVE-2012-1390,0,1,be2e6704a93a8919446d45cd77529ec1f461b33e8edecbfe2630e79966708c11,2024-11-21T01:36:52.870000 +CVE-2012-1391,0,1,44575e4ef09ea27ebbe442d6b27132cc6b133d39bb1f86b1195ec88515b2a227,2024-11-21T01:36:53 +CVE-2012-1392,0,1,2cc637b242adb07771075b7c844d0be777717511a96ba355b10ae8631427ab69,2024-11-21T01:36:53.130000 +CVE-2012-1393,0,1,683652d2ee4b6fbfea6eae8e6f78dbca0de1a51440c01c02bb1c13e7f0e29ae8,2024-11-21T01:36:53.260000 +CVE-2012-1394,0,1,80f2721c8cd312ce0a58e1ea97711dad384e6595858dfab300aad577991b81ee,2024-11-21T01:36:53.397000 +CVE-2012-1395,0,1,90203eef126d8224fa82a98e2e65e450f11a7533769448f084a1831624e94692,2024-11-21T01:36:53.520000 +CVE-2012-1396,0,1,bb67ffcbca27672d898c574c3eb92a72f8dff76ac6cde1f93c962416eb3bdf05,2024-11-21T01:36:53.650000 +CVE-2012-1397,0,1,6c65a2d09325ec9f4f287235595f31984e52f60bb0a365dba6fa95f1fc81f846,2024-11-21T01:36:53.780000 +CVE-2012-1398,0,1,04e959e98045a9677cd1d792788400d5f4f9374b891a3248dad5729eda38cc4d,2024-11-21T01:36:53.910000 +CVE-2012-1399,0,1,732f37e1d32a81563002f3f78263a02cdd1710b0a66bbf094852590772904b8a,2024-11-21T01:36:54.030000 +CVE-2012-1400,0,1,162d97f184ca6454df59c1dbfb252d0c823e225cc4d0b84def145d416cd5bde8,2024-11-21T01:36:54.163000 +CVE-2012-1401,0,1,5c4bbd74e6981055cfebbd2a31b8d5677daf28b6ef35ab80d9a8a96523292237,2024-11-21T01:36:54.297000 +CVE-2012-1402,0,1,5d7670fb111f7c3be80ba1ea8d0b74da3c163b9046f89d9a073a9bbc1163ce90,2024-11-21T01:36:54.430000 +CVE-2012-1403,0,1,97fae86e3dbb989a2de8345d1ca3ff778a0f71243221950aa49211c3ef4d82b7,2024-11-21T01:36:54.563000 +CVE-2012-1404,0,1,35c9d7682191363471a7d287f1bb704d2ee0c7b6a549388ecde18a43359803be,2024-11-21T01:36:54.700000 +CVE-2012-1405,0,1,3373543f41909bda1e048011f5f16ed39ca5851c64612b0bda0d9a0a1356a30f,2024-11-21T01:36:54.830000 +CVE-2012-1406,0,1,f8442a6b2da3c8cd4bf8268bdbde63df6e7b7c020bf930a765409661dd443a11,2024-11-21T01:36:54.967000 +CVE-2012-1407,0,1,74dca92b63b90eb5644558ab141ca1990bde8d42ed0dfb3d5b543cae5e57c5bc,2024-11-21T01:36:55.107000 +CVE-2012-1408,0,1,1a5ee65bc10b48f9fc20c07b0a1261d0cbb861adba8436156d4b011b75170581,2024-11-21T01:36:55.243000 +CVE-2012-1409,0,1,7ad72afc21e2f78be6a8ce073a2e5031a885286ec7d943966e43aff2840b0560,2024-11-21T01:36:55.377000 +CVE-2012-1410,0,1,3767eadb7c1620fb027c2948cbc5168ec0e45d880a3c03a82df8df988cd582a8,2024-11-21T01:36:55.510000 +CVE-2012-1413,0,1,5d91ce3889660cc748c2cfc1e0af222e6d75ee6888ddcaa49be4bed281538b42,2024-11-21T01:36:55.660000 CVE-2012-1414,0,0,bfd1589b5fb76df7d5c5de99748648f972d5a96bbbe8a8295a49a1e79ec29306,2017-08-29T01:31:16.600000 CVE-2012-1415,0,0,0e9b7c0c500106d4b4ef38d8029a09ca077471643468c36c1dc7caf2a6ffda64,2014-12-29T16:31:14.343000 CVE-2012-1416,0,0,de90652bf3d3cb7070348bf0e754bb9b27639c12a909e4eb88c50291017692ec,2017-08-29T01:31:16.740000 CVE-2012-1417,0,0,427b1918cefcbcbbb2a5648602c4052048d6352b76b3b7f3cfa3b51b370ebeaf,2017-08-29T01:31:16.820000 -CVE-2012-1418,0,0,9d0ea5f4b18728d1c2a4a78e3c3b885e64acb84d92c2dd86207d0f52cb41456f,2012-04-20T04:00:00 -CVE-2012-1419,0,0,cf3b8faabcbd6360d6da5163ea4a7ada9077bdb6569305ef044eed1fccc321b6,2012-08-14T03:35:48.627000 -CVE-2012-1420,0,0,98f058836b1d8f43a3e1b5e352c085bc601d3a154d156c2bc4425aec055ffcd0,2012-08-14T03:35:48.800000 -CVE-2012-1421,0,0,c15cbce3abb67b3369bda7d6374dda5770ba913f2f1611161068c163bd1c4795,2012-12-20T05:00:00 -CVE-2012-1422,0,0,7e2a0ca43bef96273d449ca9f03cd165dccc1284f4ddd7d8aae055a4e0fd63ec,2012-08-14T03:35:49.127000 -CVE-2012-1423,0,0,4e1b0b3d9afdc34def98fc6d84ad75befaa1412a20c1f5f81f7e92a07efbb5ce,2012-08-14T03:35:49.300000 -CVE-2012-1424,0,0,eb6ebcfbc4f66b3e201f62ab3091b9ab55ac66d5c16ff7c3474ba3e001e48686,2012-08-14T03:35:49.457000 -CVE-2012-1425,0,0,7f803b56bf829c27604c54a7ee296b134ff76331ca0f9600c6d02b9a53d4514e,2012-08-14T03:35:49.627000 -CVE-2012-1426,0,0,f5074b3edaabfea50f250207460b3e2d0a78d66c766954873b21b33a6d697830,2017-08-29T01:31:16.883000 -CVE-2012-1427,0,0,a9b5acaec5c6e0365ec48797dbe070767062854fee7d3ad067039dcbefeb119f,2017-08-29T01:31:16.947000 -CVE-2012-1428,0,0,3749a45ae64578b9871b2ffa6dc8677fd6ae6f86e98b5b7ee0b37786d7ccf27a,2017-08-29T01:31:17.007000 -CVE-2012-1429,0,0,a127c2c7c85da47a14beb88e2703c2e6f0d012944182c474fd32a6596bbba4bc,2017-08-29T01:31:17.070000 -CVE-2012-1430,0,0,ac98dbdf66c7093ccfb1e047d2ca4803c7cbf1661235ce9ef53d80be5a945518,2012-04-13T04:00:00 -CVE-2012-1431,0,0,97820b4ca4328189b03bbf688d3eb0eda877bfe6b21ee1b2cc4418110cfb3335,2012-03-27T04:00:00 -CVE-2012-1432,0,0,792a9bfe2faff972d96cf3b23e67e91bfab6f7c671e17f75d7300e235926b1cf,2012-04-13T04:00:00 -CVE-2012-1433,0,0,7fa36cb20f4d5559dcfafc4a0560effe0d79d9e8e2f473111f93f6cacef8c8d4,2012-03-21T10:11:47.693000 -CVE-2012-1434,0,0,f8c114d2f457e107ac4337569d1710f84c982fd58da1af8fd2605a2a9693942b,2012-04-13T04:00:00 -CVE-2012-1435,0,0,89f84d5df0409b267533fad234f057d9249ff92df1222c71baaadaabc1c62282,2012-03-21T10:11:47.770000 -CVE-2012-1436,0,0,4bd37010406deb412d458eaf118a4c714ec0d9bc42126fda3014e4de79ac6bfd,2012-04-13T04:00:00 -CVE-2012-1437,0,0,2e80e8cbd39438cf5d5025c214901fa3659028ba87ccf53540a30722e8d45e63,2012-07-28T03:30:33.557000 -CVE-2012-1438,0,0,f72933e66a21edf17b235d29507c4ccae8cee51de8275add2f28f1f378f980bf,2012-03-27T04:00:00 -CVE-2012-1439,0,0,62984ff24deacced6defbcbb908a6f0d6a046b7104bef71ee83e8e79f3b32816,2012-07-28T03:30:33.913000 -CVE-2012-1440,0,0,a2eab8aa2e394c1bc1e7bb6e957d469068bdaddce9d0fbc34c622edb19d54f32,2012-03-21T10:11:47.957000 -CVE-2012-1441,0,0,ff627417c5197f26a0ad8592a00ecd0deed6fe374a7dee3c37132bc7a80d9bfb,2012-04-13T04:00:00 -CVE-2012-1442,0,0,b18586f7834dc497758ce2f6a0a2bb68b70ea475a8eb9d9771cd87530fea5f1d,2012-07-28T03:30:34.523000 -CVE-2012-1443,0,0,5c8894456280a3fed9903f6ea64ec14931e48037f4b96e2672c68121f68dc481,2012-11-06T05:09:04.360000 -CVE-2012-1444,0,0,91226aacbd204961ce5cdd742eb44e56f5da9761fbf3a9c0777327513c723481,2012-07-28T03:30:34.930000 -CVE-2012-1445,0,0,4bc6d4012462d4e419e1aa3ad28d0c8851cfdea8696651ef0313d3b5abaab480,2012-07-10T04:28:49.353000 -CVE-2012-1446,0,0,5a53bbfdf441cc8a8e605448494b52ca704a5b53a72d2e996d550a0d42c6c568,2012-07-28T03:30:35.210000 -CVE-2012-1447,0,0,96469bfec9d24055105565e7711bd94f3f849575b3d1d89b07b4721750e386c4,2017-12-06T02:29:04.650000 -CVE-2012-1448,0,0,4332aad5e487c03914fe63df1110f69e60e353cc7b1eb82c4377bf2a1a98521a,2012-11-06T05:09:05.313000 -CVE-2012-1449,0,0,21aa1044e3695b0c5737b855ed2a5545c4c0234ad1abc093a62379dbc1d5cbaf,2012-07-28T03:30:35.727000 -CVE-2012-1450,0,0,17a9ff89e5b8d70926c8eb5c024b5e607f5deb1dee16de1a6397d46abf8f665d,2012-07-28T03:30:35.883000 -CVE-2012-1451,0,0,24d8a8cc03f281f46c68861bed4856531db09d57ec422fbc798d8bdd18a8a074,2012-04-13T04:00:00 -CVE-2012-1452,0,0,958ba3d1f4e94bf4dc17ae714bce49c72627a5d65488ca534926538b7e791c12,2012-07-28T03:30:36.163000 -CVE-2012-1453,0,0,b12bcc310f2343bcc7439dfdd886fec28aefa0ec07c26fd8c0da99537fe22a52,2012-11-06T05:09:05.987000 -CVE-2012-1454,0,0,a8355e877459cac4811198a04eb74ab1e77084540f97ad13ad8a7f8b54879d51,2012-07-28T03:30:36.540000 -CVE-2012-1455,0,0,adac276ec29760d959d414749849154f29edaee73fdeb6f41dbe021a21b2ff01,2017-12-06T02:29:04.713000 -CVE-2012-1456,0,0,4688c7be0defa728545c40ec05b7d65cb562c5b5f428df751159913a041b28a9,2017-08-29T01:31:17.133000 -CVE-2012-1457,0,0,7c050f13ce3d2982e512a3b67dd7def5c297df53ab323078ee375bc9d02f0d4b,2018-01-18T02:29:13.083000 -CVE-2012-1458,0,0,4e45db58d0b69d2e10465c323e504830382b0cf910525606a71d65ae16eba44a,2018-01-18T02:29:13.177000 -CVE-2012-1459,0,0,468b02f4a9f1070496e14e62c7d93dac5e54895bb695515ec98bc1bf54a17ed6,2018-01-18T02:29:13.273000 -CVE-2012-1460,0,0,7a88d38f0aa7f80bf2904e77352a349aef1378e3ae602aa31d93a9c7826e3d9a,2017-08-29T01:31:17.337000 -CVE-2012-1461,0,0,0d577e13da65da8ebeac67f7508f87f8b8cb81ddd6fbe57d15383e2b29ccf746,2012-11-06T05:09:07.283000 -CVE-2012-1462,0,0,0aaf553774611c9d4c5d7bde936bc6ddab5c58005489557165a5ff5319dab2f8,2017-08-29T01:31:17.383000 -CVE-2012-1463,0,0,79c7d0f40304a677fc131b6720333e7c90867f451b98b73c97d1a94e085d26b8,2017-08-29T01:31:17.447000 -CVE-2012-1464,0,0,a75e8468aa19187b5d241b9cd512f63af6e9b581f7591c3c324e42bd4e4ee6e7,2017-12-06T02:29:04.820000 -CVE-2012-1465,0,0,c347150b51ead6c6245c9afe076c9cdc172bf6b324592868c73fc14aa715c00a,2017-08-29T01:31:17.570000 -CVE-2012-1466,0,0,9848fa7d5013eb0b7d74d1a03502808179188823a988da4e28a8a326b05362d9,2017-08-29T01:31:17.617000 -CVE-2012-1467,0,0,c360ad32b0bb0af354f11189f633e44e951d5e40bbdf97209bd1f1a527f199e8,2012-09-13T04:00:00 -CVE-2012-1468,0,0,bb14488d4da9bb489421900bb272f860d45d44317c5cbf67c6560e67f710c24e,2012-09-07T13:41:43.600000 -CVE-2012-1469,0,0,7e9b0306d5b062e0d92555f707821b5afd3cf0988268b45325561961ff6f0b89,2018-01-12T02:29:00.257000 +CVE-2012-1418,0,1,d61630015656e8f3114a91d6291fe70dc75233aabce3666f8f06dab42fa2d587,2024-11-21T01:36:56.340000 +CVE-2012-1419,0,1,dff87be5808431cd5f75ed01c9f68a3c96e7059caca6d77ae4a9d9bbe38e7946,2024-11-21T01:36:56.477000 +CVE-2012-1420,0,1,e12cb9c3570e9e69be3564f225fea174fdf722454a4f7fd1a595f0906b80c033,2024-11-21T01:36:56.607000 +CVE-2012-1421,0,1,d3a9302be6094008033dadf611cf09dc10cd171635935aa80d4f13215df04ae6,2024-11-21T01:36:56.743000 +CVE-2012-1422,0,1,15173bc8a13bcc023b2cfd0c46d820100bbe63f2f99126752974303402d86670,2024-11-21T01:36:56.887000 +CVE-2012-1423,0,1,41fe5ecdab76b8c409749f0e11618d898928a9451d8deada7f4d89510b739be3,2024-11-21T01:36:57.033000 +CVE-2012-1424,0,1,ced291a679452fd63ab7d84f7f9c6f79d8d5bfa402a219e40419ada3ca460f56,2024-11-21T01:36:57.180000 +CVE-2012-1425,0,1,c61e0418e3bab7f6f4d8c6d1035b1e6ba06b2f81d079e7a41de0445eef098750,2024-11-21T01:36:57.320000 +CVE-2012-1426,0,1,e59f8ae253d32379494c06f52151cb55496e7adefbec5d894788445b9ef45c40,2024-11-21T01:36:57.467000 +CVE-2012-1427,0,1,7853f8062952a93bafd7c719b41cb53999032f52d20da6830c51e8b04c87f79e,2024-11-21T01:36:57.610000 +CVE-2012-1428,0,1,622ea2eae0bec5a23ea0c8cea7432fbe8aa7bd5d0f82b3f91d833103390d0a22,2024-11-21T01:36:57.743000 +CVE-2012-1429,0,1,0fa00efe74292b67d46d1bbe0fa4bc7c863ac73a12af1d5a1e78c4a329acda85,2024-11-21T01:36:57.887000 +CVE-2012-1430,0,1,275267f4835aa21ff2be7f990592538600bd571908c845036476f0649ff210a6,2024-11-21T01:36:58.023000 +CVE-2012-1431,0,1,26d8b6e8f21435cb6fd93d01ff729e1b2b384511cb9174cae756a8709d7996ed,2024-11-21T01:36:58.160000 +CVE-2012-1432,0,1,463ee240f6a33228a69d416ac785d8dd643da1101c5decaea4075a2e663e2f75,2024-11-21T01:36:58.297000 +CVE-2012-1433,0,1,1ff030fb4e6105f7b763761395860b597657c6a442b1a3e98a5601aa63cd8840,2024-11-21T01:36:58.440000 +CVE-2012-1434,0,1,eff2a45de47fb2fe804e3a6fe178e420682f4de74d1c488df6e86efc1e0642c9,2024-11-21T01:36:58.570000 +CVE-2012-1435,0,1,e2fd7c738f3195be9b5e7ce2d64c48b66f6d221353872ab773ba996c288b135a,2024-11-21T01:36:58.700000 +CVE-2012-1436,0,1,5cea04053ba4cf54dd80f09c14d2bf35423bbef00351fec623f3948095e29a84,2024-11-21T01:36:58.833000 +CVE-2012-1437,0,1,9e3d43cf4f0316cc90159fd0d124396065ca19de7b113a85a175b18ddf1d0122,2024-11-21T01:36:58.967000 +CVE-2012-1438,0,1,cdb43273af66897a08c1b946d5db24a402e1e861535b253b3e8f429d097e7302,2024-11-21T01:36:59.097000 +CVE-2012-1439,0,1,9f1c2b9f775cf0683e60479a7ba98cbaeb6687f90899f61ce083dfaef1263ccd,2024-11-21T01:36:59.223000 +CVE-2012-1440,0,1,a30bcb5a4db84414a69508d78a96518af6d14374336ee5782ad400f4b7805c2d,2024-11-21T01:36:59.357000 +CVE-2012-1441,0,1,ac08d48dcc78b34b6ab589114405b1ce578b890bb4e4d524a8b54e989855e47a,2024-11-21T01:36:59.487000 +CVE-2012-1442,0,1,c6954ebd9aca92d168defed53884084f6bb795c081deecff4c52b0e40b9cc379,2024-11-21T01:36:59.617000 +CVE-2012-1443,0,1,c6d9886754a8bde79f18b932ad4689b08f704f6075a4f59b67609dd2a51a2bf6,2024-11-21T01:36:59.753000 +CVE-2012-1444,0,1,d21c3243d7429509aac835b1f3bce0195c62ad7c3d22f6c517eb7b1e284c0495,2024-11-21T01:36:59.910000 +CVE-2012-1445,0,1,0a8562241d72bee4567d61cb030a29ab1c9a1703758bef2378da3d5f47e813e8,2024-11-21T01:37:00.050000 +CVE-2012-1446,0,1,3b2505726787a219c58b7f3a2da8dbb62bc4eda54fa7d57a4b6a6e192ac71836,2024-11-21T01:37:00.183000 +CVE-2012-1447,0,1,9579af78b9bfb819f2c7d0197c448cd40f6b0a738ff549b310171b0655a2284f,2024-11-21T01:37:00.330000 +CVE-2012-1448,0,1,01fd5de72b0a7a5685fbcf42f2340cc3b68ca98d32fc91fddfe262e982402558,2024-11-21T01:37:00.473000 +CVE-2012-1449,0,1,37d7976f7cfd839d5ea242b06f04be6113bb421c61b77eb0d115f709b3ad0073,2024-11-21T01:37:00.610000 +CVE-2012-1450,0,1,af1db7803b4c5c89eb70207c76611f848cb1b37586653c8758ad4875c3b3d4b2,2024-11-21T01:37:00.743000 +CVE-2012-1451,0,1,18dd5c80014e5ba5718127751ce5dc4d2ca5cef26eb6e6593905bb12b687c8e6,2024-11-21T01:37:00.877000 +CVE-2012-1452,0,1,0cb6220bb7d558b339a21683278a37c51149b4d29bfc74b5c33a571170ad7514,2024-11-21T01:37:01.007000 +CVE-2012-1453,0,1,9be7aa8dcbc1633b3ce3b739ec3938622d038cf294d3237ea73052bfb62d75aa,2024-11-21T01:37:01.140000 +CVE-2012-1454,0,1,eaef7f66a9d2c5490c895ddfbeaa68812094a7d55eae12664e01573d398c80f7,2024-11-21T01:37:01.293000 +CVE-2012-1455,0,1,7210312fe7a58e9f86f91e972964a1d046593e716494a4fb5de05117faf521eb,2024-11-21T01:37:01.437000 +CVE-2012-1456,0,1,ede812d9531ba005de740679fe4b69cf805e87a6a7ad2ea4fc3dcb7c9c03d1b8,2024-11-21T01:37:01.597000 +CVE-2012-1457,0,1,1b5aaa6fc03024116cf6236502d75f72746b06ad0fbb7857cd0c7f35ed66ebdb,2024-11-21T01:37:01.753000 +CVE-2012-1458,0,1,f5e82ab885580abe3a18a94a0d8f1427315f108cd40fa475585c5d81734b619c,2024-11-21T01:37:01.927000 +CVE-2012-1459,0,1,2f2cb17ebed7822e8fb5b3b7cc7d359b62552d05b96320b67bca1a8b5e65ea43,2024-11-21T01:37:02.073000 +CVE-2012-1460,0,1,8383eaa8a103e286e19a321432da23dd6414c03e10d9a77d867e5523b082d9fe,2024-11-21T01:37:02.270000 +CVE-2012-1461,0,1,cde7fcfbbdf7d89fbe3aea1b7296a3cf033754b4cd7771296d1ae15dc7daa928,2024-11-21T01:37:02.423000 +CVE-2012-1462,0,1,9c78cdfe0c6fdaf7882bf1f31f64ed5623b6665b9c0c429f377ec4e716af7cba,2024-11-21T01:37:02.570000 +CVE-2012-1463,0,1,72210368cb6b43acbf35785bebc8d7582059299bc841ad8cb9a37986f1c3e038,2024-11-21T01:37:02.717000 +CVE-2012-1464,0,1,eeeae1d16439142f5fd64ad4e4058fcc15dc3be5f080b619fa13dcd649756a07,2024-11-21T01:37:02.860000 +CVE-2012-1465,0,1,35e46d101e96ab1dee257549ce6d1e3c72ea51f09082c88d89e2b22d6ef4fbf3,2024-11-21T01:37:03 +CVE-2012-1466,0,1,9ed3c16222942f7e9da1e77aeade1e95d2af9e55c1d83ff149892581d507238e,2024-11-21T01:37:03.157000 +CVE-2012-1467,0,1,acf95af626803b951c315e5f7108da30e1c4e1966dab8d5f49283c016421c35b,2024-11-21T01:37:03.307000 +CVE-2012-1468,0,1,9282e9ba47d29ccf144014a38564dfefd8d93d0b34cc29d6a63c4022f448ede4,2024-11-21T01:37:03.443000 +CVE-2012-1469,0,1,013bb944b75a8d0436687819f1d50eae480d089865d78c1adbb24eb6f38be1c5,2024-11-21T01:37:03.587000 CVE-2012-1470,0,0,0bb7ee4881808e68cc2112854a466dc01c56aed0a01352ab0393d4d2791e5ab8,2012-10-02T04:00:00 CVE-2012-1471,0,0,f0c46e3106ca659b1250b361653d23ab4ab5d364ad258b8d1297a988f073fab5,2012-10-02T04:00:00 -CVE-2012-1472,0,0,09852e011252902e93d055763eca0f3e1fd53297710cb3c36a62f99c416b13bf,2012-03-13T04:00:00 -CVE-2012-1474,0,0,9d506a3fbf924d8800b8b086ec9c19bd253464614d010221ff4683b8ff6ed286,2012-03-14T04:00:00 -CVE-2012-1475,0,0,4184bee4309df20ad2f874ee4820222f03619d54162da0be685448d4a87fb4be,2012-03-14T04:00:00 -CVE-2012-1476,0,0,36f6d4b812c97d0322bd049d5336d267c3d8e260a711878a1c89c1e38dc4f069,2012-03-14T04:00:00 -CVE-2012-1477,0,0,cce8555773a48959417fe675c260588161fa18ddff306873c3830af2523bd0d8,2012-03-14T04:00:00 -CVE-2012-1478,0,0,06708361ffeb10ee4692e5b194482accfc8f2225862a2132bfbcf5de732d7a72,2018-01-11T02:29:03.840000 -CVE-2012-1479,0,0,09c906cb6bd5e726f5a9506e958d4414deaf90e2042bd21a13ebd7edf7849b80,2018-01-11T02:29:03.903000 -CVE-2012-1480,0,0,849003bc5ef70d83aee270a340e088b8e5fe47cd1fa5218b337dacc37fddf82b,2018-01-11T02:29:03.950000 -CVE-2012-1481,0,0,1666a0cf31aa3f75265dbc75abde0336500ec6afc5000de7b65a4f5ed72d5b80,2018-01-13T02:29:11.677000 -CVE-2012-1482,0,0,0372370ff550f7b3ac1aaef3619c1b516e8cb6c7464ee93ff8b630a28234af08,2018-01-13T02:29:11.737000 -CVE-2012-1483,0,0,b8b2de9c019555ea91f84f2ccf1ffee7857dd75b1a4bd795a2dd8db73faf0dba,2018-01-13T02:29:11.800000 -CVE-2012-1484,0,0,cc38dc76c8c1c1a81176dc30357aedaeb5c6eb528b2dc539c05bee0921fe32b6,2018-01-13T02:29:11.863000 -CVE-2012-1485,0,0,71049ee3fa8535b4d6df0d2525db107414a035eb44cc70c1209d58cb4a9b62c7,2018-01-13T02:29:11.940000 -CVE-2012-1493,0,0,f7d34511737ed9b27a84f5460a4f6529198a8804a1ab3525352cf31ac2e2f538,2012-07-10T04:00:00 +CVE-2012-1472,0,1,8a29e01a890a90fef64869b4da985c9cde3d5c5d21ede6546ae9085b84f1bf15,2024-11-21T01:37:04.040000 +CVE-2012-1474,0,1,ddd4acac921a6b1b4f40555b919595c25c68e99f5c86c714ac4034e0e7fc6a2a,2024-11-21T01:37:04.163000 +CVE-2012-1475,0,1,60f00a08e72a4b1d9fd3402acedb8b82801c0dcca3fce95cbb71500968cfdebf,2024-11-21T01:37:04.300000 +CVE-2012-1476,0,1,6c80c277fb936bd771e64771cb132d1f21c42788b36b3254682747f0c9456d17,2024-11-21T01:37:04.423000 +CVE-2012-1477,0,1,7bf03fb4ba04d34ce3e9c2d1a13feef473061f5581174fee8a61187e1815e1ed,2024-11-21T01:37:04.550000 +CVE-2012-1478,0,1,286988afc625e553e87e6e7f3bcd16f2b245262199f10f924cf8b43c3b78d56b,2024-11-21T01:37:04.687000 +CVE-2012-1479,0,1,ed7e93ffde80bda5fc47866de71e32abd4cded6a53d281839626fb9e9cf164cf,2024-11-21T01:37:04.820000 +CVE-2012-1480,0,1,590dfdb0daa222638c1a71a9f2e969f50c4a2061a9c2bbdec946d05a505b29e3,2024-11-21T01:37:04.950000 +CVE-2012-1481,0,1,321968b3eedf5c4d31ef6a46aa6e11f86ff5ef67fbec1e14cd91e8e5ee86a3b2,2024-11-21T01:37:05.090000 +CVE-2012-1482,0,1,a86ba361cae5fb84d6a7c5afeee58778fb0bcf1cb6e0e6d5cfd75c64f9f9b4f3,2024-11-21T01:37:05.230000 +CVE-2012-1483,0,1,6066ffb9645e8e0640fa86732513e96356b7fbe30437e8da1b6b69754fcfdcfa,2024-11-21T01:37:05.373000 +CVE-2012-1484,0,1,c83f6d636a0469093bc2a07be93855d557bafd815190772b99b55457832684ec,2024-11-21T01:37:05.517000 +CVE-2012-1485,0,1,45f92b5976ff4c59036059c15baebc91b0df76d72d8585f846c9d8e5ba91d91f,2024-11-21T01:37:05.653000 +CVE-2012-1493,0,1,5a1b5ddb43181a5d2d478e7d5494533fca35259ee258c4f237932ba741a14203,2024-11-21T01:37:05.797000 CVE-2012-1495,0,0,785cf597426219d2c6bf3e8981c5acdc5a65e217bd42ce7979572d17961d24d4,2020-01-29T20:36:02.063000 CVE-2012-1496,0,0,b3ca78e982e058b01b3b10c6e6aa6cfe9a9f359dba18de321542314eca1bd386,2020-01-29T17:53:51.360000 -CVE-2012-1497,0,0,150f25a444c6a457226afac2871d4876ab2520919340f41a46277478bf4838b2,2018-01-18T02:29:13.397000 -CVE-2012-1498,0,0,37de31c0ddf8ec8aeeb322ac00decfdf46c9b33b0f0c4ffe8408752ed1dedb57,2017-08-29T01:31:17.757000 -CVE-2012-1499,0,0,517b862c5ef18ac8abf3338c936f9f886119d25a4f569f2d099f0e48f410eb58,2020-09-09T19:56:38.513000 +CVE-2012-1497,0,1,2f69ee8a9fe7b63bf3934cbe2d2396b6e3872666b4f776510916a13b709de6d1,2024-11-21T01:37:06.240000 +CVE-2012-1498,0,1,4d1b1b0a8d3a906acef299b68141639aeb6e35fddb9f9de74459b6450e396c8f,2024-11-21T01:37:06.390000 +CVE-2012-1499,0,1,0f7c94974962bca53f221decc2d540621c876f5e1e1124f10ff3fa5794f21d25,2024-11-21T01:37:06.520000 CVE-2012-1500,0,0,c1a283b32594dfd2bd7063125207099e76d499c64680da04d19faa677f6ad747,2020-02-24T22:45:22.657000 CVE-2012-1501,0,0,2f7a2e0ef36b820007f9261cb40ad837d985aab2ad67685a851fd3f487204e7b,2023-11-07T02:10:15.573000 -CVE-2012-1502,0,0,7f395c790c7215bb5e26d578b065157f2bde84b70ee3ef3b86cb105e22827766,2017-08-29T01:31:17.837000 +CVE-2012-1502,0,1,0d6303b84da11b3dbf6e2994462949565d8c8ab23493a4e952d89831ccbdf9d4,2024-11-21T01:37:06.790000 CVE-2012-1503,0,0,051eaec18a3b5e817815bb3f216fd2a3889955450523b2fd23157f02c2dc5b19,2017-08-29T01:31:17.930000 CVE-2012-1506,0,0,465c34ff15c868ad72aed84d8bb4c2c3e388ddc2a85bef1e8df5d9df4c7d8736,2017-08-29T01:31:17.990000 CVE-2012-1507,0,0,bc173190aa18365fdb8ec0311848e8d54b1eff1abba27f7cb7181bb2c6079d9e,2017-08-29T01:31:18.053000 -CVE-2012-1508,0,0,a892a94ceb6d6c4f646984b195c2ec0ec58fb7166dab3d0143e782440d694649,2017-12-13T02:29:04.810000 -CVE-2012-1509,0,0,c4c5e404c312cf02a417c558443de54727fede10089bb6b35c8b215629adec8a,2017-09-19T01:34:44.947000 -CVE-2012-1510,0,0,fc914e03d18c4e1805f7863072fa5c4d66668f9c3f1ccb9979eef52d2531042f,2017-12-13T02:29:04.873000 -CVE-2012-1511,0,0,58ac28c15db805b4dbbbdf7ace38c535e27aa593b1d8a84d045bd270a23c002f,2017-12-06T02:29:04.947000 -CVE-2012-1512,0,0,0308281817ce95155a86ed3da8cb1c0d33a81d808f5b103b3df4f19455bf809b,2018-01-06T02:29:37.630000 -CVE-2012-1513,0,0,21ada30296dfc5425b88f5ddcfbcbe6422ad709405e35c80d96e68e01b5cf364,2018-01-06T02:29:37.693000 -CVE-2012-1514,0,0,30d68d38c7798e1099f552d5a90e18a911c9f087df67ac0ff62430b3a747806c,2017-08-29T01:31:18.303000 -CVE-2012-1515,0,0,82e6a714eb54c239b9babb4f857ac478e9933b9db25e878a0a970df521ccb99d,2018-10-12T22:02:28.480000 -CVE-2012-1516,0,0,9731c22ea9fa38c971f52b51aee53d57bc6a21f02087a93b2bf5849a8d94f304,2019-09-27T18:13:22.970000 -CVE-2012-1517,0,0,fbd0fb1cef3195e2660ffeb7e527ea195a612106aaf11c65e0ef94c0871c3da4,2017-12-13T02:29:05.060000 -CVE-2012-1518,0,0,dadc5395e1531c59aadd971153bb4870798597794c4dfb24e74d48dd022a9bca,2017-12-29T02:29:13.503000 -CVE-2012-1520,0,0,f1e40f1b5c83324d6ba31591505237063e7b43433841ffabe23b949ff55e1088,2012-09-22T03:31:26.467000 -CVE-2012-1521,0,0,6d3afbfbdaa7ae79b32584c24acfc772c9ee21c6b4899dbabad243f6f3eeb225,2020-04-13T17:17:26.470000 -CVE-2012-1522,0,0,7c3842b5cce1880f35a91b51cb0d11678d9649fb2bad1c12e2fe8f7363240968,2023-12-07T18:38:56.693000 -CVE-2012-1523,0,0,fa95f3e0c6409f6580ffc935c2b1eea5a6d92f5131ca30c13bcc03d2e916d2ed,2023-12-07T18:38:56.693000 -CVE-2012-1524,0,0,2b8cfb3ce9cdb3745624f2bbd2345eee13f687e9e6523a9820f808f2e4067855,2023-12-07T18:38:56.693000 -CVE-2012-1525,0,0,b9349ba83428913102404fc3fb8b43564005a592d6905671b1bb046a72d0457b,2017-09-19T01:34:45.997000 -CVE-2012-1526,0,0,7d8a7c97aa6156bdf8e67376609c48ccc3f7b723065c281cad7b4b11aafd049e,2018-10-12T22:02:30.340000 +CVE-2012-1508,0,1,95c612bae1dce13f195a97f6037247e9706dfad0e218570c1ce477e2b6d782bf,2024-11-21T01:37:07.377000 +CVE-2012-1509,0,1,ebeba34bdf29c479b6ed7435774f6d6693069a45344c8cf4264d4292de1c0390,2024-11-21T01:37:07.523000 +CVE-2012-1510,0,1,1d3caf7bcf6175b3f71c344e042e99703e812b21b14e7a532b44407ecc7ffd60,2024-11-21T01:37:07.660000 +CVE-2012-1511,0,1,b99bddab451b92de7609c6d897764b220f0de77422dcaffcb76683d13c9ef3ee,2024-11-21T01:37:07.810000 +CVE-2012-1512,0,1,73a48d872f6b936b1677b22dbbe6da51e91669dc10a644bda39bbdc2335cd02d,2024-11-21T01:37:07.947000 +CVE-2012-1513,0,1,3875baa12e0f1c0a2bbaa83eabe94d6b838f50b1a166de0bec5c2a69ef33f47f,2024-11-21T01:37:08.090000 +CVE-2012-1514,0,1,8d0dbde4f7d7c19783e7b397be67f09b131b19bb5a533d89d72a49f485648899,2024-11-21T01:37:08.223000 +CVE-2012-1515,0,1,cd254395cb3ee23b0b43e096b59aab95f186e9ddf69032b0866528f3fb79072c,2024-11-21T01:37:08.367000 +CVE-2012-1516,0,1,8740a63c26ed9b6d35af45e5aa6d126029a93029dbb23291047b886ff0db0875,2024-11-21T01:37:08.513000 +CVE-2012-1517,0,1,32cf3551f8100e0d7c14f0c06b2ed23aca7f3504738a53fff9d15603b7dec60b,2024-11-21T01:37:08.660000 +CVE-2012-1518,0,1,b01f65fb7ab934661635a99d6f676411be2ef98e50730491411502ee3cce96fa,2024-11-21T01:37:08.797000 +CVE-2012-1520,0,1,2a46d27ba086cf74c04802a413bc0e2cdbe08127437be7120867ad1d83a0e317,2024-11-21T01:37:08.940000 +CVE-2012-1521,0,1,acf918be5f442203b0da4b26a0db54b043d3086496dd6f3f9a95ad1aac64e84e,2024-11-21T01:37:09.093000 +CVE-2012-1522,0,1,d6320a21c5b465e3b0a15d9e94ebc065463fa1339c34220f8c906e96eae938da,2024-11-21T01:37:09.273000 +CVE-2012-1523,0,1,8134929751f9042bde770cf0f4b846c0b5d505ad36c8b2455e61bf92e0650830,2024-11-21T01:37:09.413000 +CVE-2012-1524,0,1,2bf26118a2115cff26ecfd1972b8338b4b9cdf9edaf8144ec81fda8af7086540,2024-11-21T01:37:09.563000 +CVE-2012-1525,0,1,7c5014c7f19cb28cb5e73701282c7fce4e079deb5475f593220655b3ef5c7fd7,2024-11-21T01:37:09.703000 +CVE-2012-1526,0,1,0d6a1df6d0dbcebca407e0fcf2f724ccf7f54bf82a5200235a4ad4d5c55edf4b,2024-11-21T01:37:09.850000 CVE-2012-1527,0,0,ccb195f9903509add6a5b8f587460adc61d397102f90add3f0351c8fddca3024,2023-12-07T18:38:56.693000 CVE-2012-1528,0,0,8f2f4dcaaf1b2f32267531ace49337ab1312d94456ecf815ab630295d79f3b35,2023-12-07T18:38:56.693000 CVE-2012-1529,0,0,637524173f4abe61ed0062a38e3a94ba558e015e2812e17230716a45e799fcb4,2018-10-12T22:02:31.510000 @@ -53198,17 +53198,17 @@ CVE-2012-1531,0,0,3710d2aa885c194b4b6587d241b434c10bfb034bb881ba7cf7c9531d7e9d7d CVE-2012-1532,0,0,9b8582eb3b68ab38d144feae307d5449be8458afd4e5f4d82910ede7a1379024,2022-05-13T14:52:53.283000 CVE-2012-1533,0,0,bbc2de87cfffb3caaa56c218ba7e197cb19582678ef1f82ce21b7e3f9e0ea9f4,2022-05-13T14:52:56.507000 CVE-2012-1534,0,0,61ab61b50b5c66376d908d494ff18845f17861c54b3083ecb185a344577b545c,2023-11-07T02:10:15.883000 -CVE-2012-1535,0,0,06b8d329bd01553c5fd48c7b2dc68e6df320941a81b54560e560fc8c454c7848,2024-07-16T17:38:08.570000 +CVE-2012-1535,0,1,f79aed59e099ef23c7de32e273292d655c29c00627405d1ba08365c89511ea95,2024-11-21T01:37:11.183000 CVE-2012-1537,0,0,de443f96f2a89f4df01002575b38b0735e102217e423a2882b62346eaa51c924,2019-02-26T14:04:02.400000 CVE-2012-1538,0,0,e66bcf8e0c1a71ed87dd0bb38bd97764ccab7ef1bd08b0d616b06f480dd74886,2023-12-07T18:38:56.693000 CVE-2012-1539,0,0,6390dc321b7663d9a73633303639eef48f87043a6080265a1311abee25e4f817,2024-10-21T17:35:12.110000 CVE-2012-1541,0,0,e142a4ff334f68b28b34e40983ebcdd742cfafae3253d636fc3ad4f27bcd5892,2022-05-13T14:52:59.003000 CVE-2012-1543,0,0,64c37fa53f8a383edfa5353f012b3b78d400b1bfe8ddb795fda94aa012a44fa5,2017-09-19T01:34:46.997000 CVE-2012-1544,0,0,dbd5d064926e4f4a610890acb04c2eb1fe6af6dea83b745b8d10634e014f2bbd,2023-11-07T02:10:15.970000 -CVE-2012-1545,0,0,84c6a8e6fbdb12796dbbc26a6f697e5373353c080b7acd45a57a055b12ac1938,2021-07-23T15:12:53.913000 +CVE-2012-1545,0,1,5cc38277f49e49e12eaedf0ae8a3fa60f7bcc3dec7f3ec05807a90bf1fb17a7f,2024-11-21T01:37:12.227000 CVE-2012-1556,0,0,45a83e30e5dd6ad36c0ede220acf337f0ca6c7ad7115b2aafb02859660e67fd8,2017-08-29T01:31:18.820000 -CVE-2012-1557,0,0,cfa8688de36980683aff3c2fcf63d526554f4a8969bf0a511264e0a32dc10dff,2018-01-11T02:29:04.373000 -CVE-2012-1558,0,0,eeb99c3646cb654367a27ba0860b90491a37ec1b052e793ff5c7a32adea620f6,2018-01-06T02:29:37.833000 +CVE-2012-1557,0,1,351ed21cf4146585453cb4b6edc6725a8f5f5f7232f5c2b8e5f874db74c585c1,2024-11-21T01:37:12.537000 +CVE-2012-1558,0,1,54b596891a787bb72d3b8e7f246c509ecd086f71f7435932ff35c85a3f634413,2024-11-21T01:37:12.687000 CVE-2012-1561,0,0,864921e86777dfe0a391aab0df7b7361522df260770d513899f3226c0820dd10,2017-08-29T01:31:18.993000 CVE-2012-1562,0,0,768b32f86ccccd9bb112c0d7b9188c5997c5ce0bc85a479bb493cbfdb97a7927,2020-01-22T18:48:08.683000 CVE-2012-1563,0,0,3d46490885a41c96109f7d0a274ca8a1d11dd3fbb0a677392a814961fb1beae4,2020-01-22T18:58:02.070000 @@ -53217,58 +53217,58 @@ CVE-2012-1565,0,0,deb5146bbf8c3395885d8c6e27c84e9a356b11620bec755bada96b1522e335 CVE-2012-1566,0,0,252d0332d8e5b2371e49b9c080ea3d9ee965f4a46a1cae127de88bbcc1cd5d67,2020-02-12T14:34:26.067000 CVE-2012-1567,0,0,707dcc4f25ec3e3a6aa06fec21cc818225f46385d96e1c9969d66bd7bfd05b4b,2020-02-12T14:36:47.227000 CVE-2012-1568,0,0,68dfd666476e9f91a5aec6e7a185feb9c8c62597d364bea2989349425ea838ff,2023-02-13T04:33:10.530000 -CVE-2012-1569,0,0,a9d3ee18ff0660e8219b79cd5f30a202bb12586c5cf3c33cf89bad406bb76b98,2018-01-18T02:29:13.553000 -CVE-2012-1570,0,0,c80340adee0c43994b495e33a3c39563b72e009f9580a8cb3d7df63ea2c91eba,2020-08-14T17:11:18.473000 -CVE-2012-1571,0,0,2283504a790b73465d03846391fb4c960810d495960560e7d39c3c45bca1cbf2,2014-03-08T04:55:12.187000 +CVE-2012-1569,0,1,66acdf19fb126b2ae9fe4c921ad3341a5b6e7d8f83dd864142e57e18b1435d4c,2024-11-21T01:37:13.643000 +CVE-2012-1570,0,1,4cf32725cfdfe8cc3a6869da176b9bc8c0616cf4ad5cb6b29173adab14bdb4ec,2024-11-21T01:37:13.797000 +CVE-2012-1571,0,1,e54ee5b0403f8afc9d817c7d35237069a54d296dd312f628534ee349bada3522,2024-11-21T01:37:13.910000 CVE-2012-1572,0,0,de0a2c42d8474676ed44b7f35fdf528e8fb87d66adbe84099d897ac61a5b2212,2020-08-18T15:05:57.797000 -CVE-2012-1573,0,0,96141bb0ea4d971cff1a146b14c3de90bc8fefa7563822dad16d952fed52e1ca,2023-11-07T02:10:16.163000 -CVE-2012-1574,0,0,68dba0319524840082aa0383b579d5f06caa3a4c817d4761be9b06a9e81bb809,2017-03-24T01:59:00.347000 -CVE-2012-1575,0,0,93d1a7cc71de76ceca659bb0166e61f58997be2e2df2429206d31778923c2be9,2023-02-13T04:33:12.837000 +CVE-2012-1573,0,1,19d10c1269614593b12d07f5159d2a3e34aab67e8d5509f73e8507099024a53e,2024-11-21T01:37:14.133000 +CVE-2012-1574,0,1,e0994a0cf63dbc315990e5f404313afa7c0fe6b3eeddcbd525606fb41f1227ee,2024-11-21T01:37:14.280000 +CVE-2012-1575,0,1,70807db825cc1ff38244ad250573494757842ad77c4a19e2fb1db00f593709e7,2024-11-21T01:37:14.400000 CVE-2012-1576,0,0,6273970590dd7887dc9804e395429e3cfec644e1fad1d6ac9cc6d826d772fc30,2013-04-05T03:09:33.433000 CVE-2012-1577,0,0,44165baab8f7bc2c39f4683836e18a503e6c76dacf859a9c0e6b5410ad764ccb,2019-12-17T18:38:23.497000 -CVE-2012-1578,0,0,6576ee9648ff53099a7f2b87b9732dd2528f38cb6cd6d6c77709e278663e0221,2017-08-29T01:31:19.163000 -CVE-2012-1579,0,0,5c911bcce4a6447cd67ff4a210fc9e3b032bf92a765ff31ab52028edfdd52e90,2012-09-10T17:02:12.820000 -CVE-2012-1580,0,0,3e2b4a134d1c05aa068d7e36c755757863b72cb8b3ca37fdb1a4015396adbaae,2017-08-29T01:31:19.227000 -CVE-2012-1581,0,0,da1a1af9e1d7dd0e1425f580cb39ef2eb1e217af974b164147d84d2e33e69554,2017-08-29T01:31:19.287000 -CVE-2012-1582,0,0,d7c483d3760fed9fcac93c1e3a5bf52824b2b375f4059e7df32377266fe08764,2017-08-29T01:31:19.337000 -CVE-2012-1583,0,0,d2062c2faa10fd33344a925f28b4db01342a91d74764b7be437ee1659b977868,2023-02-13T00:24:01.357000 -CVE-2012-1584,0,0,78a279613cdd30948f6e0cc4f7e8262a1bab9a66808fe7a6b00954db29976dc3,2017-08-29T01:31:19.413000 -CVE-2012-1585,0,0,416fb96615fa3c56b1cb3fa1afae8e273ceae87eb36b3ea9effa27da76327f5d,2018-11-14T18:35:01.967000 -CVE-2012-1586,0,0,4bcd2e4e3e055a66055b9f4f7eff47ee69942b56b8409e35cb8e123daf71f137,2012-08-28T04:00:00 +CVE-2012-1578,0,1,62b18406db3696249b31a74f348b6b8192cc69842b9564c0f1442fcfb1d60a9e,2024-11-21T01:37:14.737000 +CVE-2012-1579,0,1,c561acb0914331a5d3cb2933915bd967583fda316b2657e7251baf15afb550dc,2024-11-21T01:37:14.847000 +CVE-2012-1580,0,1,fdb533dfd127662ccdce3f47cc73339292f94e52f2a7063ce97da9c166d205d3,2024-11-21T01:37:14.953000 +CVE-2012-1581,0,1,5211b210727db7613c8a0a6ceff927d43cf4f7d2f6e13e0cadcabf1128519572,2024-11-21T01:37:15.060000 +CVE-2012-1582,0,1,b90a2cf2436c27767d5644d53d880065351281ca614426deedf97d6f91a03204,2024-11-21T01:37:15.170000 +CVE-2012-1583,0,1,91b19d20c2e32dfacbde79ddfc116802edf0f5aee7da8bf9af4457e842db88c9,2024-11-21T01:37:15.283000 +CVE-2012-1584,0,1,baab80182c715c73c1255e21a942d0c1ea82ca63fd9d3a29f783d47b23fb7e01,2024-11-21T01:37:15.427000 +CVE-2012-1585,0,1,9c74d2245eecb1e70e271707481a74255c0efd94ef07e1bb59e8073433a1c8ae,2024-11-21T01:37:15.540000 +CVE-2012-1586,0,1,d453d2e74fc4507d0edbc467e4d721c338b0c134745fe251114c08adaf895745,2024-11-21T01:37:15.643000 CVE-2012-1587,0,0,6f473e47dc686560beb7febc64daf2cba222464252237416d4ffe2a901d1866c,2023-11-07T02:10:16.400000 CVE-2012-1588,0,0,b9dade86d99d13ad37048c55f0cba4b54a4ce657480bba93b842935176333875,2013-12-13T04:58:14.587000 -CVE-2012-1589,0,0,1ec18fa98c9e18a8ada8a3070a1f66fcdc80a38b55a4e72aafe8c3d1d3d85a7a,2013-12-13T04:58:14.913000 +CVE-2012-1589,0,1,87fd4e295bb9f7d07714e3bc788afcab5374796867145a6900fe3d4e10983678,2024-11-21T01:37:15.873000 CVE-2012-1590,0,0,755416a294f3aef19374fb46128aef61c3c898460ab191da150ba6e1abdded19,2013-12-13T04:58:15.057000 CVE-2012-1591,0,0,c09887b59d9ff3ff803ac951d8448909e820d02d901b2ff43c04c194b5de8e3b,2013-12-13T04:58:15.180000 CVE-2012-1592,0,0,cacfa1076a44e408be812e37fa0163c9560dad55086b78cae878092a1fdb83de,2023-02-13T00:24:01.677000 -CVE-2012-1593,0,0,a1931cd72b846830bafcdef047befb4c09f5cc2dcd14389915734c41a7b66fdb,2017-12-29T02:29:13.817000 -CVE-2012-1594,0,0,59e8fb1e9f9dde3899223ad114616cd965c009d498cc5ae455c7132d9965758e,2017-12-29T02:29:13.907000 -CVE-2012-1595,0,0,57109e98ab3fb44def7e3e236e0736204f79735cd017ca2fa4ea7680477d3e97,2023-02-13T04:33:14.297000 -CVE-2012-1596,0,0,29d5f713dd7384df56851e8bca1653a5d8b2560753d691e08c3794a6b41079e2,2017-12-29T02:29:14.067000 -CVE-2012-1597,0,0,60e70d9508d82d9ab5198d5b1b426076c921385eb7a718af97fc83e61902eab3,2012-08-17T04:00:00 +CVE-2012-1593,0,1,28f4fa29b0e9e50b33b04f2c9c9ca828b7a431a1555bbea939f1ecc2c1350718,2024-11-21T01:37:16.327000 +CVE-2012-1594,0,1,8069c79b8cfd0bfae04af71b3e760fdcce4bed4e7779e9ca1748806daf5b75cc,2024-11-21T01:37:16.437000 +CVE-2012-1595,0,1,750c6b6186c311a8b006f5ac2c650d4ba24013be369b2114eaf21a2da01d0f5d,2024-11-21T01:37:16.540000 +CVE-2012-1596,0,1,e569c109f5cfd110b26cfeab5146c003b397248c554f8c07aeee5858b9ac14d6,2024-11-21T01:37:16.653000 +CVE-2012-1597,0,1,d2926cf07bff6fa8d3285c0ae1023fbeb1284d6654c923eddc9fd9bab44f4707,2024-11-21T01:37:16.760000 CVE-2012-1598,0,0,baa55d1484c0967038499e2622c127e4f7880dbe065c4ac86a2ac03ed3c03785,2012-12-04T14:49:20.197000 CVE-2012-1599,0,0,0c31bc78b8ce00d3c8da6d3abb5848aebd9393ec212c45eb26c66e3d1cd314e0,2012-12-04T14:54:09.100000 CVE-2012-1600,0,0,b34605e41f79ad166e92d2599c690c05c65a204e37c39658b64171c5a1d39abf,2023-02-13T04:33:14.730000 -CVE-2012-1601,0,0,093b58a8582652d0510dd8fd9e18b325524c80eda78130987338708f71aafb53,2018-01-05T02:29:29.007000 +CVE-2012-1601,0,1,b64ee847948f1bdfb7c6917ae625fa2bc5719841057818f617e49c5a3e543c15,2024-11-21T01:37:17.193000 CVE-2012-1602,0,0,8966b6f9048753e0334f5ce1a8c153c211243f66aa0bcaaf1762dc8c8ffeafbe,2012-10-02T04:00:00 CVE-2012-1603,0,0,3bd26f7d3385d91d82d5e1e39098f6b2a41f35a275d3e5ccdd03b62f2a4e92f1,2012-10-02T20:05:33.443000 CVE-2012-1604,0,0,401284ece61dbfda4b66fbd5eea60dbf52d7d148a312fc76c087b097fc6332d7,2012-10-02T04:00:00 -CVE-2012-1605,0,0,3ac197b261bd7a13b08f95688f468bfd450f77274213dbcf25ad974c2a5661fa,2012-09-05T13:46:54.630000 -CVE-2012-1606,0,0,88e78bac4e05f066d8df386d881eccc9a08d649dabd47dda5c1f588c3d7e7ff5,2012-09-05T04:00:00 -CVE-2012-1607,0,0,68a4fdb47bff045669ad552f97566fcece1eef09778be67ca351deb0001033d5,2012-09-05T04:00:00 -CVE-2012-1608,0,0,1f629e97982147f82d3d646745bb50310e6914470b4d51909950e31aa38942e1,2012-09-05T04:00:00 +CVE-2012-1605,0,1,82f1395ee9b82f78e44ae5037d8cf6cf5b8d1b00e612132b78646ec635a8c51c,2024-11-21T01:37:17.643000 +CVE-2012-1606,0,1,11651356f3b0315502acc99fdf1d195ccf35bbb2dc6c3c525dc3de8775b47110,2024-11-21T01:37:17.747000 +CVE-2012-1607,0,1,b81a60616c641a145e2e255700c503b22b38593937ccd069c84f2de344cdda87,2024-11-21T01:37:17.860000 +CVE-2012-1608,0,1,d12250ea613206c1e1250f514ac7b7398dfce188f4c23000cdbb17ed2aff7e71,2024-11-21T01:37:17.963000 CVE-2012-1609,0,0,282bb43d77cf478b42bad07663caa041b7cea0aa4ada352840c1984fe434e9e9,2023-11-07T02:10:16.810000 -CVE-2012-1610,0,0,4a6cde7cb11d4bc1d997801f0bcbfacf5e71a1724155237213cf608a0dd18be7,2020-08-14T18:47:03.687000 -CVE-2012-1611,0,0,e63c67b6b4051f9ff731de7733421307846daf6d8f3474ab20187b9b06483db0,2013-10-03T18:31:17.893000 -CVE-2012-1612,0,0,db36d5ce3e6ebdea4e6ab8d81bdc9e324ff289dcb0f08d7f8ab20a2d0035a479,2012-09-07T13:46:49.210000 -CVE-2012-1613,0,0,d7fc5269528badf8a7651eaece78a13fe2c56b354755b08da96149b8b03937de,2023-11-07T02:10:17.067000 -CVE-2012-1614,0,0,b59386c0ef2c28a5c3837fc5e810f1946c4d0cc6bf4bb760565fff0f06434a01,2023-11-07T02:10:17.147000 +CVE-2012-1610,0,1,2e7bdf7588c1855d1311d6006a2cbb2facab3ec17edcf50295cea26ae946ecf6,2024-11-21T01:37:18.087000 +CVE-2012-1611,0,1,a52a3602e7e4d1d379226c114b7aa42ece2f8611fc3c82a9654e5557852130ea,2024-11-21T01:37:18.200000 +CVE-2012-1612,0,1,20442a1a828e3917c73bf7d37d32c41a13cd52a7687477e5916d01ace39b1f31,2024-11-21T01:37:18.313000 +CVE-2012-1613,0,1,ad5a892f9b9f2321028fda41a6f6362c5d9f8c1bba662abfddd95d5dc3500b18,2024-11-21T01:37:19.247000 +CVE-2012-1614,0,1,d8f277ee83af712ad1ffec1fa17d691a66f3bf5fb6c966ac3a95bc6c6e8b3291,2024-11-21T01:37:19.500000 CVE-2012-1615,0,0,654d679e40787420eae6679ec4834c6418316f8964fe36a97d2903338d267ebd,2019-12-16T16:29:13.417000 -CVE-2012-1616,0,0,d37ee40df7820433b1f95e1bdc2948b8b53a68f6458891cedecd6273b38e6bc8,2017-08-29T01:31:19.680000 +CVE-2012-1616,0,1,b3b62d482106210fa686c50f70f8e10066b7d76c0fce2f4b80a12a573ea1f15b,2024-11-21T01:37:20.090000 CVE-2012-1617,0,0,800a6eba65af001b06abda1edf56c47de6fcb0a33d26f67c8d01cf2f4ddda1bc,2017-08-29T01:31:19.757000 CVE-2012-1618,0,0,816253cc082d4769db724b63468c511b822de10117ac550ed0b4e28f81b92358,2023-11-07T02:10:17.267000 CVE-2012-1619,0,0,11651354776600b56a5c9298391fa823ec5cca243b3ded2531ea87b2aefe9c25,2023-11-07T02:10:17.320000 -CVE-2012-1620,0,0,b85f07ec3c959be7f11f6eba25ff5b780367853df1016b2e804e59a11492515c,2017-08-29T01:31:19.837000 +CVE-2012-1620,0,1,612c086f01fec008d8ed638699d7cf953cd1e3753e51ddedb1d67f945be93cd4,2024-11-21T01:37:20.440000 CVE-2012-1621,0,0,bf43986e1258e39d0551648b02484a6b1df69da3c639f2f48d93ae00ad2a7430,2023-11-07T02:10:17.547000 CVE-2012-1622,0,0,b46d382853ae3b67e60540a667045839ed14707a28f901d2b5fa8ca5b64a8a4c,2023-11-07T02:10:17.620000 CVE-2012-1623,0,0,ef6b1dc855c594fb8039860d64ff44094c989826836f8261b7f219976a02d2ca,2012-10-08T04:00:00 @@ -53283,22 +53283,22 @@ CVE-2012-1631,0,0,4049769ea86c1c098132c8be3ed63a9996b43812350c4e05fedc4e5cf2c01a CVE-2012-1632,0,0,d126672ba8e554cf57db4e1f8ee5be4f81b4b246682c40fcfbc06b701ae7470d,2012-09-20T17:51:57.530000 CVE-2012-1633,0,0,eca97ca8ec75634811c184b7dd03a50924eb3ee5a35f6297843ad9f5f6119a18,2017-04-29T01:59:01.240000 CVE-2012-1634,0,0,14e346fb548a85a1bf559e0ab3a7336367ebbeeee36eb6e4e525c19e7efe8383,2017-08-29T01:31:20.337000 -CVE-2012-1635,0,0,ec76833672e315491fdb1b8734992be67febc166a657f78c120b85278d84571f,2012-08-29T04:00:00 +CVE-2012-1635,0,1,60f75f09e664cd16428a152c3f81366dc92a05a922dd8bc92572ef3eb5aaf343,2024-11-21T01:37:21.990000 CVE-2012-1636,0,0,adb8eb2a79e31c61c55a543163be5b6af53a54221c2802b671a336ee6bcff29d,2012-10-02T04:00:00 CVE-2012-1637,0,0,eb30a221f5fc9526acc1fb3af08899c298c41a6218632860334999f09436cc63,2019-12-11T18:58:31.127000 CVE-2012-1638,0,0,1f69d94c1fab93d9a1968f93aafac8beeeca006ff1c63e1c163536176a636d2e,2012-09-21T04:00:00 CVE-2012-1639,0,0,61225775574d7d2477f12981d5b0c751a0ba884eaa9f8c583e40d8911fe44808,2017-08-29T01:31:20.397000 CVE-2012-1640,0,0,2d899914e3d7c25131c05e0941466d543d1e4e94582e80547b240863eafae1d3,2017-08-29T01:31:20.460000 -CVE-2012-1641,0,0,e6ddaf7519378172ca477db402a123093fede30e3fe10947a040f56bd5994eab,2012-08-29T04:00:00 -CVE-2012-1642,0,0,8135c59fa31ba66ca6b867571262fe645ab2d6738a6d8b7223d50ed5e6a45a2f,2012-08-29T04:00:00 -CVE-2012-1643,0,0,c681bc6667ab02246bf02fddec9dc1cea666c881e3fac09387715e6f0c87570c,2012-08-29T04:00:00 -CVE-2012-1644,0,0,2c5a4d2743fb74e37d3e77c3144a5516464e7f0adcd41b669757228c39b6d1a6,2017-08-29T01:31:20.523000 -CVE-2012-1645,0,0,7a6ae5ea3eabf19177da51fa833d71b5de76f8d2e8a99d054500aac236de43cc,2012-08-29T04:00:00 +CVE-2012-1641,0,1,ef96cace1c25c29514ee03f2e0e90153a0869a3af61b717862e434a820ca043e,2024-11-21T01:37:22.607000 +CVE-2012-1642,0,1,0b438e5913c50669973b775588f4185cba8c4ff9c84263e5af8905fb61327bcd,2024-11-21T01:37:22.733000 +CVE-2012-1643,0,1,7946db592ae9d1987f086f73ee46c95c0d3246567dbb25191eeb2f2c4314406d,2024-11-21T01:37:22.857000 +CVE-2012-1644,0,1,ea20dcb6f0a92ab6c716014cc717d051dd186230c63d3f3903a15e60d716fd51,2024-11-21T01:37:22.957000 +CVE-2012-1645,0,1,9c8fbdeb5851cfd878f8fe2b6e9939421c16e80885d44ec66f3429dbd699136d,2024-11-21T01:37:23.057000 CVE-2012-1646,0,0,fa57422dcc6474a7f90723e26e50f122fdbfabe53ca4a1bf5041556aa74dd057,2017-08-29T01:31:20.587000 -CVE-2012-1647,0,0,3b3de5754deadda0d98588bb7c51678f45d57d12979c56e79636c0af49e50304,2017-08-29T01:31:20.647000 -CVE-2012-1648,0,0,a99cc74ef88a1eec9132e0616d3174377b4a75bb7760504804e553d209dd43d7,2017-08-29T01:31:20.710000 -CVE-2012-1649,0,0,54c8253c2bcb0bae6cf4fab3f437ad1f93b70c4b7a94ccff36a95de809e53426,2017-08-29T01:31:20.757000 -CVE-2012-1650,0,0,554783fc06e434522812dc36d35fab1a64ce569e2094e61154b551661db4cc76,2017-08-29T01:31:20.820000 +CVE-2012-1647,0,1,c04421aa7a9b34803a1d8937cd7600022585f609bd8f1525ef5fd5b3642d0c5b,2024-11-21T01:37:23.273000 +CVE-2012-1648,0,1,b345764193606cec4ebaabef7c814c385ef38f3e0c33aec3322d282176aeade8,2024-11-21T01:37:23.380000 +CVE-2012-1649,0,1,7033582e65d570b0b0085823d58ef0adbba4cf40f06bbfd19bd24a2de3d30b5f,2024-11-21T01:37:23.487000 +CVE-2012-1650,0,1,08fb234936518875203fd04cd7f7a9710a4796b7601b559554c6649c6c516cef,2024-11-21T01:37:23.590000 CVE-2012-1651,0,0,fcc1f3ee5603a111377914152f21ae5eba56ca070c84442189b6c985f76dc255,2012-09-20T04:00:00 CVE-2012-1652,0,0,addf198c7972e3a33d34faab50733e9cd7dac4f7185769a3de5178df46a1c511,2017-08-29T01:31:20.883000 CVE-2012-1653,0,0,e187b853a20798eafbdbdb69e29445a778913f87eb1aacd2c355ec37086a78fe,2017-08-29T01:31:20.947000 @@ -53309,235 +53309,235 @@ CVE-2012-1657,0,0,7462e3b7f0f867320cd68c6bbb80948d5e6dba653da622e7160eff7e5f62ef CVE-2012-1658,0,0,560e2e981abfe6f659323e61516988fffb3a37e7b67c4bef344d1bfc4a28d4bc,2017-08-29T01:31:21.197000 CVE-2012-1659,0,0,639034ca9f07c790ac2ef492bd5f3a40aa5601fef1156b2207387f576c231b4a,2017-08-29T01:31:21.257000 CVE-2012-1660,0,0,1a1fdc233e49b7e2a63c3ad5e101484443bfa62fa3d16cbf9d941cdc05dda569,2017-08-29T01:31:21.320000 -CVE-2012-1661,0,0,66338164131b46ea4354bd8bab41e9b1d37f24f7e8888b9af6e1fe51fb8593c3,2024-10-10T14:30:09.217000 -CVE-2012-1662,0,0,2df8f900483fdb6e6d54cec6aaac270e11c4a2838e3af3b4f9303c89b71d90cd,2021-04-07T18:14:30.630000 -CVE-2012-1663,0,0,00d8eac9ff6a370e8741d1cbc49fe92781178c0b399b9b789308565363c2dce3,2017-08-29T01:31:21.397000 +CVE-2012-1661,0,1,854fd02b7bc570a545bd4dc57a7e1fc32e769f06d43cde5752d9abde38d1e445,2024-11-21T01:37:24.733000 +CVE-2012-1662,0,1,a8e52b5cbd7a0c55e60225af64ef2a4050da74f639d76b797676af1465272809,2024-11-21T01:37:24.877000 +CVE-2012-1663,0,1,90a31d3b8e58f42eb2dded7daa0df4ecd575d088833b4c707878341336410e4f,2024-11-21T01:37:25.010000 CVE-2012-1664,0,0,e390080a910fcded0c4e326becb2176e4d6c58ba3c30d9da61282ae32886d178,2015-05-21T16:53:13.197000 CVE-2012-1665,0,0,b955da39bbc435cba64d676f57b9c45a5d8f24723119163de7a1ba780da6e254,2015-05-21T16:54:28.180000 -CVE-2012-1666,0,0,02f85ccbc95a1f863376d1e62578d65b11520b24dc6a1757e194259c4be61d4f,2012-09-10T04:00:00 -CVE-2012-1667,0,0,4683947e74d42b1fa7c52d563ff6eada23e5090bb5a313d27a38fddb6ad2ff21,2018-01-18T02:29:13.867000 +CVE-2012-1666,0,1,77d6f07633b55b9facbfb469bd7e68fbb5d2a29bbf76c8f8b5b2b21f982228c4,2024-11-21T01:37:25.423000 +CVE-2012-1667,0,1,737c1b7f9df8a2e84fb781e46c5c2e8c9ec20077d4e2b076f82db608c805e1c8,2024-11-21T01:37:25.553000 CVE-2012-1669,0,0,58274eb3a1902467d5176b5f649960e5b69a3f8336ec638e63287964ed50a3ad,2014-11-18T12:52:36.377000 -CVE-2012-1670,0,0,318fd690cd4b0bd1ef7011c94730ea9504e48151e05b2fb0947468943323a0d5,2017-12-13T02:29:06.263000 +CVE-2012-1670,0,1,90c59f2f10daa785a8faedde5ea9dd2ceabd791fa7d47aa2ad61b9224270bfe5,2024-11-21T01:37:25.867000 CVE-2012-1671,0,0,710e083e9f1a48b8b5b40c4749ac5ba7064fde2eef4f96dbd6ddf82f425aa1e5,2013-01-31T05:00:00 -CVE-2012-1672,0,0,3ebf00e3841f78b6f9dc1c4feb5345a4a0bc473a802184e09ba7322ec35ed84f,2017-08-29T01:31:21.493000 -CVE-2012-1673,0,0,6475d305ba63713ea4b1aa18477e643566c0efa848a8abbd0e23f9b92b4b1f26,2017-08-29T01:31:21.553000 -CVE-2012-1674,0,0,c0936377463ea882fdda03ee46593c088c9984f313a7745d42dff1ccef8970a5,2017-12-07T02:29:11.240000 -CVE-2012-1675,0,0,5406791f90d5b568f398e04db774f64080e59a5ccf5c297a7dc0badad375e4f5,2018-08-23T12:51:09.087000 -CVE-2012-1676,0,0,fefb1c86c694267e0f97e94000348ec56faab59eaf8a5d37348f8220f2fcbddb,2013-10-11T03:42:27.880000 +CVE-2012-1672,0,1,3f8abd2ca148a3c16df73fa9da50c857e5909489c1ce0ee4aa91bada11a5d26f,2024-11-21T01:37:26.137000 +CVE-2012-1673,0,1,6bf4ccf3b547f24f9a7b94abf86090457ce79101e6b6009b207af2fa84b078d2,2024-11-21T01:37:26.263000 +CVE-2012-1674,0,1,0cb525a5c283ccc47ca4c5e709267395365f2dbb6bc78fc9cad63ef2cf608a42,2024-11-21T01:37:26.393000 +CVE-2012-1675,0,1,17374e0e4b8f042304dbd78ab1f6d9d6740af0963b66a1333d1664cd9acd7a9d,2024-11-21T01:37:26.503000 +CVE-2012-1676,0,1,88219029dbe7717407ee530aa324ec0eaa9625322c9d86d9e4a26b325eecd635,2024-11-21T01:37:26.627000 CVE-2012-1677,0,0,ad959d1fcfd3ed983b087c1343d4441ed154e1380a3068af39724d74b15ab9e3,2013-10-11T03:42:27.943000 CVE-2012-1678,0,0,116bfb7867518b23978e11703df541bfb4e20921efe63e196e676592565faa66,2013-10-11T03:42:28.050000 -CVE-2012-1679,0,0,381258125a6bb2a524287b6aa9a8c39a1f55d97c8dbc6351f2f97889cd6f1099,2013-10-11T03:42:28.130000 +CVE-2012-1679,0,1,12d1c2c39765d4d52d752f54a4abb9cb59e24460331feb05e0c2858893c107a7,2024-11-21T01:37:26.940000 CVE-2012-1680,0,0,6bc50988cbc7b3d9ac5621c34fcea120c7e95c4b38028251fac61dbc41515d07,2013-10-11T03:42:28.240000 -CVE-2012-1681,0,0,a78d8127ffefb0aee93aab4d9eb1c7c2e9e9ae0e00ad0e392eb66ca00927b0ed,2017-12-07T02:29:11.287000 -CVE-2012-1682,0,0,a485ba194ee990896f5781b6f0c5d35b2fe97c2eb721b2ed743f1bfb9b16cf42,2013-10-31T03:24:30.020000 -CVE-2012-1683,0,0,2e4170dc079baf16c34cfa45d534b20230609e26d868e79b473dee60374bbccc,2017-12-07T02:29:11.350000 -CVE-2012-1684,0,0,db2d0ea95a9e28986ad7bad62ee9af817c91dc055810b0dfa4d68ded46e65eb5,2017-12-07T02:29:11.397000 +CVE-2012-1681,0,1,d9b47e92bb0bd7bbc6e87efa2cac3ac8ad18adf38073386cabe62c0742c98c7c,2024-11-21T01:37:27.147000 +CVE-2012-1682,0,1,a919aa5eb607a64a45861729ffe4a9bffe73dc67bbe29fc8a67ec5a255da82de,2024-11-21T01:37:27.257000 +CVE-2012-1683,0,1,d5c1fb43ee2dcd941f2861890c17cdf15c0027d9c6fcc8d750f4275c322ec8b4,2024-11-21T01:37:27.373000 +CVE-2012-1684,0,1,ebf8f05341907e261d83de041463eade16a95804942e5576017ad7ee507dfade,2024-11-21T01:37:27.483000 CVE-2012-1685,0,0,1db1717687e7b6815efe63380cb42a3d2156cc39090b4dcc9ae5821f7791827f,2017-08-29T01:31:21.727000 CVE-2012-1686,0,0,97314ad621c22ce37411d6e2f0b0707d290285bb66de82366d363fbb7f8433d1,2016-10-05T17:22:27.693000 -CVE-2012-1687,0,0,5c131805776ec8ed5d8edf35d3d8b3b75de1f80672a0e82a37d5d37ee88ad90f,2017-08-29T01:31:21.790000 -CVE-2012-1688,0,0,d90404ec3add3126eb5230890ba51c3abbe989f747dfa18677c2293ca191d000,2022-08-26T20:31:51.417000 -CVE-2012-1689,0,0,a5056d0bb76c6dee1a9d33d7b0567382cdb7c80288a76f262984ea8481931270,2022-08-26T20:32:05.380000 -CVE-2012-1690,0,0,95ae6ee4a92ffbfb42147ef250eb49a16ababce9d50567356c45d9d543419380,2022-08-26T16:22:59.410000 -CVE-2012-1691,0,0,8e4039c8972dd70770e84d66c6620632ebfbaec9465354317f8c50ed57c470be,2017-12-07T02:29:11.617000 -CVE-2012-1692,0,0,8714721c93aab715216f3664666c12dadb3e13cee10b7d58cfd38ce1225083b2,2017-12-07T02:29:11.663000 -CVE-2012-1693,0,0,95175a574745d8222b7d603dee12dd62e6154abc184ce8af827d6e87c5a26ba9,2017-12-07T02:29:11.727000 -CVE-2012-1694,0,0,1cefaf9f58d117b43cd2e076bdde376899ba2b0efcbfec634a9988ed683bae2e,2017-12-07T02:29:11.773000 -CVE-2012-1695,0,0,edda0c480fa59b38357f331d39c44a09dce63da98625db3fae022d53f3b99aa4,2017-12-14T02:29:01.387000 -CVE-2012-1696,0,0,4cfb11a64b70dd568d704768c287e4b36ef3588047aa2a0d64c3fcd8b55717f4,2019-12-17T20:23:43.220000 -CVE-2012-1697,0,0,d4bef9a2e6e7bf58115919dd983a5de85dc26421d77cbd7f221d2909d8bbcbfb,2022-08-26T20:32:57.033000 -CVE-2012-1698,0,0,bed35adbe010a6086efe8e4e39b23b06326d4d42f66a1aaed31cbc93f1fabb21,2017-12-07T02:29:12.070000 +CVE-2012-1687,0,1,bf08cf1fb4c9ef6799983625a2fee36cf913412da4c74049d89359f7aaea1cc9,2024-11-21T01:37:27.820000 +CVE-2012-1688,0,1,147d542c1083ae2e81c14d9040f53fb1b183467c38ce2f83cc83810782c2609c,2024-11-21T01:37:27.953000 +CVE-2012-1689,0,1,5f025b6cc77bcb368a07244e41f92cb3eaa554dfe1c9e3792c8d61052d44f838,2024-11-21T01:37:28.107000 +CVE-2012-1690,0,1,ed59cd7598fd4b3e558b2891d9b66983d3c1ca4f0f4a5b935bd45e094b4f8013,2024-11-21T01:37:28.237000 +CVE-2012-1691,0,1,01e7f0ff76bd4d6df100d8bcbf99a9014aeea445cf37390ebec39263441fa78b,2024-11-21T01:37:28.380000 +CVE-2012-1692,0,1,acc7382ff5a046946ca4e1dcf0c4f87afb5fbb271fb5aba6d1130e8b8050fe7e,2024-11-21T01:37:28.500000 +CVE-2012-1693,0,1,eeef506497fda671aeeae047547a53399cc3e019efaf6de088451478dd1063ff,2024-11-21T01:37:28.620000 +CVE-2012-1694,0,1,631505e8be1ed4a20aaf1b367c7f0037c62ed50d16204d9e967c9e1fd82cca18,2024-11-21T01:37:28.737000 +CVE-2012-1695,0,1,cf9dd16289d0e8ed04e5380791a619918066b6a70fa696d9ebedfc6cd8ea2b9d,2024-11-21T01:37:28.837000 +CVE-2012-1696,0,1,b9aacfff2f1f20827722f5f6d01e17e001eb08cc8b887faa426a1d89689f83e3,2024-11-21T01:37:28.960000 +CVE-2012-1697,0,1,0f0bb356684bb41321f970603470367d19ba746506357cc35ac8d51de32cb760,2024-11-21T01:37:29.110000 +CVE-2012-1698,0,1,e679eb53d4e629ec381095a54311e8efada603a0bd2cced94aaa69df9465b03b,2024-11-21T01:37:29.253000 CVE-2012-1699,0,0,d8f4d7b75ed7e378ebbacbc2e576870fdef79fd8191982f12154db5a2eac71ad,2017-09-19T01:34:47.323000 CVE-2012-1700,0,0,0b02f539f4228b81004219ac5b3dc987d7cd12bf9438e7a343c6fa1219e57cc0,2013-10-11T03:42:30.677000 CVE-2012-1701,0,0,71e9e0d485cd6349aadb1939055aa83259fd4cb5eba49dc543205131a591af23,2013-10-11T03:42:30.740000 CVE-2012-1702,0,0,a77adac454293f553869ea01097891c556019c3700beb472505e3ad1ae74eae9,2022-08-04T19:55:36.320000 -CVE-2012-1703,0,0,5d48a09bbb7dd444462c2200ddb4cc5257b5ac53f81aa3fd625ddd8367ae4c47,2022-07-01T14:10:24.997000 -CVE-2012-1704,0,0,ac7e6a102dcaf124f654984e09106d7a7689c23d7bc7b449190802f214894f26,2016-11-22T16:17:55.537000 +CVE-2012-1703,0,1,d26858e6c431e3e5dbfa6ab10832e94ebd44b51e24fab603afcf4f2c514b7155,2024-11-21T01:37:29.827000 +CVE-2012-1704,0,1,7ac52cf51031a557745ca3a0bf8071945f6924be5d1771da248e449684d0c601,2024-11-21T01:37:29.980000 CVE-2012-1705,0,0,8a7ff0107332cc514960bda57a3a9306a72004a3dd870aa307cf5ea99580b441,2022-08-26T20:31:42.183000 -CVE-2012-1706,0,0,654f640968b1535198959844c85d761e4fbd7c4adf726dcf2ad75f0fd1358f4f,2013-10-11T03:42:31.207000 -CVE-2012-1707,0,0,88828a68d95c1675802c3db74c041c6422c5520625d6deb4db72028bd40211e6,2016-11-22T16:17:26.420000 -CVE-2012-1708,0,0,187c7d78745a942d7d135861de623d34eb2d526706fbb8fe3e51b2905c0fef81,2017-09-09T01:29:01.143000 -CVE-2012-1709,0,0,b078d24def5f86db282a74100704cb10f5c178f780e5e595dd7222bcd7a07bac,2017-12-07T02:29:12.210000 -CVE-2012-1710,0,0,dbbd79ad014b44278171363c179b7c8b76f266cada6520a4b042814f693b4c8e,2024-06-28T17:24:50.570000 -CVE-2012-1711,0,0,1c6b8d55e8d3ca7baa16f8da1b744cf9b438ca38630f4c5caec2c4dfebeea929,2022-05-13T14:53:00.377000 +CVE-2012-1706,0,1,8f9e707103aab39544a228204fcde71e6b4139a0ba2b3de9d8ba6a1d594d3a9e,2024-11-21T01:37:30.257000 +CVE-2012-1707,0,1,c8d04645433ced5499bc50f034260e12dd0a976e13a8958faf39d48512fdce76,2024-11-21T01:37:30.380000 +CVE-2012-1708,0,1,5b4bdb23d7eb0ec90d30b4644b01c026d20b370ae7825c17a59737185e2f80d8,2024-11-21T01:37:30.513000 +CVE-2012-1709,0,1,774955539b439811df7f377bde942ea0f6b1c6bb650cbf4af1ea4ad71cce9c58,2024-11-21T01:37:30.627000 +CVE-2012-1710,0,1,22bfc90518fa3904e01fd2154bb57af9a7acceed8a4cd38bb0e9e6bf0a91f3d3,2024-11-21T01:37:30.750000 +CVE-2012-1711,0,1,4ff89bfa69b220f71de759dc7e25bfd41c33b0be71be61cb918d5589a66b1b80,2024-11-21T01:37:30.883000 CVE-2012-1712,0,0,17f4cc6ac20a0fe071c95e178e4375b28d47ba5c27bbe79cd58a5a64a2e8673a,2012-12-21T15:05:28.847000 -CVE-2012-1713,0,0,116fbe4a0e9cb0d26123b17d1490a52fa0f262606efbe12cd5932232a8a2a872,2022-05-13T14:52:57.120000 +CVE-2012-1713,0,1,f7c2510d9a1b77609164887de0cada72e315afbf8204068e9295f9bca0b843c4,2024-11-21T01:37:31.117000 CVE-2012-1714,0,0,63a036bee5dc5be980600b2c238e8f17ff376e0040d1cf3db1935ce3c855671c,2013-01-08T05:00:00 -CVE-2012-1715,0,0,80f04292ad5b6a69087e315b83442b37f895dc11147a7c2281140274302d98d5,2017-08-29T01:31:21.977000 -CVE-2012-1716,0,0,25a20bc7f030f1dd32754a44876818ae5087a4c462a98d5cfaf9ca6893a2f41f,2022-05-13T14:52:55.690000 -CVE-2012-1717,0,0,fc516f1fd61601fa6419ea06a16ab84bdc9810b632bef3baf157579412acf47c,2022-12-13T17:00:38.410000 -CVE-2012-1718,0,0,b30a0730a103bdf6db509d890ec082f74eabc6862a461b2eeb44f6138e21a145,2022-05-13T14:52:55.303000 -CVE-2012-1719,0,0,05287759e282b02dea4962dc11e4afffae454ddf9dfa885d2ab163355389ce8d,2022-05-13T14:52:56.570000 -CVE-2012-1720,0,0,29d40b7d3e84f0cb5e2091f696640566a520cc661af1407a5586431f0250ef9b,2022-05-13T14:52:53.353000 -CVE-2012-1721,0,0,fd5a014d8625a95549bd8eabcadfd09038c55b8ef0225b8c52430647243c9f9f,2022-05-13T14:52:54.230000 -CVE-2012-1722,0,0,45d28b00cb7942831f6ca690d916820c8cabc4495024dbe66e20996e17794d8f,2022-05-13T14:52:58.057000 -CVE-2012-1723,0,0,4377f1a2b03143c3c20dd38ef47ade107f57df275c109977b8196debde365e30,2024-07-16T17:38:00.953000 -CVE-2012-1724,0,0,8c9c10d277ffff38e5b0874d006db12940dd83ea0b230ffd9d521674d473afaf,2022-05-13T14:52:55.103000 -CVE-2012-1725,0,0,6257e96cfe545cfa35a36320cf1b02f67eb3418124d098e11f214e4b99350144,2022-05-13T14:53:00.330000 -CVE-2012-1726,0,0,319681f274770eafc03b8aa95adbad5ff7d8f21001d9e890fe5061ba91fe98a4,2017-09-19T01:34:48.370000 -CVE-2012-1727,0,0,18d8480abab58f19d4c136629d102e7a413c1c4f033de024277bdf08575b4007,2017-08-29T01:31:22.040000 -CVE-2012-1728,0,0,dc34648d7cf2e7ca7319e22e4ef791bba576176a44894879960f6bded575c848,2017-08-29T01:31:22.100000 -CVE-2012-1729,0,0,635bfc367fd7912526d8458868977c62452ab5873d73c66a91b68c4ef76dfc3b,2017-08-29T01:31:22.163000 -CVE-2012-1730,0,0,3a5da02d983650b2e1fc4953d311c043fb590d9e26b08d4acb0f173f400c2077,2017-08-29T01:31:22.210000 -CVE-2012-1731,0,0,d852edfc0fb3c50430b3d5dc01fcf18e554ee896643b2948a6b564069471ece7,2017-08-29T01:31:22.273000 -CVE-2012-1732,0,0,d51ad0f8f3de5a6e520e22e5f39975f9a12a7009da2e81bcee50201fc6a09ece,2017-08-29T01:31:22.320000 -CVE-2012-1733,0,0,ceacd412cd37d03de883b4fd2935c2cdf3f8998a241bbdd22b4bf0e4e6557f9a,2017-08-29T01:31:22.367000 -CVE-2012-1734,0,0,d6b74f4d5000e9dd74dc62e0a743d4139d4f92f109af5d7d6b4d90b4f23a224f,2022-08-29T20:53:59.950000 -CVE-2012-1735,0,0,c164a8817b0e453e9b5287cafbdd9147c4f6e86183419ae58458cc7ec703fcd4,2022-07-01T14:05:38.807000 -CVE-2012-1736,0,0,deba7f656ff7f1f6f0f05e94522ee98ee06519eca340cd4a665294783ec32d87,2017-08-29T01:31:22.587000 -CVE-2012-1737,0,0,0ab07df7c0dc5099e9a5f20c140318368735dd23d365021be993d347a9cfd681,2017-08-29T01:31:22.647000 -CVE-2012-1738,0,0,f1710ae7a41f2c3ecfe54bdfb6d96fd6941675d83e34a177684aaa5d04a08cae,2017-08-29T01:31:22.710000 -CVE-2012-1739,0,0,aed54abbbb64f199a9d38a70f953eeb6bd1a23e66b47fc8ba4373c7fbaa9b23d,2017-08-29T01:31:22.757000 -CVE-2012-1740,0,0,68c5679beb2f4ede3681326247ee88d00bf462355c1172b3e31b35db4258979b,2013-10-11T03:42:33.910000 -CVE-2012-1741,0,0,2a9f80e2d68a803f2e8078ebcb195b22ec5a45e916f085c1fb615c9270216f4a,2017-08-29T01:31:22.820000 -CVE-2012-1742,0,0,61c7fc3480f523a0a0b5a0ea11a50a4a120560db0e91eb8cc37d1fbf5c019e9f,2017-08-29T01:31:22.883000 -CVE-2012-1743,0,0,f3736c085716e4564fdb503e653d6d72eac723cf4a4d32d00e001cd95c6d7043,2017-08-29T01:31:22.947000 -CVE-2012-1744,0,0,039190e957349915e90fe74b593d365025b79bfdd1831ccbe49f6b51126782e9,2017-08-29T01:31:23.007000 -CVE-2012-1745,0,0,d4af3301659931c53cc4cbc5eec817a2e6e8c28b336013a1e4e52fb05ed8f580,2013-10-11T03:42:34.380000 -CVE-2012-1746,0,0,ec3dde0ef389c59aa721282e1574120f1783fa94860e316367d90aa72443fe20,2013-10-11T03:42:34.457000 -CVE-2012-1747,0,0,050becc2657c85d29d8b73048b872273733ac2a6bf1ae7ec9ef1812cf1f9ec62,2013-10-11T03:42:34.553000 -CVE-2012-1748,0,0,44c7698556e8620f62f6d6fa8c5b728bac7777b0341bb8585922317f2f7e15c2,2017-08-29T01:31:23.070000 -CVE-2012-1749,0,0,8d94477e9ad942b375127ef9523ec2b3384776f83ef6707c9f22501030b2547c,2017-08-29T01:31:23.133000 -CVE-2012-1750,0,0,3c53662339a9c267bfd94ae3c18ee652eb844ef2edfbcb77040a1e261e94306b,2017-08-29T01:31:23.197000 +CVE-2012-1715,0,1,2382d3aaee0905e000708bd231123492422f26a58e39a5dae8ca75536b721781,2024-11-21T01:37:31.407000 +CVE-2012-1716,0,1,cb5a09f4c7f9c61771163dce7ba6c3aad2dbfe6e996c7772934b65543113f496,2024-11-21T01:37:31.613000 +CVE-2012-1717,0,1,20a0d8c7faeaf314e7ef4553ee441ab881ef7b4076adac8afa0a16c8f96efbcd,2024-11-21T01:37:31.870000 +CVE-2012-1718,0,1,d777ce87b18ea67ba50f3306efd575e1709b8861760a0064d039cdfcd6370994,2024-11-21T01:37:32.213000 +CVE-2012-1719,0,1,5a91671a8f3c3d9c06678413824fa347c4b545912069c67f61ef5cf8ceee87c8,2024-11-21T01:37:32.430000 +CVE-2012-1720,0,1,131800e987e10e458bf698d41a922fc9dc18b2caed4d6be6e573d896019ed40f,2024-11-21T01:37:33.230000 +CVE-2012-1721,0,1,4cae501cf59c71db7df812f6fc539e36a93f12dfb45e5e473af21f0ccf3f9db0,2024-11-21T01:37:33.410000 +CVE-2012-1722,0,1,c260f2c221d78f9ec6a9b6fe2c63ed0f3e245bdd8ac5fc261380beafff2a58d9,2024-11-21T01:37:33.600000 +CVE-2012-1723,0,1,ee4b62a77151525e1700dd4ed669c9a9dbf88e2b5d495907777411510ab4d116,2024-11-21T01:37:33.773000 +CVE-2012-1724,0,1,6c6b0b2ea7c18967fd8e99064918b590a1b60b87e4f24e1a33ea832b6d8b04c3,2024-11-21T01:37:33.983000 +CVE-2012-1725,0,1,e2fd96e9212c2c1a989e7febf6ae7c34c9856442fc2de8c43ad1c9c93aae527e,2024-11-21T01:37:34.177000 +CVE-2012-1726,0,1,836cb352914aee98cf18e361afe68ae76cb3bfaf63da55e3f0ce816a83689c59,2024-11-21T01:37:34.387000 +CVE-2012-1727,0,1,428b8036cc15f03bf534a1851b7ba3d75f32f87369a8e9f4111d8b4747e1f7af,2024-11-21T01:37:34.553000 +CVE-2012-1728,0,1,a7a5e4074ae2756f818d106d70e164d4db3315529a4964908238c04ece5cc3dd,2024-11-21T01:37:34.703000 +CVE-2012-1729,0,1,f5b2d4badc496c74914f6534a05c06444fa84969af3ce3aa3ec1bbba8b8c6eca,2024-11-21T01:37:34.860000 +CVE-2012-1730,0,1,905fedf0b5cb19dcac41ac1005da357087b6742aa51b9094bf8b2de2fc422153,2024-11-21T01:37:35.010000 +CVE-2012-1731,0,1,d9b8f59e137ae956878d992fa35d17bf8fa2f005e92a9d77cdf990f9f1d04305,2024-11-21T01:37:35.900000 +CVE-2012-1732,0,1,1c1d48304bbd7a8498ab2ff0905689dde9a7f72410013aba3455d6cb9a402900,2024-11-21T01:37:36.053000 +CVE-2012-1733,0,1,6fb80957f220d8d8f7d4bebb71e063b9f5731d5399e487fe13229bb7fa8454c5,2024-11-21T01:37:36.247000 +CVE-2012-1734,0,1,3eb9ed9d92ffe4196f6dbbb9d4217f38fb01685ea334b7e22d5d7f8c0cc5b7b7,2024-11-21T01:37:36.443000 +CVE-2012-1735,0,1,679ef94e1aa680795a27094d52ee66d49493d9d4bb849e9d9bb7cc5d1e9bb1d7,2024-11-21T01:37:36.660000 +CVE-2012-1736,0,1,6e6d29cf3428b410598a69e911187e2edf8670a8c850088627eff5c8855f6604,2024-11-21T01:37:36.830000 +CVE-2012-1737,0,1,e3c6a8d748713f49c10a2ba0f62edd9549e26751041abcd508d0fe212bcc256a,2024-11-21T01:37:36.983000 +CVE-2012-1738,0,1,da3c54121ae0feb83c7af81c2ee11918f1bfe1dd2f722cd26e86e055f70aeacd,2024-11-21T01:37:37.140000 +CVE-2012-1739,0,1,08381bbd64d3bd33f650038fee927760919f03e4aef097d48ebe9957747141e4,2024-11-21T01:37:37.297000 +CVE-2012-1740,0,1,f2408660e154edb3477a362e8d99f8d96e48d69e8ddfb30dda0432ca5c6e45ec,2024-11-21T01:37:37.443000 +CVE-2012-1741,0,1,b5c54e362085281825a42787fd805ec7e7cd05b7fbd53a5d3ef95d7150404675,2024-11-21T01:37:38.107000 +CVE-2012-1742,0,1,f4739654bc1b80997d18ea1746b8123feb85100b63c9a9fa62e05606a761d79f,2024-11-21T01:37:38.263000 +CVE-2012-1743,0,1,9d0d849a93add10896c1a3553aaf21517c90d412793f2e68fd841f3857a710cd,2024-11-21T01:37:38.470000 +CVE-2012-1744,0,1,c31ba559ef9ed6a159e43b976f9213ca7fb001cb6693175b730822505e9bcd9e,2024-11-21T01:37:38.640000 +CVE-2012-1745,0,1,5ae0ece5acb5be88de194b3e5b096274478632797a6d5e1a64c079073978b4e2,2024-11-21T01:37:38.807000 +CVE-2012-1746,0,1,eabb2b7e05d2684871a06bd827ab9386eb41ff713e36b674865ac6f3510aaeca,2024-11-21T01:37:38.960000 +CVE-2012-1747,0,1,c2ce025910861501b8c715a9c9e1d1ca168edf84e48ea9cca1e95b260449672a,2024-11-21T01:37:39.117000 +CVE-2012-1748,0,1,da2e0545e20506b13cc453d65c62e0a087557418f4f4b2f76ad0fa13e656c57c,2024-11-21T01:37:39.303000 +CVE-2012-1749,0,1,3ff69981aab8ff15292a183776f52a844536660bd102c327ce90b0c2d5f2bdf6,2024-11-21T01:37:39.483000 +CVE-2012-1750,0,1,b375a2c9d0aa6c36bba4b9a40550ba6caf7f70a7415a858843f0433e562db257,2024-11-21T01:37:39.643000 CVE-2012-1751,0,0,ddd4a5fb968c0d7c7f4815d8128cf522b2c1adeeef07d4ac9186a64d8018007d,2013-10-11T03:42:35.007000 -CVE-2012-1752,0,0,f814857ed680bc31471c69daa8045760e2226a5109aacd7db4f5a7d70c5f99d8,2017-08-29T01:31:23.243000 -CVE-2012-1753,0,0,f17bdcc0a3cf6a06a87484fc5a484a69c5c2bd0854ea825534b4e24be95b53fd,2017-08-29T01:31:23.303000 -CVE-2012-1754,0,0,a7280b3d906c11334a83445c219d10054c7e74865066efe1b5510a15ff390c1c,2017-08-29T01:31:23.350000 +CVE-2012-1752,0,1,0c25c8e05cbba910405657de954fd0b860284f5e8d11dcada23ab728f69a07a6,2024-11-21T01:37:39.943000 +CVE-2012-1753,0,1,e26910b2ebd765757bd7fc8003ec576970c7626608e25d3c8f5c2d75d6f3c8b8,2024-11-21T01:37:40.870000 +CVE-2012-1754,0,1,24b6e91440ec4b191167dd1418b834620431749f2f3a8f149d9f9d31b9a7c7a0,2024-11-21T01:37:41.140000 CVE-2012-1755,0,0,e33ebdc3fa2fbb8e55492d75ced87171bb65fc50884da3c11a35daabd5393d03,2013-10-11T03:42:35.303000 -CVE-2012-1756,0,0,01ea4bdad071c0058de77fc5ca1444593128deb35beea43580202fa85d50e3fd,2022-08-29T20:53:51.573000 -CVE-2012-1757,0,0,6b9f45db0cf76e0921f6652776de25d77b97aa921b671a6257db73421625eb9d,2022-08-29T20:53:46.647000 -CVE-2012-1758,0,0,0f14a3019fc231c0819f5b1ae097134b68aa2f65fafbb9ac9a1d352fc8664bbf,2017-08-29T01:31:23.570000 -CVE-2012-1759,0,0,f58206dce06b3011a9bb9d78fb7af26138f22e6e15d449299c592fa69d545041,2017-08-29T01:31:23.633000 -CVE-2012-1760,0,0,d82dbb12a58f826532091bf47cc6459899bd2fce6c4668395d8798b5319c65dd,2017-08-29T01:31:23.710000 -CVE-2012-1761,0,0,74f6d94a64667b7beb5ca82e66fe22824386a609d8b354c49fc6be653ae7f8c8,2017-08-29T01:31:23.773000 -CVE-2012-1762,0,0,33cffdd06b5165d2a807a1818fab7d4f4191a5a51ebab01b1aecf3ca1af43991,2017-08-29T01:31:23.837000 +CVE-2012-1756,0,1,7a12e55e6f0c63f593379d4d3f4070d4c155d5535845909ff9fd310dfe03974b,2024-11-21T01:37:41.443000 +CVE-2012-1757,0,1,c6234d5e64f87bd5f555099235253bcaf808799b8cf170d4d7a0557180827273,2024-11-21T01:37:41.610000 +CVE-2012-1758,0,1,ad5e3fd530dd0d518076e241c3c1445302fdaeea2d9f9aa594686541239c3dfa,2024-11-21T01:37:41.777000 +CVE-2012-1759,0,1,88910f10d14450f7045da51e09d86f1802a43bb4d078861cee97e2c77ba0c9db,2024-11-21T01:37:41.950000 +CVE-2012-1760,0,1,dd1ccf51f8b79e16015d61d854368133544f750aad5ca8a0802c20c6c7dcf7e2,2024-11-21T01:37:42.113000 +CVE-2012-1761,0,1,a4f9725431761f6c87162d642597f3837831de29bcc5e57ff6ea405917bd5ca2,2024-11-21T01:37:42.313000 +CVE-2012-1762,0,1,1441d9fd35f2f32399938c4f884b0fc014ce5903003df0d39aac8b72873af552,2024-11-21T01:37:42.460000 CVE-2012-1763,0,0,10866df53f7733aec65f9dce3cb1654ac89a40c512d662438e8a8ff81130fd2c,2013-10-11T03:42:35.927000 -CVE-2012-1764,0,0,763f19cf2d9b69d74301434f6f373f39cf0c45ecdeeaaa88bc4387b0a6050051,2017-08-29T01:31:23.897000 -CVE-2012-1765,0,0,5fadc8cf693f6ed18cef9608b4da9dbae9a6640ac9adfecabab2ef2d82023d32,2017-08-29T01:31:23.960000 -CVE-2012-1766,0,0,48da6bbfe5fe1055fcfe52b64ae91c41147e6d273e418ad7f18bf41960b1ca85,2018-10-12T22:02:33.607000 -CVE-2012-1767,0,0,81f756cfc0f369329f235c3226310733c91fe6563dd07c9889a97c43fb3dc636,2018-10-12T22:02:34.747000 -CVE-2012-1768,0,0,16430ece05d74499b6009bdb1cef7fbaff8883c240eaead5178e2c6ab6ba4a15,2018-10-12T22:02:35.857000 -CVE-2012-1769,0,0,5bb5b93dd28d39140af6bd9bc7fba176c7b9731fa9f62245547d7a761eafd869,2018-10-12T22:02:36.980000 -CVE-2012-1770,0,0,a9923e6f0cda7c8b4a7fe9636e61ad58194e5a8ab12c173b3b0d9ca033f95123,2018-10-12T22:02:38.263000 -CVE-2012-1771,0,0,e1faa61803cfd092b3d3fda45a36657d1b7db98f903bafda68595d59a5f227a3,2018-10-12T22:02:39.450000 -CVE-2012-1772,0,0,02095d8cd33bc52d5595ec6f17f0fc218f493a5779e3f3b579e80862ee6ba615,2018-10-12T22:02:40.637000 -CVE-2012-1773,0,0,38ad614aadb126381f4519c6b7ab733a764821fda4abb3f22813c413b20d76ab,2018-10-12T22:02:41.917000 -CVE-2012-1774,0,0,a1c5bdfc886442ef50a02bcb8c236fda8d050cd4a7d96636151c61a5c445c45f,2018-01-06T02:29:37.897000 -CVE-2012-1775,0,0,1393a20e28ac2776063953aa0481dc0ffb3969d384043cfa07ee6e8016fc0b90,2023-11-07T02:10:19.270000 -CVE-2012-1776,0,0,b761c8e86e3f413c96df0ca2bcadfb6802c4ac0717c0325fd9ed7cc3a221c977,2018-01-06T02:29:37.973000 -CVE-2012-1777,0,0,df44a843cea86d432739604d95151d42c801d5c4873f6d1b538b10174552c713,2018-01-06T02:29:38.050000 -CVE-2012-1778,0,0,29e912abd4f1fe7e46c7751bba436aadabe8a290c000c3ca14e6e81d4c3a2830,2017-08-29T01:31:24.617000 -CVE-2012-1779,0,0,c495114af4feb4f38366c64c3b186a35313c460fd26dcf385a6ae53030e9fa44,2018-01-11T02:29:04.450000 -CVE-2012-1780,0,0,c0ae3e603d3ce5a74a0ef0ce355c1f977fb2090fad00596ecc694b87e416e5e3,2017-08-29T01:31:24.710000 -CVE-2012-1781,0,0,cbda969784e9a78420e2840cb4a5d62d3c9263c7813969c91226a0899e9b2f97,2017-08-29T01:31:24.773000 -CVE-2012-1782,0,0,2693de8a0a64af8a56193222d8a68956d4d0c6f8220d41711904a2afda9b23ae,2012-03-20T04:00:00 -CVE-2012-1783,0,0,1b90386663742c7de667aaa5f31f106d92c1cba7ff8557f41442f1d38854ba02,2017-08-29T01:31:24.820000 -CVE-2012-1784,0,0,210e63da108f8e385396deee8844c61eeddcfe5004b772da5edff7fce81598ec,2018-01-11T02:29:04.497000 -CVE-2012-1785,0,0,7966e6d5910a3b96ea27d196b75b1fb9bc4a1186ce00b398365d0e62633b3ebf,2017-08-29T01:31:24.930000 -CVE-2012-1786,0,0,66c1e0ee5b5aaea1ef1c90b04659ec0ffffea0d989301c645439cae5b8ca8ee4,2012-11-06T05:10:14.580000 -CVE-2012-1787,0,0,e1808387a96af4eb146762efad6f942ee5d0efca19ad1d6a3fb1ac2659756c7c,2018-01-11T02:29:04.577000 -CVE-2012-1788,0,0,4958729ce3591bbd0a654d7ea2e44fdec993608eb2420c9ddf34a034b95b765c,2018-01-11T02:29:04.637000 -CVE-2012-1789,0,0,38a577705785ac5ae5c47641c9e66535789f84534d17ec31042f39025527e711,2017-08-29T01:31:25.100000 -CVE-2012-1790,0,0,30155485784300dada50064b1055d9cb0f764589132f25569b6c3e833d44da3c,2018-08-30T17:17:10.400000 -CVE-2012-1792,0,0,6bca15d48ee4eb3ca4de1931656a7cab22e6be2dedcad5a2d7ce95d6779b467e,2012-05-28T04:00:00 -CVE-2012-1795,0,0,f5f47eabff1cab6be5210e95f629dc288046d51c547b2f7d04151c0e1192b43f,2018-01-12T02:29:00.303000 -CVE-2012-1796,0,0,a64cd9e424e1733e7b89af250c052c6a11dd7b65c361b91ea93b3d63807e4e6d,2018-01-10T02:29:29.927000 -CVE-2012-1797,0,0,1d6d52210d991382a7769b9d4e8361dd17e278ed9a8a0e3e988dfa52f4548b32,2018-01-10T02:29:29.987000 -CVE-2012-1798,0,0,91ad3e6ad6b4cbeb1a26e6d281284d3381f1c40d20a70ce3841cb004c0241bac,2020-07-31T18:43:04.807000 -CVE-2012-1799,0,0,a50763a7a306dfa062e735328f99d83155701ce4ad068d3f147c7c6641538445,2012-12-06T04:18:02.030000 -CVE-2012-1800,0,0,64d2290843f42fdcc8c4837059a765226b15f12eaedaabc9f29189fb2e8d0b56,2012-11-20T04:44:07.500000 -CVE-2012-1801,0,0,df934e52dbce699612c1c3fa5833d43616b06c64b2362f992bf7b17c320ac855,2023-11-07T02:10:20.220000 -CVE-2012-1802,0,0,17f0b100e06e58425a24b1fb207d532b7f9cf355a3e5ba723b4a433cd2884e81,2012-11-20T04:44:08.140000 -CVE-2012-1803,0,0,b0ae804f1de4832cbe3c507ac957e0fdb74dd4c1aae82e41ad8f6b0f946de0a8,2022-02-01T16:53:48.353000 -CVE-2012-1804,0,0,202dd96b166f3e85559ba1c743fa26630df16dfa355cd38320a38f8ba06f637e,2013-10-03T18:30:59.067000 -CVE-2012-1805,0,0,34ad513cd06346f895e1837809a5db2d7dbd5ad1dad221c126e14207a39ec388,2017-12-20T02:29:00.817000 -CVE-2012-1806,0,0,ab9c75aaaaa8485de5d23bd4da6e7538e90bca6b4e623508c398cfd6059178b9,2017-12-20T02:29:00.880000 -CVE-2012-1807,0,0,e3f751f3c55cb12c8169c3c7d3d7a33be6fd0535d1ee715144effe6be94a90f2,2012-04-16T13:53:40.070000 -CVE-2012-1808,0,0,50c01125776c1a356c86963194828bcec6006b3fe2cc7e626ba8891da889ed3d,2017-12-20T02:29:00.943000 -CVE-2012-1809,0,0,54ddd273bc987e834f0ee288a7f8efc262e77a6c7bb4fc23e66bd126c3caeefc,2012-04-16T13:59:58.603000 +CVE-2012-1764,0,1,9dddb0044207ae9ae7fcce0a5b25478fcc4e1bfdd6761b8149954e2693513726,2024-11-21T01:37:42.757000 +CVE-2012-1765,0,1,d669fdd8e50009699dffea600f6d8e0cf00feb83108f5b08cc459bf87e9cd33a,2024-11-21T01:37:42.907000 +CVE-2012-1766,0,1,cffdbd9428b8a5423ff42a0ca7d0ad80cd9e0ecfc22a5f1bf3f7d480aeec024a,2024-11-21T01:37:43.060000 +CVE-2012-1767,0,1,c688565544693cc8db9f82093c73fbf7ca13b11e674b78009cb503749ff1386e,2024-11-21T01:37:43.247000 +CVE-2012-1768,0,1,7a25a12455a73c990fb0c2498784e18c19a8cb754d5557f3419a5d03eda2c705,2024-11-21T01:37:43.417000 +CVE-2012-1769,0,1,08569031d9e10e18d0ad0f1398cc74d35596bc74146f1073a2d3757a968af945,2024-11-21T01:37:43.597000 +CVE-2012-1770,0,1,fe0be49429f5764965fefed69a6ca657d450e00b8edafe6d011130918259c1ae,2024-11-21T01:37:43.750000 +CVE-2012-1771,0,1,b3a7ed26f59fb3bf0abcc4dcdb018c6da974bb50916a3271ab43502cad0cf082,2024-11-21T01:37:43.920000 +CVE-2012-1772,0,1,12be2aa5297d64eae6ac83a68edabe3f1769765866d2daa2d8fbfd7edc2efebb,2024-11-21T01:37:44.083000 +CVE-2012-1773,0,1,1743ce6c735ea4e9844fd64db3919bd90f7454547136cf31b08dbfda7e05ecdf,2024-11-21T01:37:44.753000 +CVE-2012-1774,0,1,561fedd25938760109c0f492993a4db76148084243d3111974e45bcb5e4fc251,2024-11-21T01:37:44.927000 +CVE-2012-1775,0,1,302ddeb4dd199793195db80165c8b2f8195c9dfdfc364485e602b445a908faf2,2024-11-21T01:37:45.137000 +CVE-2012-1776,0,1,ae6a4af92bb8b75bdecb49f31b35f170ae99bde74db566e2f1f4d1180c0ab986,2024-11-21T01:37:45.377000 +CVE-2012-1777,0,1,480df74b5f034bf7b42d2005cd9a80a67f64c042a36c45531871bcf099ebc822,2024-11-21T01:37:45.563000 +CVE-2012-1778,0,1,c7c068ad5edcee21259e682321a45a60f5b2e15d8405181efd6cb9dfa490e0ae,2024-11-21T01:37:45.720000 +CVE-2012-1779,0,1,f84df5bbda94e800f7f3011d43bf1b6e8c31eb2a227e2f94060664996987361c,2024-11-21T01:37:45.850000 +CVE-2012-1780,0,1,b813f0d69128d3fa429ce713ceb44e701c1a03f98a65a538244d41a4888cd7e5,2024-11-21T01:37:45.993000 +CVE-2012-1781,0,1,a438efc1ac65b6051ffc04a1896f99a2712014fead0f308f11f43a6dfad49213,2024-11-21T01:37:46.143000 +CVE-2012-1782,0,1,26b3072e382cb3996375d61d99a9e5323b15b571683c930ffda61638361fba1b,2024-11-21T01:37:46.293000 +CVE-2012-1783,0,1,856cbcd87e9250c0b57ba0da42588afa4b381a1de6942ff725e5c14479ceba0c,2024-11-21T01:37:46.433000 +CVE-2012-1784,0,1,3d615c10e02a9434e59c95d0fffb6545edbf7d7b5b6eb6eca0ccfaa34c463ef2,2024-11-21T01:37:46.573000 +CVE-2012-1785,0,1,d18d83efddad9941d6039fc98e0a280629e7c919bbec77c40ae87f12622ae1cf,2024-11-21T01:37:46.710000 +CVE-2012-1786,0,1,e69af7ccfe5d98e8067fbfe28e4e72fa402ee03c723f09327f038968bd3fb516,2024-11-21T01:37:46.860000 +CVE-2012-1787,0,1,0c5f725a371e539c96f1486f61cf4c655dc7144f6746c5468b40771a1db93384,2024-11-21T01:37:46.997000 +CVE-2012-1788,0,1,53b723ba9a417bea0e3931e71ff545c67371c7316528c6de95efe4e8042050e4,2024-11-21T01:37:47.160000 +CVE-2012-1789,0,1,46ed6198cd2ceccd3a6e4375147fd45a7d3165bf220b771824913206b678fed9,2024-11-21T01:37:47.310000 +CVE-2012-1790,0,1,96c003472885f3441e4f4193da1df99bb96866f0ca5e586b64c82555fe5107ba,2024-11-21T01:37:47.450000 +CVE-2012-1792,0,1,b9d1149c764d931a04ed9b245b0e1011079bb70652542e15002ea33874f5198e,2024-11-21T01:37:47.593000 +CVE-2012-1795,0,1,e9119aaaa59205d10af2b4d22a1f9ba83193341adf60acc99f7f566c904ea862,2024-11-21T01:37:47.730000 +CVE-2012-1796,0,1,23c623761e3faf59cef95a9737e413abc3971025e3d4c241834185ac37959a82,2024-11-21T01:37:47.880000 +CVE-2012-1797,0,1,d620b3e07f287687fd619eaf414b0a2283bf76bcf39c9b29b77ccfe8e14bd264,2024-11-21T01:37:48.030000 +CVE-2012-1798,0,1,da53d30f5470b64b35e9e10ed713c297de4b2f1a9112b400bc9d8f74e0723529,2024-11-21T01:37:48.170000 +CVE-2012-1799,0,1,d035919e45e65a647679827c5679cdfe06f8cc97820f8fc93c24e0088d15e1cb,2024-11-21T01:37:48.300000 +CVE-2012-1800,0,1,0fa82ca5671e5d9a3f7fd0492fc5420ba334df89b7afaed2619b3095993c6b90,2024-11-21T01:37:48.413000 +CVE-2012-1801,0,1,95ee0d82248564aea5dd4f3af0e89b7e5b3431f59136e5d1ef6b129222833827,2024-11-21T01:37:48.583000 +CVE-2012-1802,0,1,2b7335081a013a2bf31d3b29caccb2fc8769f1f4e1f7defca42fb7d3535fdee6,2024-11-21T01:37:48.693000 +CVE-2012-1803,0,1,a7d80cb64cc4fa35f6000cf5dc33bd5f3ebc7b44114eb7c49ea19dc3f8ece617,2024-11-21T01:37:48.810000 +CVE-2012-1804,0,1,b0153365515cb6908948912a34ea27198d599bc9056a8cfe1da47ec72cbb1991,2024-11-21T01:37:48.940000 +CVE-2012-1805,0,1,5b3d658af530e9b59c802462342bac030af8dbda776e7dd3df5e3ac8248121f3,2024-11-21T01:37:49.050000 +CVE-2012-1806,0,1,4f43ce910ea8c34d9bebce8b26f89dcf5911647a27de9767f1baa22444b3de26,2024-11-21T01:37:49.153000 +CVE-2012-1807,0,1,b7b70d6bc4e37a22a36efd0c3c0a3e2993d78ba6cfcee6383840de6a9ad5b62e,2024-11-21T01:37:49.257000 +CVE-2012-1808,0,1,edcb774863ae1419f6d4a85476f9ac1adad3293979c8529ff842e28b4fbb8b7f,2024-11-21T01:37:49.353000 +CVE-2012-1809,0,1,6d325e199c147940342baafef5de12301887e8e3253a3ce1781ebc6ee4ecf5c5,2024-11-21T01:37:49.453000 CVE-2012-1810,0,0,f6722a52cf5cbabd9f2d1598c636be7267ee0ad24f3f9a6f6067d8ed1302c1b4,2017-08-29T01:31:25.397000 CVE-2012-1811,0,0,40d1c27d4d14c7d1dbfffff5bc7c5832cc3144cb1144d613caddc6d21753973c,2017-08-29T01:31:25.460000 CVE-2012-1812,0,0,2898ef56ca03b69034b9ee632abb6843d2db3f312ec6abba11a1b333adedde83,2017-08-29T01:31:25.507000 CVE-2012-1813,0,0,f1871c145db6d57697270f983a0a74dd440edc63f411c20c996431b69e01c051,2017-08-29T01:31:25.570000 -CVE-2012-1814,0,0,76039e1a4a1234d939a7f74b43a461fc674a99bd244f025fde84525c1fb4a4f2,2012-10-30T04:03:16.643000 -CVE-2012-1815,0,0,50a6194c8f88ec637af747a23d56eec4afe4f22ec6e052dce3dc88468c9db590,2012-10-30T04:03:16.830000 -CVE-2012-1816,0,0,6dc2d6cafd31cfc777381537a050413693241713ebe67c4ef34d6e6367ced735,2012-10-13T03:22:21.867000 -CVE-2012-1817,0,0,8df55fbed9f7edfe7d198b0a34ecae2c669d8afcc74d30b1cec4e7e8850da36f,2012-10-13T03:22:22.040000 -CVE-2012-1818,0,0,abb09d396c0531dcbac888b9c0de03c7c058b3fb284c78d9a38039fdcdbbe0be,2012-10-13T03:22:22.197000 -CVE-2012-1819,0,0,a8a8adc6ef010656e1af57880bc9f068b66120adb328599b532218239e6693db,2017-12-14T02:29:01.590000 -CVE-2012-1820,0,0,838f09f1d252f3ceef4bb64a3a1d1f6a67ed771415237b965340fb649cf52c98,2013-03-02T04:40:49.207000 -CVE-2012-1821,0,0,bbdbf76495da0137dfd5cf8f2dcdddadcde76670c2378f6a60799140179b8d31,2018-01-05T02:29:29.227000 -CVE-2012-1823,0,0,385cf5dac3187f75b5e2b7c2f7f2a9a128e0c3c6913faf51f2102028dcd8b891,2024-07-16T17:48:42.937000 -CVE-2012-1824,0,0,27116bc7426892571b0163c2c2b018d4833512f781efd0daec693729271445bb,2012-05-28T04:00:00 -CVE-2012-1825,0,0,bb0017b67031d69e3ddcf72fa89cde0af3b683763df728b955ee1dec5d56cc4b,2012-06-12T04:00:00 -CVE-2012-1826,0,0,5652118f200221dd6e67dbaf07e83ffb7ab87a62a2d5a7e072da58e3047dd7cb,2012-11-27T04:41:22.567000 -CVE-2012-1827,0,0,dd60ac39bff5c2fd0adb10790f174d3d3acca3f3d97fbfe8ab6b62645b004bc7,2012-09-29T03:17:03.300000 -CVE-2012-1828,0,0,f4d58d9d10e6ed8e5b7375a3182ff9492d0e24c53fbd9d6f09ed74ea8caa2d59,2012-09-29T03:17:03.470000 -CVE-2012-1829,0,0,8029acdcf1417f739aa1c0a5eb2b3ee72867b3421df708b717551c9f3aa29fd5,2012-09-29T03:17:03.643000 -CVE-2012-1830,0,0,6bcb7a655dc8ca36594c3861790f51eb457d1b6b9d3b16e65914efa6179619b8,2012-07-17T04:00:00 -CVE-2012-1831,0,0,edad348702dbb8a831e16735f9b734de5a8a49867d6bafbe6036e10d602c2d0a,2012-07-17T04:00:00 -CVE-2012-1832,0,0,98e3987715b53b1977dbdbe499cf9c9e4e40bee34425846a118b6c8163c87a15,2012-07-17T04:00:00 +CVE-2012-1814,0,1,257a7370b9528f54205baab711424fa8bc204d3564778bd1415d7a14c61e38fe,2024-11-21T01:37:49.990000 +CVE-2012-1815,0,1,6150aa397f85ca30bf7ae6183bd6c09d969d1845b170fe43a3f407393351b9bd,2024-11-21T01:37:50.100000 +CVE-2012-1816,0,1,2673ad3a4c891bf4f7a97a3ecac5ef95056f277661419101370542ccd51ad05f,2024-11-21T01:37:50.217000 +CVE-2012-1817,0,1,c3ccbab61a3d4c73cbca487bb71d23f56fade3249cd2bdc39b4b61864488e6b2,2024-11-21T01:37:50.323000 +CVE-2012-1818,0,1,8e28167d8a453838cd3cc68a78dafcd2d1c287eccf6e70fa1f1188beb3e05ff1,2024-11-21T01:37:50.433000 +CVE-2012-1819,0,1,9bc0e3199902cdd4bec9c05870cdd36b5ac393f563b520efcacfcfd818615cf8,2024-11-21T01:37:50.547000 +CVE-2012-1820,0,1,119251417e334a17ce7b71ec7c27ba3cd4c26578bde1ec053af27b2f2fe7aaf2,2024-11-21T01:37:50.650000 +CVE-2012-1821,0,1,10476be26b779ab78361abec995e541622f8e9a93e6efc344b9a7fe578f520f4,2024-11-21T01:37:50.767000 +CVE-2012-1823,0,1,877187e21024ea7fd95c0ea6c4aead1998b09c7985b99e8dda59d7cbfa57224d,2024-11-21T01:37:50.887000 +CVE-2012-1824,0,1,ad28c1b19b4670bb3e5eca026ff4f854adc5df0ed6dbeed2d351d7ab1b7dd4a8,2024-11-21T01:37:51.060000 +CVE-2012-1825,0,1,ddf41aa6c0c5d5dbe0fb432ef05fae81eb9ead0c44e9daa4c3f55e5b800e05f0,2024-11-21T01:37:51.167000 +CVE-2012-1826,0,1,0d80374e740193751966212ddac38934f4763b728aab88fe44deeb50c32b3a69,2024-11-21T01:37:51.273000 +CVE-2012-1827,0,1,90e87fe1be3b17e844fead4d8b4fd85abfe0a59d2f2b98cc91d0da38d9ed93f7,2024-11-21T01:37:51.390000 +CVE-2012-1828,0,1,aa3276b8bbc4463ab73aabecdd8d1f4faf456cf7e223792035bb64249ed7f97d,2024-11-21T01:37:51.497000 +CVE-2012-1829,0,1,cdb0d44cf5b896fc522b9408832444e406b96e7f5d8545fde27449875928dd35,2024-11-21T01:37:51.603000 +CVE-2012-1830,0,1,1404761e488e1cedc8cd3dcbeefa908c3eae2d7a336e0f78d8d936ca53592010,2024-11-21T01:37:51.710000 +CVE-2012-1831,0,1,6cf99df317d6552a1840df8e1f5faf61f83bd54788e058b4141000ebc30738cb,2024-11-21T01:37:51.820000 +CVE-2012-1832,0,1,765c78eaefd8dc1c396452a44d3052fb0494c347eced1faf0a4102c9978771f7,2024-11-21T01:37:51.930000 CVE-2012-1833,0,0,f3d972ae63acffb9efa3fddaefbb38781859aa228b2da1fb86e33e42fc760e3e,2013-03-02T04:40:50.847000 CVE-2012-1834,0,0,73d85f90ee9ccdc0cd9ae3ecd12d282861db28511e4a3c9330163a28958e5385,2017-08-29T01:31:25.647000 -CVE-2012-1835,0,0,187d90e5f7bf290ccb54898130016d3f662b5ad4e49410eb965dc885a336ae17,2012-08-28T04:00:00 -CVE-2012-1836,0,0,97132a3d70765823f5e6c97f748ff7e56266b15f272daab4f4333d915a37e936,2020-09-14T12:33:22.683000 -CVE-2012-1837,0,0,b186bcda74753a26b4ec8840f29472eea77cf3df20995100ae483d9774f6abf3,2018-01-10T02:29:30.083000 -CVE-2012-1838,0,0,1bd827b90203354dadb1c0d36c45701f521c949e9fb344e45a9002c28eb9cbf6,2018-01-10T02:29:30.143000 -CVE-2012-1839,0,0,f3daee7800a100fd7d0b9a790fc3c3db574374edbdaa59e970af414abc0760e1,2018-01-11T02:29:04.700000 -CVE-2012-1840,0,0,e5748edad2c903ec89023d7aacf5b0a3a080d5366918de97e59fa8361f1d7bef,2018-01-10T02:29:30.190000 -CVE-2012-1841,0,0,84ef05ade159c9a48e2caaf697d8c5392a3e8a52dfcac4ae462bd2b569782a45,2018-01-10T02:29:30.270000 -CVE-2012-1842,0,0,2cc079aa318e2f290296744bc8cd8ea24749c5b2ca37b052386d889abd33749e,2018-01-10T02:29:30.347000 -CVE-2012-1843,0,0,8efaea76ac446c2aaaf1e5d0a027d78997a9e6b8956aa2f8f673dd1bfb9705af,2018-01-10T02:29:30.410000 -CVE-2012-1844,0,0,c659cece1587ce25c9050f7208fc18a40a3b9be3adc9c1528688d806e7a0b043,2018-01-10T02:29:30.487000 -CVE-2012-1845,0,0,099523bea6e1b98a21a27dba13f40049d87eed830dc0a188de3e96e8f7b01ee2,2020-04-16T15:41:25.747000 -CVE-2012-1846,0,0,adb557c7b434aba633f35bae8d13076a014cdf6ce133e039ffd4e12120229b1d,2020-04-16T15:27:25.657000 -CVE-2012-1847,0,0,5b858f404ae36de2f8eb0248240413983295da1c94ad1400376274dfbb03abbc,2018-10-12T22:02:43.230000 -CVE-2012-1848,0,0,8a0f675e0f030c0acce112d3426bc2823d8efc59e3c1d14998df5d96316c02c9,2023-12-07T18:38:56.693000 -CVE-2012-1849,0,0,8fd074ff4b2295c97eec1b977c435d342cec44aa4c113270b6e8cc3378b6a4d7,2018-10-12T22:02:44.387000 -CVE-2012-1850,0,0,37745afd3f5860e19c28e14b30f59932ade73b313fbfdba09a04b7d86dd3731a,2023-12-07T18:38:56.693000 -CVE-2012-1851,0,0,cdcdae7936ca4f750a77390535d9090bb058f305e57aa8cc38009feafa6e5a8b,2023-12-07T18:38:56.693000 -CVE-2012-1852,0,0,de0261c226ef7ab01ea63aea13e0e19d93280d43421fc6975684c68fdf48cb61,2018-10-12T22:02:45.310000 -CVE-2012-1853,0,0,38e4e0b3775cec93d0ecea6e06312c332e0594f277017cb27ff1bbc0f41e77d6,2018-10-12T22:02:45.607000 -CVE-2012-1854,0,0,33e3c3832783c205b14bb5b1d1fe60c009c7c5ebb93cfa5e1de6a7086d05d51f,2018-10-12T22:02:45.903000 -CVE-2012-1855,0,0,49d8e31146ca809c3873a6d877935925f55f883eb8a12b0f7cbb4a79012a53a2,2023-12-07T18:38:56.693000 -CVE-2012-1856,0,0,cdc205a50d3fdef06886e2ddee684e054292d2131ccd070c358074c57fd60505,2024-07-16T17:37:32.647000 -CVE-2012-1857,0,0,456d5cd62d39efaf6dbaf3076497e028aefd23bdc9dfecb50fe6d377b1cb58dc,2018-10-12T22:02:46.980000 -CVE-2012-1858,0,0,1f7da0c163ea4003f104bf248a2c8a1f1063cabc8f7a3ee5e18523d93aa22e5b,2023-12-07T18:38:56.693000 -CVE-2012-1859,0,0,a52ea4bfa5290ebd7fdede5401ebd94f233d1552415c4ac31a4a0b823fc219d3,2018-10-12T22:02:48.027000 -CVE-2012-1860,0,0,425b54c4b8df9c9d97b37d1b7908d47ad851bc0b11c2934327fb054b5c4540d5,2018-10-12T22:02:48.340000 -CVE-2012-1861,0,0,b6e4f28f331ab861c31125146bd1ea214a27fa1d5d847d001cd31ec4cef76e84,2018-10-12T22:02:48.577000 -CVE-2012-1862,0,0,f3bc9f62965cc14d09669d645659271ced40d01b734079f6c4055a1c7cb475f2,2018-10-12T22:02:48.873000 -CVE-2012-1863,0,0,8fd7f4d847a91bd245201f08b299bc7661c8cf129088a203fe47615221c8f0d6,2018-10-12T22:02:49.123000 -CVE-2012-1864,0,0,507e80000be7b20474bbfe72922f942dc2d5707d4f8189afc63d8054cc9c3b1b,2023-12-07T18:38:56.693000 -CVE-2012-1865,0,0,ed0fdbb1a8e926f666347c46ef39ed8252d028a6ee31f1449b15b6e737efedfd,2023-12-07T18:38:56.693000 -CVE-2012-1866,0,0,11b0f03b56312e07da5d4eba02e1f170e44445c188f188fcafb27094dd756a43,2023-12-07T18:38:56.693000 -CVE-2012-1867,0,0,01ba86739e1fffdee02c0ec6694de1429c958c39449ee5184d763625c3b81540,2024-10-17T20:35:05.733000 -CVE-2012-1868,0,0,9fd0de3ae3876c88a517ca38a7fc658dc6b0f15e6e4e88a2fd8646ae16885743,2018-10-12T22:02:50.747000 +CVE-2012-1835,0,1,687c5867f4ea1e2d4d2da9ad35a27e8a09e5d32c4239043c31c24bbbab53d8ed,2024-11-21T01:37:52.347000 +CVE-2012-1836,0,1,8978e7b769503a1f79a9725b848c08203b2b526fa7551f34d66ab7756454e2b1,2024-11-21T01:37:52.490000 +CVE-2012-1837,0,1,e8cd6d3c3d9dc929b530a218022a92a2ee1aa5cdf36c045ee6115ef5a9b75fca,2024-11-21T01:37:52.637000 +CVE-2012-1838,0,1,1f941a53f48e6ea80c08825b8b6b57f4b8760cc3ee1aa05bd5f709eaf70730a7,2024-11-21T01:37:52.773000 +CVE-2012-1839,0,1,e981c2b3b3257698cd5a743ef33606678235ac58dc7fff262f74c9e57344787b,2024-11-21T01:37:52.913000 +CVE-2012-1840,0,1,87df127161e5ae8d3a0cb3e90b8b4b9f677f22ea47df56cb4b51647e66ae1eeb,2024-11-21T01:37:53.057000 +CVE-2012-1841,0,1,ddc524fcdbcfc12ff34f02cc2a606579676e3e233d57e337802019552467508a,2024-11-21T01:37:53.200000 +CVE-2012-1842,0,1,ae7570377f20e1232647d20a1bc8343d7e1a6b7e4009c26d2265cae950540483,2024-11-21T01:37:53.357000 +CVE-2012-1843,0,1,2a1dec63650eb6f459ab5746917a3f3202d076af930e9a63ee63d765f1b1cd07,2024-11-21T01:37:53.510000 +CVE-2012-1844,0,1,cc78886737315f1d725c4891a2b26dac062242822f40531319525e2fae418f89,2024-11-21T01:37:53.720000 +CVE-2012-1845,0,1,88dae5f8dced7272a1cc16c802c09f5448ffa37ffe0021e6d8167f9533cd9610,2024-11-21T01:37:53.887000 +CVE-2012-1846,0,1,21d422d708bf1e74e940b724e385e68bc5f33f33ae0cfaa9d84071ea35b2aa2d,2024-11-21T01:37:54.050000 +CVE-2012-1847,0,1,c3d68b7bd222d176476c4c6053d5854ed5263fae5445d5f56b553bfa6e86f0a8,2024-11-21T01:37:54.203000 +CVE-2012-1848,0,1,cf9678ecbc2d2c86a821584870d8af8e439f04746ed7b5396454bf23e16d0294,2024-11-21T01:37:54.323000 +CVE-2012-1849,0,1,5b025ac863fc5a92105a6b40a74e8e9eedf4439469f3194ebf01f4f4080111a9,2024-11-21T01:37:54.437000 +CVE-2012-1850,0,1,1a6f33fe08a5a10c9aad3e7c743a5b8159fef055452055a7431034dea674d027,2024-11-21T01:37:54.550000 +CVE-2012-1851,0,1,c0c4fb26b936cd28125e936a0538f878875746ea40861a8ee726585190ba9dc2,2024-11-21T01:37:54.667000 +CVE-2012-1852,0,1,03be05730f42adc6a8423802c109b9332226f4c46908d0741880595ab85b1a62,2024-11-21T01:37:54.783000 +CVE-2012-1853,0,1,d9407fabbd4c899301057dbba2d396e0bd6e70a4be25e7b2367e19036df1b6ec,2024-11-21T01:37:54.900000 +CVE-2012-1854,0,1,236febbf5b62cce5868374b9988e4a9e5206b82d259f8bb36d2b28bfcdb5a0e1,2024-11-21T01:37:55.010000 +CVE-2012-1855,0,1,a6497bc7b821caa036436c43348027b4e281157b390e67bbad1ef6af206e05e2,2024-11-21T01:37:55.120000 +CVE-2012-1856,0,1,fe5750eaba67396d5f2352334d7248069f9cbc4a165017ce3e7da8fd476f5dd2,2024-11-21T01:37:55.253000 +CVE-2012-1857,0,1,48c0b35a257ee9e694c630a34abdc0449622b08f6e18a82daca8c04ecaa53525,2024-11-21T01:37:55.380000 +CVE-2012-1858,0,1,1b37b901dcd0facf3484c5f5248da96628b057c414cdd5c4eaaab8e422eab5cb,2024-11-21T01:37:55.490000 +CVE-2012-1859,0,1,e91f6624ff7edb65b41553f72198c04040fee20425deb2b2632de546880753ad,2024-11-21T01:37:55.617000 +CVE-2012-1860,0,1,bf3a04cdaf292c54f8e45216fb006acfc650d89c9a805ca83e346520d2bbe5ed,2024-11-21T01:37:55.730000 +CVE-2012-1861,0,1,204fa210bd7d23a3d21a4c98183b7be0bce8b4378e0a669c0283f3e52a67cff4,2024-11-21T01:37:55.843000 +CVE-2012-1862,0,1,3a5741a26483c0b7f0cdcd84a9ad6fc6ed6010bcc1fba64c5ccf5f2fa806ca02,2024-11-21T01:37:55.960000 +CVE-2012-1863,0,1,72cb969fc3a6c3f6ba5088126d9de9f9b865fcb403e0e708960fcd5a3f4a8569,2024-11-21T01:37:56.070000 +CVE-2012-1864,0,1,e7db991f872c01da06d7e79072c4928aa5aa112aea7ed1bc2e442c19f9eb1dda,2024-11-21T01:37:56.190000 +CVE-2012-1865,0,1,dbb8bf6e7aa8d90093f19824094132dc1ef8d579d6b670eabe46515cba3a5668,2024-11-21T01:37:56.307000 +CVE-2012-1866,0,1,9ded81aeabcb0020ae5a06023c1c415d9443a5e043e85186180027acc4132926,2024-11-21T01:37:56.420000 +CVE-2012-1867,0,1,02f436f9227ddfbe7d19924ddaf34e6ddef6c4a31e0cce109e64a44a35218f2f,2024-11-21T01:37:56.537000 +CVE-2012-1868,0,1,ae98aa895fe8e8f85c283b7b41c41eb1e4eb237e40858010063e00e463bde492,2024-11-21T01:37:56.783000 CVE-2012-1869,0,0,644944d8d8ea451546919e17980655a3b830de7b3d8c42b8c3bcdfd1ac8b6bf9,2023-11-07T02:10:20.837000 -CVE-2012-1870,0,0,2a0da7a9593f6b7a360e2e6012a5fa49dd083a015bb41feed9e26c3e928d00e0,2023-12-07T18:38:56.693000 +CVE-2012-1870,0,1,0da894b389d98188ae059f6c7d6a18482c74f270bc06e8ef3adc914cd9c51f41,2024-11-21T01:37:56.907000 CVE-2012-1871,0,0,f2bd386a61ddcc74945b4e1c4aab50f093ca98523f53e022f0352985fbcc8684,2023-11-07T02:10:21.070000 -CVE-2012-1872,0,0,a950427ffa2b1b8bd5e3e3f14123fb60f0fa6830dadb288db76e7eef0ec66bee,2023-12-07T18:38:56.693000 -CVE-2012-1873,0,0,50a050f35e85a8ff91a2c0f055e1bbbba69e44c5c73b06e48fdc574bc587a956,2023-12-07T18:38:56.693000 -CVE-2012-1874,0,0,e50353727a53b997dcb67be3b551b9eec9e5d6d2bc7884f12e922f173f682278,2023-12-07T18:38:56.693000 -CVE-2012-1875,0,0,4b5e803e50678f64f44add592e29dfee78caf347918901cea1b99dee9577bc8b,2023-12-07T18:38:56.693000 -CVE-2012-1876,0,0,64ae4427056613fd9d84b0d3c5b05ac7fdeda0c03ab1edd2bb9c69d2fee9156a,2023-12-07T18:38:56.693000 -CVE-2012-1877,0,0,0065ae5e7c9a29951c1f920a3867d7f6c819d6d80a731d152c0a3fe00a96cd8a,2023-12-07T18:38:56.693000 -CVE-2012-1878,0,0,0b52b5ca2678aa687babb1ded85de020a53f1d4f984671b6aeb969e361cab0f9,2023-12-07T18:38:56.693000 -CVE-2012-1879,0,0,8f4bc9a24d8e01853671d1ce88ba2340504c05c188eae5d8fcdb39c74ca7fb76,2024-10-17T19:35:03.163000 -CVE-2012-1880,0,0,56e0ab526dedd546e5f01ee401ad5c33bd6a2ad19ba1442ffd68329205f599d0,2023-12-07T18:38:56.693000 -CVE-2012-1881,0,0,b3e532ade07cdf93b9d30806dc765cb9199624250a645808afded8d532557746,2023-12-07T18:38:56.693000 -CVE-2012-1882,0,0,223f7e3b15f5b8a3d880910030d11d18f106fe3044b7991e2c0f26f92f5cc39a,2023-12-07T18:38:56.693000 +CVE-2012-1872,0,1,eadb6790e517b9da4ae9883fe897e1861bf9617fd8c4df6273283989ea4d9782,2024-11-21T01:37:57.023000 +CVE-2012-1873,0,1,dff73e94d2fb6041dc76cd901c26a4102bca0db57a5d047d96e2d4ad1bd2bdc6,2024-11-21T01:37:57.133000 +CVE-2012-1874,0,1,62948b643a36a23704fe4aa2a3b21e92786b9a12b8882081c1fedc4fbc1992c0,2024-11-21T01:37:57.247000 +CVE-2012-1875,0,1,0b8429a3537c3919c0bd7d9318708af0c86aadbe59e07a5c86e6db3798514425,2024-11-21T01:37:57.400000 +CVE-2012-1876,0,1,7616f1e79b232b3f795e04ea213f8b5360a35819d456e949ceebb581228e4462,2024-11-21T01:37:57.507000 +CVE-2012-1877,0,1,2b7edd5624d9c991ef9de7b3abc7d5d677979ff7a81c342c583206ffb2dd38a9,2024-11-21T01:37:57.623000 +CVE-2012-1878,0,1,4ef7f5df893ebea5cea086427753f23ac69b4998924f3ba3340fcd6a0b64bf03,2024-11-21T01:37:57.737000 +CVE-2012-1879,0,1,3a96d4af314293e2bb75d60baa660ca457bb5025fcbb7b91afe0320fd9a9f2db,2024-11-21T01:37:57.853000 +CVE-2012-1880,0,1,831d762f19be12dbfbeae2b3b590b4b54fd821cb992e6a5c927312e45e14291b,2024-11-21T01:37:58.063000 +CVE-2012-1881,0,1,9e87e2473ea21792dd02113aeb89283427c35a2dcb3a867c2bdc5c9c82f8d14d,2024-11-21T01:37:58.180000 +CVE-2012-1882,0,1,185e5aae785ca75324e678690fe0891821386cc38c202a3106e6ce247c2a78af,2024-11-21T01:37:58.287000 CVE-2012-1883,0,0,36acc2ce66ab701802874787e34d4e86ea195e0800c27248fdbde3b634e2e101,2023-11-07T02:10:21.420000 CVE-2012-1884,0,0,36a004d1407f98b378fb125c49132868fa69acbc45fda6f35d137c92c135de88,2023-11-07T02:10:21.647000 CVE-2012-1885,0,0,c266c7a302e0f3041a6991cc5473971d5f128faac6846708f75df6508c8ddc9d,2018-10-12T22:02:56.077000 CVE-2012-1886,0,0,8f453f6da2479e1a29320faa350f1fca0b2ebb140f9655e25e7192b840ab5f39,2018-10-12T22:02:56.797000 CVE-2012-1887,0,0,bdb326defbe645ddd4ee5d3fd09458296611fe46feaa9fcc3a21f9e95033d70d,2018-10-12T22:02:57.403000 -CVE-2012-1888,0,0,645017bf06571e5a5a12777b042b8b8d7f14bef02510dbe63dd9b21c5568d97d,2018-10-12T22:02:58.123000 -CVE-2012-1889,0,0,7253a2bb5fa38cf8491d85d48649d85658c6823d60241935e695a8d37583d666,2024-06-28T14:18:20.617000 -CVE-2012-1890,0,0,fbb680a0ef84699a5ec37032a3b9330ed89e93667054e2911b25af13e1d76544,2023-12-07T18:38:56.693000 -CVE-2012-1891,0,0,d8a4ec4974f919009f77f988752791e1c1b9369e3bd005af480edacd131be5bd,2024-10-17T19:35:04.003000 -CVE-2012-1892,0,0,e58f719b795a0eead031147e12fe83769de65c96437422fac04f120cd1d6db67,2018-10-12T22:02:59.733000 -CVE-2012-1893,0,0,187ce6165587d46a1a5ed5cdea56e4a9010b790a30d0875c5152b20226095ff4,2023-12-07T18:38:56.693000 -CVE-2012-1894,0,0,d72734921f3c9ae002171f1b8fa03cc4df68719b671d5b4ff4062ea83d873cae,2018-10-12T22:03:00.623000 +CVE-2012-1888,0,1,c29bee2393a73f794b47e1a3b6fe181d146d9041349fd494016b3775d3ec12b2,2024-11-21T01:37:58.743000 +CVE-2012-1889,0,1,55033499f60f37b2801b4472807f9201696b7607a8b9b42bdd345352122d80bd,2024-11-21T01:37:58.907000 +CVE-2012-1890,0,1,90aef50e85e01008d534cd4b9cf501ceda336a78e3daec469e965638b2bfb71d,2024-11-21T01:37:59.047000 +CVE-2012-1891,0,1,3bb5bb85392655e8d91872dff8eb71b26c48eb7cf30ccc5e2926bce2abf49a75,2024-11-21T01:37:59.163000 +CVE-2012-1892,0,1,948643f8f9ff11bd15a5c13d0dc699a07bffa81569701887fefec6a3b05716b4,2024-11-21T01:37:59.393000 +CVE-2012-1893,0,1,1382f9652979e3d663aae86779ae49454bfc1fef9ad29ca341e30af2ef4dbe07,2024-11-21T01:37:59.513000 +CVE-2012-1894,0,1,110c66c7f84d403929a331a569bfd548da703bef1e028d46ad90f624f8b10a35,2024-11-21T01:37:59.647000 CVE-2012-1895,0,0,8017931805c8c1d6fe9391cdc66bc64c48c2b50b6201682c8e8ab4ee1d5ba666,2023-12-07T18:38:56.693000 CVE-2012-1896,0,0,b1f5d58392b4fa4d698af539642996ec7cf96c692edb834ee847cd9207463a72,2023-12-07T18:38:56.693000 CVE-2012-1897,0,0,4be021f49b997968b08df7eb600192d1fbd87a72326390aeb11963ccc7fde831,2012-10-05T04:00:00 @@ -53545,155 +53545,155 @@ CVE-2012-1898,0,0,ca80dc4d41a4bad67aeb8de9c6f5e5a66b0c1c5080ba41ff5756ed447819d9 CVE-2012-1899,0,0,da6b4ec8ddf31851d4751e0fc72f777e88fb87ed4c6b56d69de920549e6ea95c,2017-08-29T01:31:25.947000 CVE-2012-1900,0,0,a49ee1543e681b45a3bfd877714202894f171e45e9102f7a03be88c2a8fa5bcc,2017-08-29T01:31:26.007000 CVE-2012-1901,0,0,0597ac147a4e5c24bda04898e1b413706aa1189993f5ee3f0210e03b7da3703d,2013-09-05T06:23:44.800000 -CVE-2012-1902,0,0,e84680121f242db8057004b85556eb95b9a92098a37aa45784073c332aec0ed5,2018-01-18T02:29:15.740000 +CVE-2012-1902,0,1,252f1c9b7ac04fa6d80f3712f15fdd65fb226385c85f708a6121ba2fda57f6cf,2024-11-21T01:38:00.770000 CVE-2012-1903,0,0,6dd083358397043e7d19a0d5edf45a595c638831ac1ff7f34ec947c66fa501c6,2020-02-24T22:36:36.727000 -CVE-2012-1904,0,0,dd7440dff2a95e6fa065b8e6cc0c29790b38263abe17566456a81ece6fb42bdd,2012-08-25T03:26:22.443000 -CVE-2012-1906,0,0,7d11e7874279deffd19bebd256d3c0e1ee25f84491ce915d3adc2e97b23d34a9,2019-07-11T15:09:06.720000 -CVE-2012-1907,0,0,060e81179569a6e043d9f6908f26bde41d6e7f0d0926ed842cd383c086a06f40,2012-04-05T04:00:00 -CVE-2012-1908,0,0,efac54bd2d854caf712374c3c73a3156e16d84f2359dcf3e2b779313b9f9cb77,2012-08-17T04:00:00 -CVE-2012-1909,0,0,73fffbd9927cd57def2ed4eb63a386162ed31e720641b1936578425889a05b4e,2020-03-18T17:37:31.590000 -CVE-2012-1910,0,0,486a23557930ca1f3d6f2c3265f9f56b3a7d4b35d622fe29424d4573ebf3e920,2020-03-18T17:31:05.473000 -CVE-2012-1911,0,0,540904f7fc48211e52a484d02ce4296944d12c992789e24365b834dc406fe94a,2017-08-29T01:31:26.243000 -CVE-2012-1912,0,0,3c78251badb70f5805370a17f376e30756f85d1eef4d777e1941b0b133e68f83,2017-08-29T01:31:26.337000 +CVE-2012-1904,0,1,cf73c8b08c728abd6a8a91b31e9acce5c0c2cc3f75b698affa25215dc5a756eb,2024-11-21T01:38:01.070000 +CVE-2012-1906,0,1,07fdb192e3164235b7892a661c20cd052ecf6324ed4cb6c1e2b078582db66f0a,2024-11-21T01:38:01.217000 +CVE-2012-1907,0,1,7d1e5ecb8f262086edc29c96e07690cbdaa68b5507d0c038895875a826a91b21,2024-11-21T01:38:01.393000 +CVE-2012-1908,0,1,6ae3486cf22cc2007235ba592742139ab32bacf81b10ae35cd12de43481c021e,2024-11-21T01:38:01.533000 +CVE-2012-1909,0,1,753ee07a1ff6d55287c649e655df06b23db0da4815a8918a41bee5a686e69cf3,2024-11-21T01:38:01.687000 +CVE-2012-1910,0,1,10bd8c1b89cb5ef2290c59707fadfc2c2c3d7cb601c6f3602d94d610f5d77e95,2024-11-21T01:38:01.853000 +CVE-2012-1911,0,1,e94eb54c0643b3bc579250d00a658781c0d4841c6ef67d40f8ed7b7dcb2381e0,2024-11-21T01:38:02.013000 +CVE-2012-1912,0,1,83fe1887135c729cdd0892343c22ccbc9c1cf20e51f3306e5b71936819ff50d4,2024-11-21T01:38:02.183000 CVE-2012-1913,0,0,4acce9aa1e4c10787bdd07217619a5b586d837e99ed40780af5526ef20e00556,2023-11-07T02:10:22.063000 CVE-2012-1915,0,0,373a47b93d52477bc12f3d762c39cb6f079e7ce469529247c67b282719ee3677,2020-01-13T18:49:07.057000 -CVE-2012-1916,0,0,bd9a06d44e4741499fc929c04383afa72541e08335cd2af3b4d5552c18d63f25,2012-08-29T03:48:16.067000 -CVE-2012-1917,0,0,993caec858d2892ab2d774655d3e5e8e93859c1a5a212e5d152a496706bb6498,2012-08-29T03:48:16.287000 -CVE-2012-1918,0,0,3cd30236c6b1588eba7215652a852a58f3b5dc121e0efd64a9028cea09d4ddce,2017-12-13T02:29:06.733000 -CVE-2012-1919,0,0,c3966242b397540e26c4b95cd6102c0116d374e2d8c1d4bd24c44b92329c879f,2012-08-29T03:48:16.630000 -CVE-2012-1920,0,0,616f782e6aee6955b5ae8e9c2c4a7007045a77d8f269ba69d781bd853cbb67f4,2017-12-13T02:29:06.780000 -CVE-2012-1921,0,0,2b3c3ea26c577129cd4a5c0be1631f0838752fec12c79a5a8ec3a04266d91b0a,2013-01-24T05:00:00 +CVE-2012-1916,0,1,ca8502a7977a1c11f55a5af42c5ce1ed22a3328116993e552dbb0fabe7125d72,2024-11-21T01:38:02.540000 +CVE-2012-1917,0,1,25b6b5adcef5e2f54b5a080f0a09d234825d019c42f2b90752b61b90c736c92a,2024-11-21T01:38:02.700000 +CVE-2012-1918,0,1,7e103567ba555509fe2b8ffab45d3c919d88fdfce357e061912dd911b38145d3,2024-11-21T01:38:02.853000 +CVE-2012-1919,0,1,fef15423f60ddfd6d77420cfb59d05939c50474824c842298f4479e2089cc4c1,2024-11-21T01:38:03.010000 +CVE-2012-1920,0,1,f7df35ba6b174ef1a77271c72babcd77bc2ecbf1b50167d8ec3838302b6c2882,2024-11-21T01:38:03.173000 +CVE-2012-1921,0,1,3e7ed6e00688da7c574481fe8102ed520fdb7d5e5a157039593e23dc9bf021f7,2024-11-21T01:38:03.320000 CVE-2012-1922,0,0,4decca798e8143291614fac93bdee772f6f29bb88fc35c1986442b63d677ed62,2013-01-29T05:00:00 -CVE-2012-1923,0,0,e2ace93bfdd676022a551bb14a959d985d3519321ffd4bfdf01831aac1588f2d,2017-12-29T02:29:14.207000 -CVE-2012-1924,0,0,ba7991f458092c8d9156e015e10dba25e0eae9d65b93e15fd75e1f382f2719ae,2018-01-05T02:29:29.413000 -CVE-2012-1925,0,0,ad0db2b2c4e613be94a144f00f951dd33ed11a8d55ec7402e2b64ae1867fc856,2018-01-05T02:29:29.507000 -CVE-2012-1926,0,0,296dfba06ecd4e609caa1e06fef1a6908c5f3a6c3a35fbae40f188342cece89d,2018-01-06T02:29:38.270000 -CVE-2012-1927,0,0,f9008aafe8171cceab326a840111ccc9d7a2dc453d4b80b26aaeefa4f2638490,2018-01-06T02:29:38.363000 -CVE-2012-1928,0,0,ee681f425efad04d6e3e3c3d61f77f7713cd67505f5b6da7af7161b4e3a1e03d,2018-01-06T02:29:38.473000 -CVE-2012-1929,0,0,7599a18492709c680236be502d4b45bc1fc0768c1e3924bae97d39922b7b5161,2018-01-05T02:29:29.897000 -CVE-2012-1930,0,0,3eb6e5256bddea37d7bd0989a6c592d1ab3251385c9acae02375cfbdb6c7fa3f,2018-01-05T02:29:29.993000 -CVE-2012-1931,0,0,d61e079641309a4fc4afe54c52f0088bf2e6adf9ed591d320e9cd45f0f4a52b8,2018-01-05T02:29:30.087000 +CVE-2012-1923,0,1,a47cecc41e3050b82d7be96d46d783cdc7f7d01ca17b3e248ffa06bc38c1980d,2024-11-21T01:38:03.600000 +CVE-2012-1924,0,1,2d957894199e28f718d02e9aae631b04a399d758d04bfebe7ff9c724e4548e93,2024-11-21T01:38:03.750000 +CVE-2012-1925,0,1,ff7130b18fd9110009becb8c6118e2a1b1023953511622ba8936dff5b52f74a4,2024-11-21T01:38:03.920000 +CVE-2012-1926,0,1,ee2f48c314115586e946b8974ed171f608c793e7af884932eea837212ab74640,2024-11-21T01:38:04.153000 +CVE-2012-1927,0,1,d2be7b8e574afdb155273227ae6f74e21e965c0530bae49a40f9f72660d6ec4f,2024-11-21T01:38:04.333000 +CVE-2012-1928,0,1,7f9668294de47e584e085f1dc9eccba1e596bc9b09319e282ac88d5092205d66,2024-11-21T01:38:04.517000 +CVE-2012-1929,0,1,05fd478ce7b700bea0e08d242aa6f6fd1dd8811b92e1dcf4c002f145eff72622,2024-11-21T01:38:04.707000 +CVE-2012-1930,0,1,5a3e0bc711905437a006105a1ccf7ab4fc5b8e248ab494389ad4b32da47673f1,2024-11-21T01:38:04.893000 +CVE-2012-1931,0,1,1c964340cc3b41ebc88fdd615946a6bf86685d63c3750be79ac113d5d393f9f8,2024-11-21T01:38:05.073000 CVE-2012-1932,0,0,7ae4c6a4aa3c730c61bd3a391aa5a5e99bb98a3d5c843a51dd31cb268cd5a832,2020-02-20T13:11:23.013000 -CVE-2012-1933,0,0,e5cb9f7b788c58bf65618f403488d4892b39e99ff614f6f16923aa5e3e7132c0,2017-08-29T01:31:26.680000 -CVE-2012-1934,0,0,3d77d434f061d5d4893f5ce6d87f60cc9b4027decdb50523fef2cc700da18a6c,2017-08-29T01:31:26.743000 -CVE-2012-1935,0,0,67fdc9bf69d66eb297deb2b6a2563f3e23e2a32f8ab94ada4cb446f71ff263bc,2017-08-29T01:31:26.803000 -CVE-2012-1936,0,0,20d8cb872a73f37b52fd8424f3ec27633c1fc2576e52c705a1be4f3e4b49f210,2024-08-06T20:15:17.180000 -CVE-2012-1937,0,0,de1049e560f0ee9c2794f1099d98dd4264a3d322464c265fad9b6109354c3350,2024-10-21T13:55:03.510000 -CVE-2012-1938,0,0,baf307ef85ec8d7e4d610357e0b2738a2382c4a807dd5bdc5d5513f2c610aeaf,2020-08-28T13:20:36.753000 -CVE-2012-1939,0,0,8db719f3d51ccc62cf11c27e6fc1c19f31cc3e64045d582df3b1b8ec3ea85223,2024-10-21T13:55:03.510000 -CVE-2012-1940,0,0,f337a899190f22436fbe3dec46901ecb9132a265fc21254c879a3b0fd520b40c,2024-10-21T13:55:03.510000 -CVE-2012-1941,0,0,614e1d023c2e525c81d0f3701c3880195558a2bb20c48b4d3e2b709744d197ba,2024-10-21T13:55:03.510000 -CVE-2012-1942,0,0,abfd00d224fec42d73e42e6affcfde543ad7490367829c886d24efc4d80edbb0,2017-12-29T02:29:14.923000 -CVE-2012-1943,0,0,49998420f7ad263e5ded328ba5e7ceaffeb63f24e8a97877cffce9fa7f75143e,2017-12-29T02:29:14.987000 -CVE-2012-1944,0,0,79546a5991f31ceabe053d159c80ef3e6ba1101fe8de95010657553199feb79f,2024-10-21T13:55:03.510000 -CVE-2012-1945,0,0,5aa6c0f0e840f30c0bfd4ca540d5778d46bf75e6b80bf82a41c18e516cb90091,2024-10-21T13:55:03.510000 -CVE-2012-1946,0,0,0f2410a7f5ec66dcb746e125a0e0ca7901fe642fe579d02b9ae4c7c614ed7e50,2024-10-21T13:55:03.510000 -CVE-2012-1947,0,0,bdb727d192f66967b5211d0e4e0d478c59a4dec8aeac0693c110bfd8af3ffcb0,2024-10-21T13:55:03.510000 -CVE-2012-1948,0,0,46ffa60cf78c041378bc09b12db9e51369f95e4335e57e959a48e4b7fc6e4a3d,2024-10-21T13:55:03.510000 -CVE-2012-1949,0,0,0f88603d5b42864c7dbd11ebc4e637a86ae921374692b371c771e58e33eff3ce,2017-12-29T02:29:15.783000 -CVE-2012-1950,0,0,c8c92fb92755b8f794bdde444d037768c8552d4b1f93f51a34c10d168d7e90c0,2024-10-21T13:55:03.510000 -CVE-2012-1951,0,0,558ea3c17d31dec9609580ec67c292deca671a0f2b6a2d094909d2cdfd859204,2024-10-21T13:55:03.510000 -CVE-2012-1952,0,0,d18f75ab7e4e28a1b9277d86c039195fe2c3227034eba8f8d06364a3c5551376,2024-10-21T13:55:03.510000 -CVE-2012-1953,0,0,cd99a2ea4edfef66869b374c51b72d0aee493fe90aacce95d9368c62943bd81a,2024-10-21T13:55:03.510000 -CVE-2012-1954,0,0,f976359acf59280ea0a970fbaf642200f74fec6c8f62c1f63a32f89aec04f7df,2024-10-21T13:55:03.510000 -CVE-2012-1955,0,0,66565e6853c469a65158db118b0c782d3db9ab82c36bf5a5b1ae106d00dd6339,2024-10-21T13:55:03.510000 -CVE-2012-1956,0,0,747f233d876ee605fe8fef2e1268e5debfe5779407d15a3c06edc4ea81da482d,2017-09-19T01:34:54.183000 -CVE-2012-1957,0,0,a287ed0aff3a0396b30f8281107080078d0777324c4c283c534b04408242b724,2024-10-21T13:55:03.510000 -CVE-2012-1958,0,0,55f183024ae31679571dacffbb6376d7e86a7a37e14b2858ee455265ffe19165,2024-10-21T13:55:03.510000 -CVE-2012-1959,0,0,bb27208fe4c99b37de426c36620f89bb7bd76e3f119d4f6086afa61fdb8b7a7e,2024-10-21T13:55:03.510000 -CVE-2012-1960,0,0,b462a228a5ccf6f0cdcaa623decc429dffbf6763bd0ee661f8cd67729152e84c,2017-12-29T02:29:17.363000 -CVE-2012-1961,0,0,91f3dc45b0043a20a145f1939f0830642b759763fa3fe4757eb9223412a8fe4d,2024-10-21T13:55:03.510000 -CVE-2012-1962,0,0,f66d89f86d60f13f65d8afb76ae912353227b1fa4ba7edfd89e3e51936fd2e41,2024-10-21T13:55:03.510000 -CVE-2012-1963,0,0,a714a4e8170529f80d84c0231cc102f053eb2a8ad040c4c10cec8b7427495ddb,2024-10-21T13:55:03.510000 -CVE-2012-1964,0,0,85358402e0ae4e2fbee3bda40481b03564681c55adffdbc82d1a56894194013b,2024-10-21T13:55:03.510000 -CVE-2012-1965,0,0,889570b02dc5ba8eff4f6d40cefb7d614fde9047ee47b591ccdeeda26bf9523c,2024-10-21T13:55:03.510000 -CVE-2012-1966,0,0,6c92cb7c53f8ad1e83a6b37d40e169857a26ee64ce1e5d83f0004c32ad3faf6f,2024-10-21T13:55:03.510000 -CVE-2012-1967,0,0,12dbdb5df1710faff0536f36a1175f886ebe4997951315231d272bf56a66d492,2024-10-21T13:55:03.510000 -CVE-2012-1968,0,0,27ebe73883142f072af598560566ec29c207588bb004b9a5c64972f3a5465d11,2013-10-03T18:50:03.497000 -CVE-2012-1969,0,0,9e5be1a5b1b80b43a5a94ce968fccf491fbefda7c3064654a7220f8aab35a2e5,2013-12-13T04:59:06.353000 -CVE-2012-1970,0,0,575740265534935c807eaf3eceacfe433fcb58787a72cf057d65361061793811,2024-10-21T13:55:03.510000 -CVE-2012-1971,0,0,3a5d1c8c0eab621d9d12a4969c3684daee4494a5e867c5fe31a097f8cfc0da49,2017-09-19T01:34:55.543000 -CVE-2012-1972,0,0,cd48042d1c48e15f25efb8e997cc01ae7e0e441014c8756c3dd801faacf48565,2024-10-21T13:55:03.510000 -CVE-2012-1973,0,0,5c26f8725146cf51aaf77a28a3c2a60128cfbd3287193d1a7bec86b8ca7e399e,2024-10-21T13:55:03.510000 -CVE-2012-1974,0,0,44e236705937c8631ddd8908ef81dc3ade336bae51495938146c2f1615c7e8e1,2024-10-21T13:55:03.510000 -CVE-2012-1975,0,0,52ec3957fbf48a78754b637564dd09525acd0bd9a682b0b4ce2b4068d960a269,2024-10-21T13:55:03.510000 -CVE-2012-1976,0,0,3a321fe95b18f179e0c6fe7ea897ded784908ac6d012eb5086e39c2080d09f8d,2024-10-21T13:55:03.510000 -CVE-2012-1977,0,0,b9ffb51a1189bcd61112770425614b1036fb58755df82fed7ea9cce480f04457,2012-08-29T04:00:00 +CVE-2012-1933,0,1,c586ea5420b7b88bf55704b1d41ef4a58a7acd6d8eff3ce9484240bb876088a9,2024-11-21T01:38:05.407000 +CVE-2012-1934,0,1,297e0eb4639080e9f9d8a1e0a21d54c23fc96df5ee8f1279979418ca0988f5e7,2024-11-21T01:38:05.563000 +CVE-2012-1935,0,1,0af98e0cb50c8fa3ea9f7c6dbac9d57a58aba7fc72e2f5e2e349da0a75ca857c,2024-11-21T01:38:05.733000 +CVE-2012-1936,0,1,3611eb35e488619d29e5f42e81b629de9db99d52fabd1f43cca02d55b9e033d1,2024-11-21T01:38:05.900000 +CVE-2012-1937,0,1,3f251e3a5b5deffa9d09400015f7df91fe63552c84104201c10ca9f3d48cb0c0,2024-11-21T01:38:06.077000 +CVE-2012-1938,0,1,9b9110849b0356a30dbacd3c4904544f24901a35b0b2a2ecb0e8064a7e8b4156,2024-11-21T01:38:06.257000 +CVE-2012-1939,0,1,a83aab2aeeda368be038afff7c66508cb75f8d34f974a2ca07c3f9adfe9efd46,2024-11-21T01:38:06.453000 +CVE-2012-1940,0,1,0d588059ecde80e3e9fcb08b2f80f716e135530f4ed2815c106ffaa46d2d208e,2024-11-21T01:38:06.603000 +CVE-2012-1941,0,1,bfab5d60b421743a66052c5ea13e469748bf6492fef2cbfada5008c1e693123b,2024-11-21T01:38:06.773000 +CVE-2012-1942,0,1,36500772235f4483ee45bcc8b8e809f06f63e670e66fa6a8a8578afda036f2af,2024-11-21T01:38:06.940000 +CVE-2012-1943,0,1,c8d70ba16c31596def898368f4620abf0b903248cca78eca92fc259dd8ad6b4d,2024-11-21T01:38:07.080000 +CVE-2012-1944,0,1,6f4887e5191bbe3373fe734059be7197197f619d51f2f1838004800e549e7645,2024-11-21T01:38:07.220000 +CVE-2012-1945,0,1,eb71bed26bc80ca28eb9de6a023a18080ca5eb8bbad00298267ac0012d16bc1f,2024-11-21T01:38:07.380000 +CVE-2012-1946,0,1,f5cad05d639e76e9a28df18eff2cc5997accb8a9739890fdf96397c551de9044,2024-11-21T01:38:07.540000 +CVE-2012-1947,0,1,3bb284216a6b119986e28e8210c03110182e79683345a5ccc92ddf4c4f826fbe,2024-11-21T01:38:07.710000 +CVE-2012-1948,0,1,89a30fda796dcf0cae07290c148ad7a86bf94389db2b1455a61c61c44d7e3f0d,2024-11-21T01:38:07.873000 +CVE-2012-1949,0,1,b1783691421aadf540520c8631353dbd78cc4713784f14631561ac5c10cc8742,2024-11-21T01:38:08.067000 +CVE-2012-1950,0,1,3338563e7679c987b0b4c3783d5b4b248a04df29067dfe2d72faffee75ea23ce,2024-11-21T01:38:08.257000 +CVE-2012-1951,0,1,375ee1287e93f7eed0a1645ba6ba9653c7626381f49166745365af85aa8b4448,2024-11-21T01:38:08.427000 +CVE-2012-1952,0,1,081b88ba9c712eff2fd17adc4de06a573e132fe886f99e4e3dd9ba985bd638b4,2024-11-21T01:38:08.603000 +CVE-2012-1953,0,1,387085290728f88296c1ca118b39861cfc87bd525e951a2af5de5c97dab3f7fd,2024-11-21T01:38:08.787000 +CVE-2012-1954,0,1,4d6414de3cfde5e8e8fbd7f859c256961221a973c70a21d1e84f5d36ffa2c70b,2024-11-21T01:38:08.983000 +CVE-2012-1955,0,1,c412bd1d975307f1dcaa283242b0c21c6ac884e7dd9a970d2395d9045d975323,2024-11-21T01:38:09.173000 +CVE-2012-1956,0,1,a4eb5761da82e42d2182e4dacca78c5009ae0f5b35df9d4a81279561e2caa528,2024-11-21T01:38:09.417000 +CVE-2012-1957,0,1,f40cff91d0502c600d9fdad34960d9bfa47ee6f656b72c9ac43260dbadd1a3a4,2024-11-21T01:38:09.630000 +CVE-2012-1958,0,1,eebc04bbf5081d155ebd90b4a4fde2d3c35943afe81012a078ec54e2c18f2388,2024-11-21T01:38:09.823000 +CVE-2012-1959,0,1,705d8a8ded09f8fe83ce6c7ac5e20530870f8ca341794f27b6fc8550a028da6d,2024-11-21T01:38:10.033000 +CVE-2012-1960,0,1,45d14843e4bd7c343ca57ce5d75ebfbaa21eb2e0f4d53658bbed7fbf2fd214d6,2024-11-21T01:38:10.233000 +CVE-2012-1961,0,1,dbbed4df344d24eba14d4ae5cf13f9925c2c105bb2e371accd1e86dec8f43a8f,2024-11-21T01:38:10.430000 +CVE-2012-1962,0,1,fd132e50f70505458ab8b617878d2ff7d5aa901723e6fbd1a429c49cccbecafb,2024-11-21T01:38:10.617000 +CVE-2012-1963,0,1,9a7a7467dd01b424f5848a21da7d8b0813a41aa4c0c0e9ae18e3768c9438dc4e,2024-11-21T01:38:10.800000 +CVE-2012-1964,0,1,320bd0674174414684f32d7d327f79940153faf8c23c8b8ac3a63e14cf1dbf62,2024-11-21T01:38:10.983000 +CVE-2012-1965,0,1,82061dcffc9a7efdec1cfb78294afda6b51eaf05a875adc96d121acbae5ace54,2024-11-21T01:38:11.170000 +CVE-2012-1966,0,1,077a2a682bd9c8386e08ccee37b6c7e2672bf7e7263c761a55487f07dc3b60ce,2024-11-21T01:38:11.333000 +CVE-2012-1967,0,1,a85517b5944b5c795944ace14a95dc4b930a19b4ffb62b3cbcfca3c27df4b674,2024-11-21T01:38:11.500000 +CVE-2012-1968,0,1,02f2e997c87e14640d83c778432147542f3dbdc16430339248811489f721b417,2024-11-21T01:38:11.687000 +CVE-2012-1969,0,1,f796c54581897638e550757fe8633d61d49cba77d7114b3ff29c925fc734e775,2024-11-21T01:38:11.830000 +CVE-2012-1970,0,1,9ab40cf14ba84d2222e534a83bfd35c0bdca82b0cfb85cee8aa4f1e0b996cd59,2024-11-21T01:38:12.007000 +CVE-2012-1971,0,1,ab32fa3d3b9d2bdb754af48fdea18fbbd772d4f544df38f4dbff8fb07ab25894,2024-11-21T01:38:12.190000 +CVE-2012-1972,0,1,daca6e9cfff6b5bb9b80a6370fcb8c561f34659218613943486fefecf382e6c9,2024-11-21T01:38:12.420000 +CVE-2012-1973,0,1,0db3321f640caddcb2d9b78ab985a5e8bfd760f759144d0e61164d2967e5e628,2024-11-21T01:38:12.607000 +CVE-2012-1974,0,1,7843bfbd0b4ce0da54850dffa4db8175dca8631ea582fb29dfbe0d2413888cbe,2024-11-21T01:38:12.800000 +CVE-2012-1975,0,1,cb136609a5d70922f4652706023fa3a889deb87dfeea4575a1d68696d80d2410,2024-11-21T01:38:12.983000 +CVE-2012-1976,0,1,e6b04679942860de00e0f2163de21fd26d05788b5bb9b1edc78123649c689c75,2024-11-21T01:38:13.177000 +CVE-2012-1977,0,1,6e2d9ad72205be2d4624a79db20ee4ff4860c2306fb99be52cdd44697b19dd99,2024-11-21T01:38:13.353000 CVE-2012-1978,0,0,165189a096b645e311ce6643a1bcf576089a1cae147ba652858ef3ae3e0992dc,2015-07-27T15:58:42.447000 -CVE-2012-1979,0,0,284d6fdf657e2621ddf143a2b4934cb432114b5f7dad5a54c18c1ec131fd9f28,2017-08-29T01:31:26.867000 -CVE-2012-1982,0,0,b9e2c711bb2f75fd5f2ddb3bd3f233e3e4c0d067d887225737e4d75cfe1d3444,2017-08-29T01:31:26.930000 -CVE-2012-1984,0,0,70a3a68367f5f988f5723cfa9383d7b75221e565080d1db3cdbb28d6afe4989a,2017-12-29T02:29:18.393000 -CVE-2012-1985,0,0,25c3bd5caac3a444b4e5e1449d9cce1532c91c5b2011582d7512bfcc1a42ec65,2017-12-29T02:29:18.457000 -CVE-2012-1986,0,0,5d94cd1b089da4054dddb090200ca34ee79f688bbbe2b8f50e479b8200dcfbb0,2019-07-11T15:09:06.720000 -CVE-2012-1987,0,0,41e6158fdb9eeadd7c71cab4e35b7a095fca538c4419586f401e80eb83139990,2019-07-11T15:09:06.720000 -CVE-2012-1988,0,0,c5b3fc66dd2da77952bbec8b03a2e4217435e7092d04c4585ebdd19923ec6d3d,2024-02-02T15:14:09.640000 -CVE-2012-1989,0,0,bc896710f07de89ac51e84914675c01fe26a0062c4eca43fe80d31bd5e38f279,2019-07-11T15:09:06.720000 -CVE-2012-1990,0,0,6a5ca3138747e527438e8b9c40884c7bfd5c92c1168163c233f23a0866841de3,2013-05-15T04:00:00 -CVE-2012-1992,0,0,a6ac7e73d71e566e3bdf5cf4a85b7d64045d04fbd6feddf091ac6741fe4ec2a9,2012-11-20T04:44:35.157000 -CVE-2012-1993,0,0,d1258fbb93e4a53d1f3b6bfba0c0b14496ae0e28873d869a35b9b1ca49330ba7,2017-12-19T02:29:39.643000 +CVE-2012-1979,0,1,d683a71071c251455c2ea9ce21d6a181c5827eabad2073d6f77938cc1e26c4ff,2024-11-21T01:38:13.727000 +CVE-2012-1982,0,1,bdcda20fff6ebb3852512aada181ae1ff8f1a7029324403ee5f59f28d716c41a,2024-11-21T01:38:13.887000 +CVE-2012-1984,0,1,490975fa5801697ec8b7789c3acff7fdf5baf9c7fbd565b027bc14e441ccf112,2024-11-21T01:38:14.030000 +CVE-2012-1985,0,1,ad3c41690bb5a1f6098aa5472cc865be9042f33ec32ee76decc23f191c6b4375,2024-11-21T01:38:14.183000 +CVE-2012-1986,0,1,0b0f8fce2a170f7546254a1b18bc4723ffa6c4475907887e908bb07e210d35b5,2024-11-21T01:38:14.327000 +CVE-2012-1987,0,1,f5fbdaa0357a4ce5f6e59a384b73ddd1653798a2430d5584895273097e921d87,2024-11-21T01:38:14.523000 +CVE-2012-1988,0,1,fa44d5973953bc2fb0376e9ee21aa1a27c408d45c133751bc3096d398e0484f5,2024-11-21T01:38:14.737000 +CVE-2012-1989,0,1,20d811c2506b7013b6271f54c42da1eb5fb913103938cd887cf19ef577161bbf,2024-11-21T01:38:14.923000 +CVE-2012-1990,0,1,ebd01703ed66d10d24a48a7f02b22eb983e09f2980cc0ceecdf4ee7e2e726d77,2024-11-21T01:38:15.083000 +CVE-2012-1992,0,1,aa15767af87deb2fcb8e847216f1d3d307848e1fe69a230315783315e4b8d065,2024-11-21T01:38:15.227000 +CVE-2012-1993,0,1,d4847fbc33c5a4cc97c25b71b82a39c01d6ba82ec92b569e8ebacce7ff57781c,2024-11-21T01:38:15.387000 CVE-2012-1994,0,0,d28ff54408e1e85c738da2a62bf417a83024ab156743f2bfebafd19a3ffc3c1e,2020-02-11T21:48:04.487000 CVE-2012-1995,0,0,4d949a423784a7e1497e2ed3ca205b9cc4af2e19c5a0ef0e6857c9f87d722a31,2019-10-09T23:04:49.357000 CVE-2012-1996,0,0,e47af3ad6827649c3cdce8a4649b228959960d2cea6ee13cf5bd13b5ff027a5d,2019-10-09T23:04:49.620000 CVE-2012-1997,0,0,e68914db3e6c994f68c423182404a1afc8c74bbe161a39e6b33e3319643ca8a6,2019-10-09T23:04:49.760000 CVE-2012-1998,0,0,aa5bbd042ab21a069ed712b034e2424e688e58ddfde66738b651d6ff03137c4f,2019-10-09T23:04:49.870000 CVE-2012-1999,0,0,144f524e120f3087cd90a2430e8c1951b8e88df214978e618f8d0b375e856bfc,2019-10-09T23:04:49.963000 -CVE-2012-2000,0,0,c6022a66d7cc5e698e276177a0d14dd0b318ffae19ef42ca1fa21a469a10e7c7,2017-12-14T02:29:01.823000 +CVE-2012-2000,0,1,9fd975d79822ab4daa9b1863804020a07cba7e25f5a38838190886e92329eb7b,2024-11-21T01:38:16.403000 CVE-2012-20001,0,0,eea683d457c10ec24aa4f01b875f7da0c8c18342f626e332f2834eb978bd5357,2021-12-30T21:13:07.177000 -CVE-2012-2001,0,0,53ccc6498a2ba4b2e149596301f60eaf1485df06ac1b4708f37547c1c3151f08,2017-12-14T02:29:01.887000 -CVE-2012-2002,0,0,e1dbecc5313e39a3ccfc013b0ee2679ab674c5cc6faaadfead71d8aaf73572a3,2017-12-14T02:29:01.950000 -CVE-2012-2003,0,0,d2ee4d1e9212db8796f0fb339c5629394e5c5a6d8df1ae2710cfcc47ca21a32b,2019-02-26T14:04:00.853000 -CVE-2012-2004,0,0,00e659b69a9f942bd5f0042a0c653b52fe2dc8e5bb395ca66431b0d5ccd41549,2019-02-26T14:04:00.853000 -CVE-2012-2005,0,0,a86ca7b76f48b427a08e1907e0cc00fcf9649d05830b0bdea24363c47acea30d,2019-02-26T14:04:00.853000 -CVE-2012-2006,0,0,e1194a24968b1429404cd3e4225ce5fa934fbcd469ef2b4b7b47850b29619dc8,2019-02-26T14:04:00.853000 -CVE-2012-2007,0,0,4db2912efd92628291c58f69b9955c2686745c39ea06e3241f71744095534a65,2017-11-22T02:29:01.100000 -CVE-2012-2008,0,0,c39786c8c8ddc30407be25cb3b3228ca3cebcf4b8df81fdc7e11a08d30a67e91,2017-11-22T02:29:01.147000 -CVE-2012-2009,0,0,5cade8a2d8cbdee7494fe5998da3e0108630f8e74a96a7fbb098675d13924fc2,2017-11-22T02:29:01.210000 -CVE-2012-2010,0,0,087e9634a91f0fbe4fb60bf68f2828497de928967e3dd9146579f7d96b3f155e,2017-12-05T02:29:03.607000 -CVE-2012-2011,0,0,49b735d55fbd70cdd9230edd2197ad35103c12a289a1ead40b95d441ab4c22b1,2013-03-22T03:09:56.263000 -CVE-2012-2012,0,0,7664e8c9aa72f8dfae730364e3fc865b0d63afa72cc21d386357107b65f71488,2019-10-09T23:04:50.747000 -CVE-2012-2013,0,0,2963a0aa58479ce6a10948e5e704fba54c48c3a2ecd7db3852f13836ba512a5e,2019-10-09T23:04:51.043000 -CVE-2012-2014,0,0,952cd644481e2e844acc3f644f8af45d5fcbed8ec70c84a5b29aff0ae851ca9d,2019-10-09T23:04:51.197000 -CVE-2012-2015,0,0,cc02b8ef39f839530416716339285f187e8c17b8cc9ab18ab71741969211e940,2019-10-09T23:04:51.387000 -CVE-2012-2016,0,0,799b3756a4a3fffecd1a06109548e2e389ef373aed03b14e6a1293ad69b9f4e8,2019-10-09T23:04:51.543000 -CVE-2012-2017,0,0,f8c117b7522078fc8863e95a3fb99fe70c25ad8f4f2b6bdec08847ed87427cd8,2013-03-22T03:09:56.770000 -CVE-2012-2018,0,0,2838998863df50332089faa724155bda6276d4006f4243e483904f1d3253347c,2013-03-22T03:09:56.840000 -CVE-2012-2019,0,0,4101c1a4e456ba10ce092570406ecced011ba4120dcb6130a738c4a473b8e779,2019-10-09T23:04:51.840000 -CVE-2012-2020,0,0,8edf0e391ae423b419146ac17ac080c68da349df5420342708de358207711f3a,2019-10-09T23:04:52.010000 -CVE-2012-2021,0,0,5e17255362ae1b06e9fdbcf7a8809f37d151fa42e2f110a443afbf90592192cd,2019-10-09T23:04:52.107000 -CVE-2012-2022,0,0,d8c7bd40dfe969128a84398525e303cf08793c45aeadd15647abe852645a453a,2019-10-09T23:04:52.230000 -CVE-2012-2023,0,0,fa981cbe108cd37c92a275efe654b219bd420bcc912cd71fb55e9085cf1f123c,2017-08-29T01:31:27.413000 -CVE-2012-2024,0,0,8b16322ab74eefcb405af962100c1cb44caeb405ab8ca432c1123024e98ac84c,2017-08-29T01:31:27.477000 -CVE-2012-2025,0,0,13b6e49f5772975cc3ec3aabdfd12bd44864df44cb73c723b6ab70627d52125c,2017-08-29T01:31:27.523000 -CVE-2012-2026,0,0,1ce2c3ca2779bf92cbb2bc925ffd72a7e90f3d019eb7d3750ec5b0228546a07b,2017-08-29T01:31:27.587000 -CVE-2012-2027,0,0,3af66f66e80526e61fb1f6ecee6cee55706a1912de26fe30e2961f6f2a8500bc,2014-06-21T04:17:07.790000 -CVE-2012-2028,0,0,547a7a2a332283e14349c8ccf315ef3d858fb697ee7eea89ba1afa703f876c05,2017-11-22T02:29:01.273000 -CVE-2012-2029,0,0,83c8297a8c55ad9df7d061f4b3563ad8b03c40b4652d7a4663bc79e1b54e299a,2017-11-22T02:29:01.333000 -CVE-2012-2030,0,0,4da2f871e90246814f5bbe10f37d3b52eb92808dc45da424748c290ecef1917b,2017-11-22T02:29:01.397000 -CVE-2012-2031,0,0,8e8eec986641f5d5289895b33ac61eb2227b41d11d1ada62c6e5f9788a390b65,2017-11-22T02:29:01.460000 -CVE-2012-2032,0,0,8883a489f33e0c7e60492fc1f149a79b844c62cc17fcf6e6931d6ffe62b97893,2017-11-22T02:29:01.537000 -CVE-2012-2033,0,0,4171072a28fb58c50e79e83973e464cb0e788ef3ea738289d09293dbcb75e7ed,2017-11-22T02:29:01.600000 -CVE-2012-2034,0,0,63edab9b9de633a172066f8025765e74f3355560ddf330dbcc41979c1afdb848,2021-09-08T17:19:28.477000 -CVE-2012-2035,0,0,9d296353852a523708b7868a7bd46bb203aa6e6706023375c62ba07cbb1df92d,2021-09-08T17:19:28.560000 -CVE-2012-2036,0,0,14c250357c6006bb55589fbbfaba588814703fb7a8999f761630d98af534afed,2021-09-08T17:19:28.613000 -CVE-2012-2037,0,0,46574ccf058ccfa4dbac2fd318094882b0be3fb85ff9c1cb19b99849883a6e82,2021-09-08T17:19:28.663000 -CVE-2012-2038,0,0,cb9280a8d807f55d0d6d092a8fb2f79f93e3715a9890cdd979013b6d29fcc1e8,2021-09-08T17:19:28.707000 -CVE-2012-2039,0,0,63b2631ff1e9462f59de76ec0f2ebd69c8f76021a9be126b766b99eb2fba9b03,2021-09-08T17:19:28.763000 -CVE-2012-2040,0,0,fecc274e1ccb1bc1eb1ac7a7e62c1c5fbf7acd28cb23bda07da48dc662cca39e,2021-09-08T17:19:28.820000 -CVE-2012-2041,0,0,b25197b486cd1a78b8a556f7119dfc5ffea345964f3b9614d4056c6d6f8fa554,2012-06-13T04:46:46.360000 -CVE-2012-2042,0,0,e7c9c7b7e5690e78e391592e6eebce31f7ff2bc59307b7dff360fc3abac40daa,2012-09-29T03:17:26.017000 -CVE-2012-2043,0,0,7acccd17b7946ff872b5f638318fc04b87d186acf82fd08028e2c12137f42050,2012-08-15T10:31:40.727000 -CVE-2012-2044,0,0,ba2e20128be4a44ac5e941a148542b00f54c178a000b177d8633f4df9797263f,2012-08-15T10:31:40.757000 -CVE-2012-2045,0,0,d5a6f4cd17c72d3081f6c137df4c8cb6d2b3a26b48a915e36f3338bdd2e27ba3,2012-08-15T10:31:40.803000 -CVE-2012-2046,0,0,ce181c141b842c931980f2613bb10fd82e44a38cddfcc9057432028040b45f44,2012-08-15T10:31:40.867000 -CVE-2012-2047,0,0,503320ccb9aa9d1dc38a63f3e1eff4d783515d29610f01d7a6facb913527153a,2012-08-15T10:31:40.913000 -CVE-2012-2048,0,0,46fb121dceae33b4a0b4e6442d9c952460ecf2c2d97233c6f4404c50e89e3911,2017-08-29T01:31:27.993000 -CVE-2012-2049,0,0,d475899b039ba80a1fd3141b8e9d59bf7c633bac00f1aaafd2c71d81a83b4273,2017-09-19T01:34:56.260000 -CVE-2012-2050,0,0,10bbbe3856fd55996c477692d02a98360951ab9c9308456d8ac996aa540e2f9f,2017-09-19T01:34:56.353000 -CVE-2012-2051,0,0,02243cdb82b0f0a09bc653e33452c321433b50115dded939d90c4ee944864639,2017-09-19T01:34:56.433000 +CVE-2012-2001,0,1,b00c02b037544e80f238e2e64ec647768d66fb49a0a040a56133152fd9feb8e0,2024-11-21T01:38:16.517000 +CVE-2012-2002,0,1,9db54403faca8e763bf269106a630766eac74e88a743ec85b74d3f15c6ea0776,2024-11-21T01:38:16.623000 +CVE-2012-2003,0,1,f9ccb81c070fa921b11cc1e36d6bd1fea67253182b72f081e1e3c853455b3084,2024-11-21T01:38:16.743000 +CVE-2012-2004,0,1,2c3480b5bd37f12f8975fee47a0da9c432de7337a93e8bba03476c84d1e37a2a,2024-11-21T01:38:16.867000 +CVE-2012-2005,0,1,ee29e3cfbf0c372b76074a4176845cae58124260a329d89781ded40c72330359,2024-11-21T01:38:16.987000 +CVE-2012-2006,0,1,c9b95ebd33e77fc8024879daaf015f707e674b1fe66e6137959663658a99a33b,2024-11-21T01:38:17.107000 +CVE-2012-2007,0,1,c0ab9fa903be2bc5ed9b922c307471653661bf1e683239a0eaee57c53212e14f,2024-11-21T01:38:17.223000 +CVE-2012-2008,0,1,b2cfc505f61d6559ca506535c39eebbf752846ba9b936cfef1ad152b184dddee,2024-11-21T01:38:17.323000 +CVE-2012-2009,0,1,6ce33fec8383012473bad360a0ed21f36ca3dec82c7aaae8cc199dc536e8bf85,2024-11-21T01:38:17.423000 +CVE-2012-2010,0,1,a07e973f8db7f06f0a345b9b0d20536ed0fa36100f3fd3e5901cfd6571171ae1,2024-11-21T01:38:17.517000 +CVE-2012-2011,0,1,51c02643ff31789afc0df28b5b2bf9b17a64379cb2c04b5ef938bcddc977243c,2024-11-21T01:38:17.613000 +CVE-2012-2012,0,1,af4c2e91df81aa8f9e0fefdfdc94d57880702516102078c8ff2bd84157a36fed,2024-11-21T01:38:17.713000 +CVE-2012-2013,0,1,3c83cc896e4f02d7ecd3ddeb18c080246ecf54009d82285947afedbf190578d5,2024-11-21T01:38:17.837000 +CVE-2012-2014,0,1,d0416fe3870e0a02f815aee75e701a428b74ea66fb605d775718066bd81db6ca,2024-11-21T01:38:17.947000 +CVE-2012-2015,0,1,f487e367b9c36cfd13eb1069ac1a5d19578e7d5680921cfa3ad555acb969e966,2024-11-21T01:38:18.077000 +CVE-2012-2016,0,1,d0ef80a85f2f294ed62d656d2f784f04c737b174f26085876b4088c68ff25405,2024-11-21T01:38:18.197000 +CVE-2012-2017,0,1,6d9f50693f7c99cfb45a42e0c9a9d096365fc6012c7c0c65ca23b731aad355b0,2024-11-21T01:38:18.317000 +CVE-2012-2018,0,1,b9ba13160a0c31c82966509bd25b1616544c0c3fcd10dd8c9914189e59c93778,2024-11-21T01:38:18.420000 +CVE-2012-2019,0,1,7d96edde50cb42a5f71580e34478d3413ae8355d0f5255f89b0e44729782e5e3,2024-11-21T01:38:18.527000 +CVE-2012-2020,0,1,332447ef844a241c5edcb316734c3e93a6302dab026beb24f5c4c45958ef789b,2024-11-21T01:38:18.630000 +CVE-2012-2021,0,1,7d5b7d014ef4815e0b4864bcd51f8284276cc2b321e4faabdbea97fd8868b96a,2024-11-21T01:38:18.730000 +CVE-2012-2022,0,1,034c79d3ba7377f10abd7cffc1af1945aab2df22e65db71ce0bd47f654719cc4,2024-11-21T01:38:18.827000 +CVE-2012-2023,0,1,3c62cce9c40f88db772a46c521c702bd347f829c0c7ddc00062f520b16125385,2024-11-21T01:38:18.923000 +CVE-2012-2024,0,1,6514b1671dfb283e774dd2c1d2ccd84ebcec28720d6e1044cdff3e6a3782479b,2024-11-21T01:38:19.030000 +CVE-2012-2025,0,1,9728a310e7bf65cc82545178f561592b7dc87fdd3048f607f8b40d9e4d092335,2024-11-21T01:38:19.140000 +CVE-2012-2026,0,1,eab9525e1b981c84704691efc11b182c5661565369e8ac920d9df90aea0c1342,2024-11-21T01:38:19.250000 +CVE-2012-2027,0,1,d4dbf2d3416de14f93bae844f913e9e9b933549cf73e73b146c517d47e15e55f,2024-11-21T01:38:19.360000 +CVE-2012-2028,0,1,ef5b1b3abc257d24968d964a622699a1932dea55df37735860ccaec7b9355cbe,2024-11-21T01:38:19.470000 +CVE-2012-2029,0,1,0448aef62c7798a083e009cdf349b212fa728db8d930f0caac1ef2e47b0d8dd9,2024-11-21T01:38:19.587000 +CVE-2012-2030,0,1,300d496ffd9eef3105ecdaf2df4eebec37df1a460bc6a4dd502d172ee00501e5,2024-11-21T01:38:19.707000 +CVE-2012-2031,0,1,5cc2de186e7a318eb9c81e4fa85c6bd503a0dbd98805d8ecc96e2cf237acee74,2024-11-21T01:38:19.863000 +CVE-2012-2032,0,1,16c1908c3bbd53dbea83ec89888d7ac2f2ccd256ec203c68d7a1e84a908a4fed,2024-11-21T01:38:20 +CVE-2012-2033,0,1,419a71e657167938af09950a08dcad3ded91fa6d06f0f88b7c75fe257006678f,2024-11-21T01:38:20.140000 +CVE-2012-2034,0,1,1b2a07390a9af7b4ab19e40accaa1b27e834bafea51e11370fa58c3f4c64b9a2,2024-11-21T01:38:21.080000 +CVE-2012-2035,0,1,4229026d9614edbed414bec60d1ece9ae57a5fe31f8fc02de705239318ce86aa,2024-11-21T01:38:21.520000 +CVE-2012-2036,0,1,05c2d0322a601c3726cfa2c0f247f4fccc13ddb52c9ef6c3f9fef6738f2b0d20,2024-11-21T01:38:21.653000 +CVE-2012-2037,0,1,5ef3bd9c0c193fdc09daf598731a6c16cc8996063e795ebd86a6fe8e5acdba8f,2024-11-21T01:38:21.800000 +CVE-2012-2038,0,1,2e2b0797151296c30d611ffc556528b5d8b98fcb215aff55c1a757498f85744e,2024-11-21T01:38:21.940000 +CVE-2012-2039,0,1,385a1eb4df01a959780d8abf26bf83fad60f19d50756fbbe1f40106fedb46a84,2024-11-21T01:38:22.080000 +CVE-2012-2040,0,1,95951e07b12fadd09ae550705e8ed6bd072d1d9b7c2ffe5aabe18fa7192f87fa,2024-11-21T01:38:22.207000 +CVE-2012-2041,0,1,59d06d1239fe63a16fa7c74d38b90c459b660a18d500495567164cfb5509db40,2024-11-21T01:38:22.320000 +CVE-2012-2042,0,1,169c3f9bd328dca7066105b5d1fed6ba6a468447c9359677cac96fa1481903fb,2024-11-21T01:38:22.420000 +CVE-2012-2043,0,1,4f700d12376c41799c9cf7936fb365904e113a6246a5cebafe36f8876b6411af,2024-11-21T01:38:22.537000 +CVE-2012-2044,0,1,40d8e9ad52619334c72e70763c52efe4773f02c82d62c0dc404b7a0ebe50b9c1,2024-11-21T01:38:22.653000 +CVE-2012-2045,0,1,f423ebb3499c3461c460714b805cc92f2082c1f4d6c0eab48376905bb6bc23a3,2024-11-21T01:38:22.760000 +CVE-2012-2046,0,1,c2c8e1bbafb7d2b81f221df6e833e4dd685a92e0a9fd57b23a6bdb7bca2a9fe1,2024-11-21T01:38:22.883000 +CVE-2012-2047,0,1,c16513c988418086e119861d81113cab7dbf0603dc4a4fd0acdf25c19ef2935e,2024-11-21T01:38:23.007000 +CVE-2012-2048,0,1,c0944ca45a304f1ee076eadfc4ca7214db6530009c3ab0299182ce6c6ffdb487,2024-11-21T01:38:23.130000 +CVE-2012-2049,0,1,1c466575771ace1813685eee3a2cc33f588c7789c1602ce2134d2a5dd32fd968,2024-11-21T01:38:23.250000 +CVE-2012-2050,0,1,db51d8352caef46dfc893e4cae5b7a1144aa4cc19b028b6d2e14bd985f611d46,2024-11-21T01:38:23.370000 +CVE-2012-2051,0,1,c90e2405b64fadfc1d5eeee0edf86a5a2c7f9041cd186f6025809eeef5bd00ae,2024-11-21T01:38:23.500000 CVE-2012-2052,0,0,4e67c5c5c113eb640224c1dadb9e97c06b811236ad6beb603195ec3d4868dcd6,2014-06-20T18:04:45.453000 -CVE-2012-2053,0,0,eec01be2e0919008ad843434d641f450567d1d494960b22f6197517f0d6616b5,2017-12-20T02:29:01.193000 -CVE-2012-2054,0,0,f6749809f8f2ccbbf5a7c8378e224147d3f2dc6acc38842c056f965defffb2c5,2012-04-05T14:55:05.840000 -CVE-2012-2055,0,0,e86639c78cc3963af54e35de09167972d37bb5f74dab8e5b3e13856a5dfee938,2024-01-21T02:39:05.073000 +CVE-2012-2053,0,1,28f8bd47b5d6deb8401ea43d69eaef5c60abca9b3a246c63779c8fa3ec5c1843,2024-11-21T01:38:23.740000 +CVE-2012-2054,0,1,25f1b242a265d0c9893ac44a51f1e15907e11c7f6e802f1f1dca22c469da03be,2024-11-21T01:38:23.870000 +CVE-2012-2055,0,1,9c3e61f002233f2110a288f93a97d0eb603f6a7b17f0595bb5299a1ea9cee1e1,2024-11-21T01:38:24.017000 CVE-2012-2056,0,0,a537576faa788bf4188eb8146eb522dad8ef04f02417566111c6b0718121c4bf,2012-09-18T04:00:00 CVE-2012-2057,0,0,44e5d75078dffad13dce376ab827a4a3816774e4e5f513f4bea29cbdeb28abdb,2017-08-29T01:31:28.053000 CVE-2012-2058,0,0,2082a57ca8cefe46496b795ab71160376689479581050a0aa7e4ceb6882b128e,2017-08-29T01:31:28.117000 @@ -53701,162 +53701,162 @@ CVE-2012-2059,0,0,ce5f0adc064df6cf893457a98cd94783e0fa1c3d3ef420474b23d4ce3df94e CVE-2012-2060,0,0,943ab28f0cf977408c05c2e1fde4cba7a2b4af353c17dcd3904bd1e7ad85049d,2017-08-29T01:31:28.227000 CVE-2012-2061,0,0,4fa14b6ddb0e820279d75c5dbe56f9fbb2e6ea3a14d2bc16b9fc7a9d5e7ad5b8,2017-08-29T01:31:28.273000 CVE-2012-2062,0,0,d7821c3c751e0299873cf9d1374ad04bcc144adf47f37e0f19c2f0a2694a1f12,2017-08-29T01:31:28.337000 -CVE-2012-2063,0,0,ab4af8b3db873f533ebe351fa99a3dabd6deee2ffdee686b7523143f1a1ed62a,2017-08-29T01:31:28.413000 -CVE-2012-2064,0,0,4aff22fef3fb46e76e91f282511cdb6d00590e6e7497e0f9229f6be1ba981ebd,2012-09-05T04:00:00 -CVE-2012-2065,0,0,b887dbb70dbb749ac01bd196a55cd220714b4a4a5d85129009d657353cf7b097,2012-09-05T04:00:00 -CVE-2012-2066,0,0,6c13a53150929e4f111486153287b452c617dbc882a5b2720ae0cd4a4d439269,2017-08-29T01:31:28.507000 -CVE-2012-2067,0,0,ec393e23230198f74e00a087210dae0d5944aba955e2b5302374fc5e40f940d9,2017-08-29T01:31:28.587000 -CVE-2012-2068,0,0,b140b4c7a547e30082264a3a8bfd906d19f06802a28396784ba999448626631a,2017-08-29T01:31:28.647000 -CVE-2012-2069,0,0,59bf78aa0034b8c004a91e2e5d3da49e61342aedea43993906b18bc352f31354,2012-10-30T04:03:47.423000 -CVE-2012-2070,0,0,b28a98a15e1923dfc7a4e6e867591905f23f5972a035e4f5b2cdd5cfc5debeeb,2017-08-29T01:31:28.727000 -CVE-2012-2071,0,0,640222935ea9b618478828a277e5fecfb364e62c0d994db58b0f3da0265a573b,2017-08-29T01:31:28.790000 -CVE-2012-2072,0,0,e5b490d9c2f1c2c7ad8d1757848436b430ff64b6c1f43bbf5ea8c5eb60bc9311,2017-08-29T01:31:28.883000 -CVE-2012-2073,0,0,d7a0edb09be1a44d365114175924693a526cfc8d87931763ae282cf6b3a47525,2017-08-29T01:31:28.930000 -CVE-2012-2074,0,0,f3f1a3b926e00fff85634f699ac7e9162d1d83387516cb40d1816f6fff74dc0f,2017-08-29T01:31:29.007000 -CVE-2012-2075,0,0,4c5e205b901fa2eb406cb2f2d6b01a9427e045e5f1b6c7bada858dfce4da751e,2017-08-29T01:31:29.070000 -CVE-2012-2076,0,0,1e1c8d7763709a85abfaba0efbc29c035746f8452bf76397b79ec57e236b74b8,2017-08-29T01:31:29.133000 -CVE-2012-2077,0,0,646399162356f0e8ece1b7a80c7769abbbd4be96bcd6413d2b500b9afe4263af,2017-08-29T01:31:29.210000 +CVE-2012-2063,0,1,6b41f8295a4914f48d82b259e98fb5e37e42f8cfaa4ea16616ab4576b3247cf0,2024-11-21T01:38:24.970000 +CVE-2012-2064,0,1,fc555ec77f9561fc755b15dfaa6c1e653149dd36f380c1ba292ad3223a4f217c,2024-11-21T01:38:25.100000 +CVE-2012-2065,0,1,42e53104eee7147df13cb41c3c794544c3bf06876e25162a46feb8eda7d62df2,2024-11-21T01:38:25.217000 +CVE-2012-2066,0,1,cbd1f42d21cbdd5cf737c4d899a59727ce16b67a6b9d946dfc18ea2659aae10a,2024-11-21T01:38:25.357000 +CVE-2012-2067,0,1,090ae8cc6372dc7fe2d8ecb2178fdf8b6584065622e77e55125d219b94cc5788,2024-11-21T01:38:25.490000 +CVE-2012-2068,0,1,1b47a49ce2f8c72480e62e5f9df62244e1720f376068d10361dd602f8f0ddcf0,2024-11-21T01:38:25.627000 +CVE-2012-2069,0,1,0d59c653950ed2627bdef1c271e6952cc1bd3c70866e077c56b34961d6a62d18,2024-11-21T01:38:25.767000 +CVE-2012-2070,0,1,fdd06d1c42d3649b385f952b0cc1c6d701eae41d0f992d658e2be325a89f903f,2024-11-21T01:38:25.893000 +CVE-2012-2071,0,1,1f8c42e9fac8cd4eb770ab794051d86af370c2889d49cca559e32d7bb996afa6,2024-11-21T01:38:26.033000 +CVE-2012-2072,0,1,d9abdcd29642621ad655971dea88a563abce16cd843d8e684bd66d9931adab39,2024-11-21T01:38:26.160000 +CVE-2012-2073,0,1,267da5235dc1c9b2d632b6399679fdb1ea64e78a7e8f3e2a5a9e18439e0c0283,2024-11-21T01:38:26.283000 +CVE-2012-2074,0,1,907a56c9e7ac7e6f8fc4b83adff13f81146dc6778dd3efbe2519e06096a202f3,2024-11-21T01:38:26.407000 +CVE-2012-2075,0,1,83fa1f0cbc7c4afcb85cf15045178f645818c8a8f0c8c04eb03f0268763c2f13,2024-11-21T01:38:26.520000 +CVE-2012-2076,0,1,b359b3b7ddf3240a8f00df0ad5d02c782386e3dc0e16bd9b73b263607a65e689,2024-11-21T01:38:26.640000 +CVE-2012-2077,0,1,3eee9360f35fd9376fee463e46421761ad3e65039e08d7a26d5d9dd10972c09c,2024-11-21T01:38:26.760000 CVE-2012-2078,0,0,7e0c15c861e5d4cf1cd2158e137fc73d0924abcd136e5d5e64900342d0770114,2019-12-11T14:29:02.823000 CVE-2012-2079,0,0,5787ff456a224b6fe0952fe3f61e5eda9ad6ffe9f71cb2e25d0124a30b610203,2019-12-11T19:10:45.080000 -CVE-2012-2080,0,0,7374808419dccac1907667da919c45eb0af9b2d684eb7496c80cbacf184be23c,2017-08-29T01:31:29.273000 -CVE-2012-2081,0,0,07d9a7bc7bfbfbc7e2466430b90a7943492523408be070affdcbafdc07359d7e,2017-08-29T01:31:29.367000 -CVE-2012-2082,0,0,f9d3370d89c6698535b43cd8cf4389ab302cb252f7bbdde37976c1f14238ef7e,2017-08-29T01:31:29.447000 -CVE-2012-2083,0,0,0b23bb920eda61f8226295aaac1ee3bc72108eb71eac86a9fbee0ed5feb47cfc,2012-09-04T04:00:00 +CVE-2012-2080,0,1,b2c9213a2eb451977d8d586def93114b0d68e89bfe0218cefaf1666dfead7bfa,2024-11-21T01:38:27.120000 +CVE-2012-2081,0,1,d9a6c9bcc9a1301464ad71c65af433b966f213d283fb5d2883a8d5d0a695b343,2024-11-21T01:38:27.247000 +CVE-2012-2082,0,1,883b2bdc293e0e204109fb248cca16ddf4263aa940adbbadd923e96e216676c0,2024-11-21T01:38:27.353000 +CVE-2012-2083,0,1,6f416d85e6b34e34aae1e3fe46661f693f700cc90a181d8f5a41de557652df98,2024-11-21T01:38:27.473000 CVE-2012-2084,0,0,b2bff7d6236db0c03173c423a01ea8a4437dac8ecb5998813c7d4c201b4c82cb,2017-08-29T01:31:29.523000 -CVE-2012-2085,0,0,f9f063370f2e2b6f65a3a43472ed743fbbcd03fe32c91209bd6ce525e294a88a,2013-04-19T03:21:09.723000 +CVE-2012-2085,0,1,e6271384e5400d06b1878ac986ea150b31d102808fda55ade05629b974581396,2024-11-21T01:38:27.717000 CVE-2012-2086,0,0,9ed7936b9f210246bb3e5f48c922dd61f8e3998eb8dddba29b602145f55f8ef6,2013-04-19T03:21:09.797000 CVE-2012-2087,0,0,17c1c48e63a61316764785bada732c40a87596212052fe49bd4f29807c5ce50f,2020-01-30T15:14:52.017000 -CVE-2012-2088,0,0,4efeba53e0d10a93c6ed0cf31f1a2f59a7f51b7e007fb17482a54ef7a2bc6668,2023-02-13T04:33:18.163000 -CVE-2012-2089,0,0,cb383b95c5976a1af335d5294fe4006d39b33e3a4aebb1542051159c2fac3288,2021-11-10T15:57:01.200000 -CVE-2012-2090,0,0,6b1fae91b70316a669f25e6bc2e8b9947158c238b8e61c8ab161ede0061b7cc3,2017-08-29T01:31:29.757000 -CVE-2012-2091,0,0,d9a7296edd4f933f5a5be92f4f6c64e718d1d7b0724534477b5700ccc6d83d49,2016-12-03T02:59:53.403000 +CVE-2012-2088,0,1,6903f8be250b8c471639a3ef9135990e5d0a66ca5f60006cc1c09ee0c74c9b8a,2024-11-21T01:38:28.080000 +CVE-2012-2089,0,1,bbf4f78e03148b8256ff6b5a8d6d192b5a3bdc2c297aff9596e4c5a51abb4594,2024-11-21T01:38:28.220000 +CVE-2012-2090,0,1,b53d1cc01a0e8ebfcf3d1a6eb81a42d49e97885af983fe2e37d55f2af90b988c,2024-11-21T01:38:28.363000 +CVE-2012-2091,0,1,43e7801d202f18aa6531801f83682af8e81a6be4c78c2fed43dcd9627bb7db3e,2024-11-21T01:38:28.490000 CVE-2012-2092,0,0,65144545a7bbae38a4c0c1be1786ed16f1f01551bf629a1efb09cd665ae478d4,2019-12-17T19:10:41.273000 -CVE-2012-2093,0,0,ec80635c4cc5c23ed1b3883ffb9333198d60b0ab07514ff926808445f419bae7,2017-08-29T01:31:29.837000 -CVE-2012-2094,0,0,b939305d7d3fc23bb964a03d46248130f5d264eca40a6c5cc570b685dfb5a59f,2017-08-29T01:31:29.960000 +CVE-2012-2093,0,1,87a5b29e7bc0062635121608b403a658183269fb2cc9896977c8215b8e33a015,2024-11-21T01:38:28.717000 +CVE-2012-2094,0,1,dcc5dbcd700342bd75031d0b08db58943348cb07d2720d4eba0bcb8c6b2ae7e7,2024-11-21T01:38:28.830000 CVE-2012-2095,0,0,e649d577cc92029efee22c0ab6477621b68093db3e824530ca771749c6f8b308,2014-04-08T14:52:25.957000 -CVE-2012-2096,0,0,5af70ec7359ca373b9a61308969e40fcda89a5809e6f9fcb3d39978e7d98cabd,2012-08-15T04:00:00 -CVE-2012-2097,0,0,7e087a1ee37b3967975e9affe357ae0cc4b6302294020c5092bbe0fab98fbd4c,2017-08-29T01:31:30.040000 -CVE-2012-2098,0,0,1422556692a94a4a1c3a52302ac546dc47635f158d46bdf4be5a8d4c74902cf1,2023-11-07T02:10:23.940000 +CVE-2012-2096,0,1,cd4e777426ae7231377d846f7a70384b966c66b0ebd273219d55f5f204c02031,2024-11-21T01:38:29.073000 +CVE-2012-2097,0,1,62bc692e3091d365283a6ca11835951d95a8e0e182bd826a7290b2b16e99311d,2024-11-21T01:38:29.200000 +CVE-2012-2098,0,1,4cfa416bbee41817e883f6dd18fcfdacc6b860b1e3f665d7c00b43ca19c5db73,2024-11-21T01:38:29.327000 CVE-2012-2099,0,0,702e180618132ceabfecb19896cbb31c7f0a00c44bbc6b7422c7c8caaea95b7f,2017-08-29T01:31:30.180000 -CVE-2012-2100,0,0,5ee22ffbda8617c902892f9f9613a208c6611483a5b13d0f624b0a1877d804f6,2023-11-07T02:10:24.033000 -CVE-2012-2101,0,0,f9ea027ef4b92fb67e08da4d012bf8ff5d26f77de09792da5bcfab4d6a849047,2017-08-29T01:31:30.243000 -CVE-2012-2102,0,0,7463ad7c0f7cdd7575f3ba1fd6e6625cc76af8c66bc774543fd8948a6f86baad,2019-12-17T20:23:43.220000 -CVE-2012-2103,0,0,9dabe4b6559d93a849cfb88f6a6c5089c868390452c3ce0dded457ee075fef92,2017-08-29T01:31:30.303000 -CVE-2012-2104,0,0,b1ae44deffad15829debb0f7a82dad52eee95ee4d4aae4335e056efb12367a7c,2018-10-23T21:29:00.323000 +CVE-2012-2100,0,1,0ac7d2d82152a4f60dad2a485c48897d83f4fd2007f0409453a9165005e2a007,2024-11-21T01:38:29.593000 +CVE-2012-2101,0,1,4b925eb60f57872c1413e029c65cea9df32a008a76db814d75ffe986855a7343,2024-11-21T01:38:29.733000 +CVE-2012-2102,0,1,41443be39a4bd419c13edf6cbf9aac83c9be6e4aedb4641a2ef6b8a4275bf94c,2024-11-21T01:38:29.860000 +CVE-2012-2103,0,1,10b2bbe9c1e7c992bee10540ac0bb395a75b64a3ba5097e98eb555a7c4277056,2024-11-21T01:38:30.007000 +CVE-2012-2104,0,1,8e965666b6bbd5c48666dc95043732e29922cbc823fa12da33e27d422dc0a8bf,2024-11-21T01:38:30.153000 CVE-2012-2105,0,0,53d49fda843ec0c7e04b4c855f67534a6b68aa913fe321d02e4a0c4bdb97dace,2017-08-29T01:31:30.413000 CVE-2012-2106,0,0,f44d1ffe3c49e6898c42dfd272881bc7e721909dd66b1c491e447234d1460e47,2023-02-13T04:33:19.767000 CVE-2012-2107,0,0,1372462db429ca16cee8730120cf556c4df6c54de70c5c4334a49eef6f1f46b7,2023-02-13T04:33:20.297000 CVE-2012-2108,0,0,4e3b2154ec5730ee7457d52fa9c3846ba66033171b7f0fa5bd2b926d601cabcf,2023-02-13T04:33:20.860000 -CVE-2012-2109,0,0,85c05b6f53c73926445c43ab37b68f7347dff4f138b039310e3400f3e5e0a4ba,2018-10-30T16:27:49.907000 -CVE-2012-2110,0,0,82fce7a76dfa7e712ca6adc3368c436518918c350845fa48074b7959480532b1,2018-01-05T02:29:31.947000 -CVE-2012-2111,0,0,e911e4d4dc9bc198e884e9c0b2b2b5697afc594d35f6cd48da132958445429ae,2018-01-05T02:29:32.040000 -CVE-2012-2112,0,0,c0b588b64690dac32f4dc8e8daf3bb0c4a4c8b1e0d75ed7b3b1e6b260faaebab,2017-08-29T01:31:30.743000 -CVE-2012-2113,0,0,c52d224d990c5c46f1b18d3f1438349f3b27d63922c266f172381e1fa4cf81d3,2023-02-13T00:24:13.620000 -CVE-2012-2114,0,0,432d4c1ea420626f2a351550eddf444afbc318032c0d1a3e0e6aa5d860bc4c7d,2012-12-19T04:52:43.340000 -CVE-2012-2115,0,0,dc557bb28aa7017b3ec21f0a7951e7da43165f0bde42ac31f3c4859eba2fe8e8,2017-08-29T01:31:30.820000 -CVE-2012-2116,0,0,c8b294f4707ecea140a6e0dc81455f0ca2eca46923eac8a32efb67d0b322f991,2012-09-04T04:00:00 -CVE-2012-2117,0,0,adb4e77055d27be010195a236465f76538c4e7f2c13022dafb86020370a0d3e4,2017-08-29T01:31:30.883000 -CVE-2012-2118,0,0,7e62c7a1d684f4638c97449de8328614556100a23005b0249152a02e0ddbfe08,2017-08-29T01:31:30.930000 +CVE-2012-2109,0,1,fefdc3989cf51e78173b1311a049b813262d601cfb2efbfaef3569feb662c53e,2024-11-21T01:38:30.820000 +CVE-2012-2110,0,1,094d73ebd90e439c3345230d1226706c0c4cefdff309a4b0c81224244f877c98,2024-11-21T01:38:30.947000 +CVE-2012-2111,0,1,bcbdde9033ed3a718838ab6cbc79710c30306e9200e0ff3a82d893ed930a7278,2024-11-21T01:38:31.140000 +CVE-2012-2112,0,1,6ff98f9a6394fbeeb718adff13ee5d074781478c0fc627e85d57f795bf5210d7,2024-11-21T01:38:31.297000 +CVE-2012-2113,0,1,fc3735036beb96c6fc633ecb13214f3f5e58e2bf5bf6f952ca630b01c40c989c,2024-11-21T01:38:31.450000 +CVE-2012-2114,0,1,eb089c251cff4c60a26ff3235b26955f3c1c084b963ee55e0c1b1ce96daebf3d,2024-11-21T01:38:31.593000 +CVE-2012-2115,0,1,17c4afdf028dffdadff023327b529b7b861b367da64af5bcd5ab016ce248330e,2024-11-21T01:38:31.720000 +CVE-2012-2116,0,1,f2ccdd59162097cd990f73b34e2ecd10098e1cfceb924979f745c5f82a3c35ca,2024-11-21T01:38:31.843000 +CVE-2012-2117,0,1,f7cb022740f105ccb2c2e59d5d088afd24146c851b6d881a5bea4ed715f2ff1c,2024-11-21T01:38:31.970000 +CVE-2012-2118,0,1,b935b59755fa32edb5e6bcdca9022ac6a61bcefa861fba8682b5f859bfac0b19,2024-11-21T01:38:32.097000 CVE-2012-2119,0,0,d785f5e668989005a2aee95e362e400e4e1f3d8c32691c8d67cb9526188d815b,2023-02-13T00:24:14.017000 -CVE-2012-2120,0,0,7896376e476d26d3995511f386c171f565333049b8f26817f8e58d4fc955e1e4,2012-05-21T16:24:56.587000 -CVE-2012-2121,0,0,1d96be9897955bef816d94dcd9622a8a20ced2d4f1a9a11fc73f7c9095db216e,2018-01-05T02:29:32.100000 -CVE-2012-2122,0,0,d0558d2b25f7f3620191699d944aea0fab4b43612c7158dd67285ef12fbf0d54,2014-02-21T04:50:38.233000 -CVE-2012-2123,0,0,01d49828a1845d1fe0c62bc14a15b378d1aed26da5177e4feb0a2c2da7fef36e,2023-10-12T14:12:18.073000 +CVE-2012-2120,0,1,6ce7070177b80f573a24553ca199b05b043ec2c3e3acd8d04f83fd5826341c7c,2024-11-21T01:38:32.337000 +CVE-2012-2121,0,1,d5bef47ae08d96fbd28313479380f9c1779fd9a350cd8ad9cfee473240e49952,2024-11-21T01:38:32.440000 +CVE-2012-2122,0,1,68a65b8301112c5263edf4ef17202af3ea92244d4bddd16009e0aef0403d19e4,2024-11-21T01:38:32.553000 +CVE-2012-2123,0,1,b2032b50a0909b414d8302edd763ec00d76b6d5270dd8de2091ef37f2d28ec17,2024-11-21T01:38:32.693000 CVE-2012-2124,0,0,64b527fa6847d512306231e4fc9d7c6c35e9694baf66473b3854926d9d3063f8,2023-11-07T02:10:24.393000 CVE-2012-2125,0,0,861c4c05c716d02a7ea3b70c697ed1d134cb08199ed9f07bd7e82db0b3b314eb,2014-01-14T04:17:25.030000 CVE-2012-2126,0,0,d4bf6a8650dd8c6792737d2d896b76b238b9f898c9237c7174b9f7af02f78cf7,2014-01-14T04:17:25.110000 -CVE-2012-2127,0,0,64511dd424f956678f5ab4fe5acef284e5e5701dd812f09da193b59e992a4780,2023-02-13T04:33:22.140000 -CVE-2012-2128,0,0,49e0d5ba23b95ec64bd4576ef93a8d093d8aeffdcd86923bdf72d427a60143dd,2024-08-06T20:15:21.120000 -CVE-2012-2129,0,0,85d070e646298dbab213e9b2f807603d503e8a12d47e2ad9b6433d274cc19edc,2017-08-29T01:31:31.117000 +CVE-2012-2127,0,1,e4a684e6edfb030f6906120e40a145b5dfcf4e01bd7ef93626d92a988737686c,2024-11-21T01:38:33.237000 +CVE-2012-2128,0,1,931532d2f12420da669f2a3dcaf23e5bdf93f34bd2df3b204144df238e10c062,2024-11-21T01:38:33.390000 +CVE-2012-2129,0,1,017d6013355a8a952ce71cc3544af8a417d31582e711793c514d48c089f84c29,2024-11-21T01:38:33.520000 CVE-2012-2130,0,0,61e2df7ba581009096c0144345ad8d2228e5f8808d21b460e0c5359c4477f6cd,2019-12-18T20:15:44.900000 -CVE-2012-2131,0,0,1eb119fdd573b82726aadf931e7a65e096851b00b38682ccd66b6f330f499946,2018-01-05T02:29:32.180000 -CVE-2012-2132,0,0,5bac3805b0f0299eaae032510d363360e549044bbefa52dd90e0c99e83cc6b46,2017-08-29T01:31:31.163000 -CVE-2012-2133,0,0,8520819470a3f3d68e7cc8feb72883d254d2c3e33a2d5fd77f354e74a22f413e,2023-02-13T00:24:19.330000 +CVE-2012-2131,0,1,d6fda018f646814d88870e916a133151c07d393c96183868dc9831751898e796,2024-11-21T01:38:33.783000 +CVE-2012-2132,0,1,1cb0385bf54f2d7ed250eb327e29b612369f21dceb2e4dfa6cc9d7148c12faab,2024-11-21T01:38:33.933000 +CVE-2012-2133,0,1,1237a7d535facbaf016b52555e79b0a88443b40e529b7a1138dc60f1af005390,2024-11-21T01:38:34.043000 CVE-2012-2134,0,0,fbc57054f7dc2e26b363fa974950ae29d2f3a47b648ba341a2ca3e5b8dbc7c9f,2014-03-10T19:18:05.667000 -CVE-2012-2135,0,0,67491dc0777dd1b84b7384b7b142775cd8609c00df1c91ea2d3aeb68ee5cf865,2023-01-19T15:53:44.433000 -CVE-2012-2136,0,0,28cde39157c76e003296f08e260c90c9547fd257b446e4f3dd9e9ac752588a2c,2023-10-12T14:12:02.680000 +CVE-2012-2135,0,1,441e407666c71d13b7957d98663a05895d42a3ac2329944677e50a302a624b13,2024-11-21T01:38:34.297000 +CVE-2012-2136,0,1,86fe278d28224f000c3d050f59108efb9eee19b62d6adaabced478b264d2a179,2024-11-21T01:38:34.430000 CVE-2012-2137,0,0,31e76e807536b9977253efaccec9506a310f67690133e5c5ab27b9c18561aa56,2023-08-11T18:44:45.233000 -CVE-2012-2138,0,0,1208e78ce34a81db821ea72d9480c85df67d2018d7bae5392eb6bf1d9ddab65a,2023-11-07T02:10:24.610000 -CVE-2012-2139,0,0,885e54110ee292b6a3ce31280539d2b2d3e53fc9f8b4a48808b653ecdaa59a1d,2013-10-07T16:18:35.840000 -CVE-2012-2140,0,0,bcee8f0abc64414470cc5599d002295557f498eb964a4467431809c402972ad8,2012-10-30T04:03:55.957000 -CVE-2012-2141,0,0,d0996223222245d454d49618a9ac85ec46ef9fd9a5b60bb406f4fd9eef2d16b9,2017-08-29T01:31:31.320000 +CVE-2012-2138,0,1,e3fa4b22de287604e8d21a5c3a14e529d20538455f065cf2b3e05451b24347cd,2024-11-21T01:38:34.703000 +CVE-2012-2139,0,1,187c7813139a524374fd76b9d9e06c5c2c760b5032f9588e1207d04b8ce8ad38,2024-11-21T01:38:34.813000 +CVE-2012-2140,0,1,580c8614cf734cea44e2bc171f6fcc04642910ea089d8a6c671e9779bd9b1476,2024-11-21T01:38:34.937000 +CVE-2012-2141,0,1,171bb8d6c59439372f7f2a9962a4554bda4ef4f6e07001125c895082b79a5c1f,2024-11-21T01:38:35.063000 CVE-2012-2142,0,0,9abbe1f2e7fb700682e1efaccd9acab5cdf1815c6d0586d0d4d5377a4fadb2e0,2020-01-15T18:30:49.553000 -CVE-2012-2143,0,0,7dadff4d7f001381c2a00725330324f7f9a38eff1b921773100301708b04c036,2024-03-14T19:59:00.810000 -CVE-2012-2144,0,0,c1090767acf93252bb3b296ce3589b521086ffa5da7868f735235f2f0aea8dbf,2017-08-29T01:31:31.383000 +CVE-2012-2143,0,1,1ff1e71f8a5e436b4e1ba38013d4826175644651f0e6a090227cfe86f8a2b3d0,2024-11-21T01:38:35.357000 +CVE-2012-2144,0,1,11de285da5880b3aff0e540fce13ea871fa145c8188385cfb8b59074c17f4a23,2024-11-21T01:38:35.550000 CVE-2012-2145,0,0,fe97b0737152c1bc0907b4f10e154ef516e5a89469fecd3f060f1d6ded639dfd,2017-08-29T01:31:31.553000 -CVE-2012-2146,0,0,11dda36bd4d6fbb0c36081aa1e8b94474014e00c9967f094f66059fd9009c4cf,2012-08-27T04:00:00 -CVE-2012-2147,0,0,0f806132ad6c7fdb95d44d3f092f85dc208c5f0258e4b1b4fd6c42d8f3293757,2017-08-29T01:31:31.647000 +CVE-2012-2146,0,1,4fd4a3683778618af86ebd39af018c2cae00ccfe2d4b0c808ceb98b3f40c5493,2024-11-21T01:38:35.803000 +CVE-2012-2147,0,1,9c7eaae4751a428cee5bc4c4159999debab68dc1fc116bcc825b069c0a3c0b8d,2024-11-21T01:38:35.920000 CVE-2012-2148,0,0,451756e6d79a6bcea05034b1b67ab16d7d63e8d8504d8f0d734addde09fd455c,2019-12-16T20:48:20.723000 -CVE-2012-2149,0,0,b33eb591ab0876f8c2cd4b9fd6c67ceb9b162be1903e0168a739275b8037673d,2023-11-07T02:10:24.890000 +CVE-2012-2149,0,1,4082ab0401ed8de125ed0bab523fee71f62bcfdf46d30f8125ad1f23a66f6762,2024-11-21T01:38:36.167000 CVE-2012-2150,0,0,52805ae76bcb0e7afc3eb4bd258c042feead5dfe67f6e4228709ce1ff103843c,2016-12-07T03:00:06.430000 -CVE-2012-2151,0,0,5cee5c79aa65a2522763b688ae63964ca18f49f8d9794aa16d4e1eb097781749,2017-08-29T01:31:31.727000 -CVE-2012-2152,0,0,f24e5ada5b93e8441ca50f803c330f8770a8c748c5dd7bdb8aea46d9651ac7e7,2012-11-06T05:11:08.500000 +CVE-2012-2151,0,1,d0aa24351d1b9c3963bb216e1f0bf37537bb3d292bc7602edd761bca5a5224a2,2024-11-21T01:38:36.470000 +CVE-2012-2152,0,1,0215302236403ff636065d8eddba62620fdbbea2021f2b20c5bbe7d56e3311e8,2024-11-21T01:38:36.600000 CVE-2012-2153,0,0,d241853e05804ebf6cf264e36deed5ceae3d3a9102cd3d01694c9ddba7b250d5,2013-12-13T04:59:30.167000 -CVE-2012-2154,0,0,799ca750dc1f97662c3792848b3630526be9ea22a7dd22914da68c088ddf18ab,2017-08-29T01:31:31.803000 -CVE-2012-2155,0,0,d6be45e25b6a2f2082e661315733219bfbb5e041ba608176bf00a4b17347c0f4,2017-08-29T01:31:31.867000 -CVE-2012-2156,0,0,f98a439c57a79e907dc0cff653b66d66dcdb79403b92ae7792d25530e2300b50,2017-12-20T02:29:01.427000 -CVE-2012-2159,0,0,f452e615246d85e8ea8aa9e7000296f419b6628199480182c1a5d9854fce3aab,2017-08-29T01:31:31.913000 +CVE-2012-2154,0,1,15d124c32884c98deb50eb8207666a1ad2775733e6be9baed8d9b072d88735b5,2024-11-21T01:38:36.843000 +CVE-2012-2155,0,1,10b34f08f912ae9522ae8591be60fce2a4c02aa89f73f6d2979d7441581f134a,2024-11-21T01:38:36.960000 +CVE-2012-2156,0,1,95ad982470b5abc1341eb8f2316e8c9816ceaf4293ae1eeba0f826db4cc3bc7c,2024-11-21T01:38:37.083000 +CVE-2012-2159,0,1,218cdaca1417052c059abafa63ebd76a4c178eb3c2c9845352cbe40fcb459f30,2024-11-21T01:38:37.240000 CVE-2012-2160,0,0,e0831bdf4de66fc89e625720a401508dd63241e03a6d4fda3e5c3b3a8b1b900f,2022-10-28T22:38:34.750000 -CVE-2012-2161,0,0,a562de9f15b2f5069f02443ab74ce36bb2ce9fe2ab7a49eab6991282d06c1087,2017-08-29T01:31:31.993000 -CVE-2012-2162,0,0,b2b821dcca170ad8861503cd0520555716252b1bbf8abcc12e5757d68519ac9c,2017-08-29T01:31:32.053000 -CVE-2012-2163,0,0,668f25c523315a113a877e9d094d3cd234c19548d61d092f179db137b1a0c9aa,2017-08-29T01:31:32.117000 -CVE-2012-2164,0,0,a99fbc5e6537df14552c121e03ab1209915e0c554702be8ea6befcdf2dba1c6c,2017-08-29T01:31:32.163000 -CVE-2012-2165,0,0,ff87a4f63586ab8b12f9caa2ae7d88199f6d26db34746765643e5c54920927f2,2017-08-29T01:31:32.227000 +CVE-2012-2161,0,1,04a007b18060037b75c59f23ba1459642126d9c597ef2f12550e498efc0697eb,2024-11-21T01:38:37.457000 +CVE-2012-2162,0,1,f2302b2bf7d2ff129e4fb78edcd3954e5df78ffccb066c56eab18317c9c5c6b5,2024-11-21T01:38:37.570000 +CVE-2012-2163,0,1,01135f378968c88c93cf49d19140901ff20286921ec62fcf134b750071c9db5b,2024-11-21T01:38:37.697000 +CVE-2012-2164,0,1,28fe19311a5b219af85f336d7b375bc0c94af22a3df8d8be0bfe175b0bec2521,2024-11-21T01:38:37.800000 +CVE-2012-2165,0,1,a5f06824f9bcbf22294b1ddfab0358248cb34f9c94de015c235ecd89e104cea5,2024-11-21T01:38:37.923000 CVE-2012-2166,0,0,3c8dc2ff4dea11246e82ebdb4589a0953e65b8e0d0a453fea2e6ecb5dec9bda4,2018-03-10T15:07:40.447000 CVE-2012-2167,0,0,4481546ed28b6b5dcdd5a10f6a6938aca5660ead540c32225e449953ea0d1aca,2017-08-29T01:31:32.290000 -CVE-2012-2168,0,0,26666fb3e29ded4821d93186ddfdffebbd3be8775ebcc255d4843f92400c3a0e,2017-08-29T01:31:32.337000 -CVE-2012-2169,0,0,030f0a00d3dcbabb6f0abda3c64bb4959b8b82a31fda03b8bdb4a387f5c2ccd0,2017-08-29T01:31:32.397000 -CVE-2012-2170,0,0,486d8e82841c9d7d240f45cc060314a514b8c2c6e08c799065388f1df46e4658,2017-08-29T01:31:32.447000 -CVE-2012-2171,0,0,a97f3e657fae0a6f3fd0bc4faab24f1e8ca723121f73082dd3f7233c20bd4947,2017-08-29T01:31:32.507000 -CVE-2012-2172,0,0,67643e669c87ce6aa0e1d2b509a0f8b22cb66499be94af5c1ca5282fe5a625fc,2017-08-29T01:31:32.570000 -CVE-2012-2173,0,0,6dfe7133f0098f04e6789b49614590849a67a4ea610d274118488760f73fc00e,2017-08-29T01:31:32.633000 -CVE-2012-2174,0,0,5f5822584f4a852ca1b01a22d4b5f3d5d49650a9f9ba8b28b7283b6cfb87ef42,2017-08-29T01:31:32.697000 -CVE-2012-2175,0,0,710564bad2a91bcab106f8b82f4feffed6d8858a7951c49bbd84e2fe13e53e83,2017-08-29T01:31:32.743000 -CVE-2012-2176,0,0,b11364ed8dbd9a3f8a25fc5fa9d01292013da9cfce090fa7d28de95aedbb091a,2017-08-29T01:31:32.803000 +CVE-2012-2168,0,1,2c9b56332b8b5f82e3a0c9f0c6480c7b27233d8372586e54ccb256040a7c1f65,2024-11-21T01:38:38.290000 +CVE-2012-2169,0,1,8e17717462fb440c14616e58bd551a84ed867f350e8167fa838fde400119462a,2024-11-21T01:38:38.403000 +CVE-2012-2170,0,1,eb9bbe64ec0d9120b11cb85eac2bd6ee4199fbb78197c65cdbbd27c5f94d8d3f,2024-11-21T01:38:38.527000 +CVE-2012-2171,0,1,59585c9bd27b06909bdcc1f1ae964d0925aca571278aa5ea2d91f9f83a77657f,2024-11-21T01:38:38.650000 +CVE-2012-2172,0,1,0eccb4c15c6d932145718f2985b7881737d1fcaf53c2573c97ead8cb8eccc6b8,2024-11-21T01:38:38.770000 +CVE-2012-2173,0,1,3405dfa443df2407df72ac8387262f969bf48479131b65bfdaecdd58f0031e32,2024-11-21T01:38:38.893000 +CVE-2012-2174,0,1,a95a9a01575227515b8621fd429bf08a30ba18ebf456f7b0f757a6e16017cff5,2024-11-21T01:38:39 +CVE-2012-2175,0,1,149158d7a785684b8f424aa52e2e43745dadfa77aba96406f79af7257ff60ff8,2024-11-21T01:38:39.110000 +CVE-2012-2176,0,1,268de3879806922ed1eee62a4ad311307866db75304c8ec846da75c494e84b86,2024-11-21T01:38:39.223000 CVE-2012-2177,0,0,2acb0bb852e2817d7e6d1a2d3bea8a94d3a8edf8a9472ac59ed4b0836d53f9bd,2017-08-29T01:31:32.867000 -CVE-2012-2179,0,0,47335ea793f03a79354112ab05c4f454aa70497cc47eb1aab30604763f4a4d4e,2017-08-29T01:31:32.930000 -CVE-2012-2180,0,0,0a012e7ef770d4edceece82c61a9c258362c3cd9f3cfe3ada4237c512d6b3caa,2018-10-02T10:29:00.610000 -CVE-2012-2181,0,0,12b117fa503f2cee6c0dbb1cf3c70f9bbea4d04a441cd5bc6b9ba84e603cf0b8,2017-08-29T01:31:33.053000 -CVE-2012-2183,0,0,d0032a3297bb3c070d3dae1d16fd7e73b6f3fd1f89aca8f233fb19d0bcaeccd4,2017-08-29T01:31:33.100000 -CVE-2012-2184,0,0,22b090b918f6c2bedd96509827f3f9f210893317595f207d931ed745c9367085,2017-08-29T01:31:33.147000 -CVE-2012-2185,0,0,474e8caf44f427bab3f656c21ad6c4a5cd481231df2278da9e07fe87c671e31b,2017-08-29T01:31:33.210000 -CVE-2012-2186,0,0,d735d6061ce9251a18cb3830b02d927b631dddc82ba309bf0b1c7b630268ef78,2024-08-15T12:44:24.983000 +CVE-2012-2179,0,1,ad049634c4451ac43297fca44f388704cddaba9fa4343f85fe3a88ae05bb1f0c,2024-11-21T01:38:39.490000 +CVE-2012-2180,0,1,e1fd82946cd6fa736c921b8e147eba8baa572a9f0e8a4f2369111c8306bb81ac,2024-11-21T01:38:39.630000 +CVE-2012-2181,0,1,374d75b093f97d63ebb1e3204950554404b9ca7984e13f321f791190a2d0bc46,2024-11-21T01:38:39.757000 +CVE-2012-2183,0,1,1869b367de1b78cce5194c9ddbea640ba35fbe89fadbc14cf762ce8134e7f699,2024-11-21T01:38:39.870000 +CVE-2012-2184,0,1,1a441f108e3155eebef4dd422a28877211c4fe58e8899b79c5753264dfcacab4,2024-11-21T01:38:39.990000 +CVE-2012-2185,0,1,3ba0ff44207edd7385a5708a934682f978edbacfcd5dc274b0ed3199d5074fd8,2024-11-21T01:38:40.100000 +CVE-2012-2186,0,1,37bd0c77f64a9ff31c1e993454b71d2d3a8746c68d46b63127e3840f6306a395,2024-11-21T01:38:40.223000 CVE-2012-2187,0,0,d158e18f6afc338349731ff747fa2d6323158b84f52ea312eac46527fb875a96,2013-02-12T05:08:29.460000 -CVE-2012-2188,0,0,9ac7776acbcde4fb27c51cfc3ae6ee100436645aacfc1889f9dd6700c1da51d3,2017-08-29T01:31:33.290000 -CVE-2012-2190,0,0,b3030aa86774d8d9a8e64981329b18597344c5f658700d2f57bf3ade64fca8a7,2017-08-29T01:31:33.350000 -CVE-2012-2191,0,0,ae55afd52b74c3987a37c006338aca37b08b63841b4028e89613a3b2a3bfd796,2017-08-29T01:31:33.430000 -CVE-2012-2192,0,0,aa2f75d97f666662efd0ae57faba4f01049a18a348e7a6a977e25748173c1a26,2021-08-31T15:43:58.920000 +CVE-2012-2188,0,1,3e2bee187b24b0a95af4627b3b818dff3585638488d32447b098f513b4e1ae02,2024-11-21T01:38:40.497000 +CVE-2012-2190,0,1,648fe5c9b83653eb3f2d50c55d4c1bb47bf2fda7727f29f016fd69adddcbbe0b,2024-11-21T01:38:40.620000 +CVE-2012-2191,0,1,59147b40733e2556cd69a16a3e03ae75b244989ae91ab5a702f2ceb91a72c3d7,2024-11-21T01:38:40.743000 +CVE-2012-2192,0,1,79208fca7453ec3c744a5bad81e2142ff6830fd9ce314f8c8a9514e9b9971dfe,2024-11-21T01:38:40.877000 CVE-2012-2193,0,0,4495d759f57c38374d8c5ea998e6b57dedc1b353d162c337bef78c58a5ed191c,2017-08-29T01:31:33.540000 -CVE-2012-2194,0,0,4c067fa2a4e244aac9f0815ddb50bd37de803383fc3e56c1926584b2ccf66d9b,2017-12-22T02:29:09.793000 -CVE-2012-2196,0,0,d87eab6b3c71240d69bde1035caab79e483708ef038749a14108fdf81d79cb31,2017-12-22T02:29:09.887000 -CVE-2012-2197,0,0,d1bfe559a5d42992722ee44fb57031860b7785dcca5f6fcd4d40ba4d7e9a5ac0,2017-12-22T02:29:09.963000 +CVE-2012-2194,0,1,70aabe68701e006f9371074365ecff3fbc28496f89c8de63e4a59e69355d35e5,2024-11-21T01:38:41.110000 +CVE-2012-2196,0,1,a13be8ad53582a9c336bd2c32849fc20adb50c0f6bc3e8d4a9120ad934dd5c91,2024-11-21T01:38:41.233000 +CVE-2012-2197,0,1,5e0df1b1fd6186e2974914ba35ee24e54f6de302a99b6bcd2f8d1914ec3961e6,2024-11-21T01:38:41.367000 CVE-2012-2199,0,0,77cee1e742a3c786c75196837da33e47e5bc983c240817d64d986635540b46de,2017-08-29T01:31:33.633000 -CVE-2012-2200,0,0,aeabe92bbb78a8f4803e8ccd08f19a5e972fa9669f05c7ee036eaa0595deabbe,2021-08-31T15:43:58.933000 +CVE-2012-2200,0,1,c220a19647ed5ac9e8ea3da6efeeba38f9a549789ba44a2807d17844c9067d56,2024-11-21T01:38:41.610000 CVE-2012-2201,0,0,b4f5fde58171f6f390cd6cdc1590852c3e541bb76db68ae53d347b8e23fac2f3,2022-10-28T22:38:55.750000 -CVE-2012-2202,0,0,2ef9ea304af18c724d83de7fc127553979ad99a82a578c43c24a973e9a04ba6a,2017-12-22T02:29:10.043000 -CVE-2012-2203,0,0,1242d1716e4b553c9708fc42deeed4b31b10e157ece028a7cbca438907fba6c3,2017-08-29T01:31:33.790000 +CVE-2012-2202,0,1,6d97a7b0beb25f54787e60ac6e81eac44ca1e98e0963b3038a80af6f9c202b3e,2024-11-21T01:38:41.823000 +CVE-2012-2203,0,1,51113203ac8b4c278b297e878285bfc28896c1e5e96030f5f5c4a6f37ca67a4c,2024-11-21T01:38:41.937000 CVE-2012-2204,0,0,f366277f60e6f757a77b0642538ff9b60cca40457187389f385a8a1a7f03c4a6,2020-02-11T20:54:03.460000 -CVE-2012-2205,0,0,56272c1f3b7051c4a4dd5a3db8ed3d53e990839e6f7b056dadaa95409497ceef,2017-08-29T01:31:33.850000 -CVE-2012-2206,0,0,a7ac4e493aff580a82ac38374d38b9d16895803d0073b6725f99df20ec91abbf,2017-08-29T01:31:33.897000 -CVE-2012-2208,0,0,a041e92276b79e7840146af87a0c9772a2366815f89c7d68924d006afa961683,2017-08-29T01:31:33.960000 -CVE-2012-2209,0,0,087f83f9043349e586b3f9bd6871cda940f23b9065c84891b9be81a0b2d56960,2017-08-29T01:31:34.023000 -CVE-2012-2210,0,0,deb51270bee9cb77e9e3897e0cb0db73fb8b1e5c61a6c045baffc0b5ad8f377c,2017-12-20T02:29:01.507000 +CVE-2012-2205,0,1,dd4c618289bc8fad3ab6afb26a39e8ce93e1a567c6e0a6e66c5d9750437ed855,2024-11-21T01:38:42.157000 +CVE-2012-2206,0,1,a4787ac6659ca4962c4904519f2a7d0422dba81897a84f8228953a9b3ad0997c,2024-11-21T01:38:42.263000 +CVE-2012-2208,0,1,790d65739d31a794d9537f116fe89dc63e08a957f7ee3f013c3d2cd5fffc925e,2024-11-21T01:38:42.373000 +CVE-2012-2209,0,1,90c828a8e5faa2703df051965e33e35aae3b8cf1a015f1115f88de1813eaa848,2024-11-21T01:38:42.513000 +CVE-2012-2210,0,1,8b8ead93d17a9e665451ef361304866dd987180cc9d95fe111d9534d91d1f40b,2024-11-21T01:38:42.657000 CVE-2012-2211,0,0,c02359eea97bf229eb23709aad0cbe5cfc8c0e3e99ef43a6ce28d9c45a38132c,2012-11-22T12:28:40.993000 -CVE-2012-2212,0,0,02880043f92ad0a87c2d40eef276ebf2d98fa962229ab1e9ac292c1e87fde210,2024-08-06T20:15:22.147000 -CVE-2012-2213,0,0,30d871ab38262b11a8a8397e2b9ac3af06c113ad47086bed26b0b08cb5dd9d49,2024-08-06T20:15:22.240000 -CVE-2012-2214,0,0,795aceed3b4c50cb003e774426148d3ec74bd38592ffdf454f2f36208cade134,2017-12-29T02:29:18.800000 -CVE-2012-2215,0,0,812e4c527855ce51354a7ed78ca8c33317a833d9e8dd9e4f8893ef042fbea183,2017-08-29T01:31:34.087000 +CVE-2012-2212,0,1,2e80f4944fe74b9e2567d5bea30b0c75f6bcd4c0cf4791c94d38ee0669021dd1,2024-11-21T01:38:42.933000 +CVE-2012-2213,0,1,0b05591caf3780cbce842866247d101aa8af13b63924616a4876ca52790a9f8c,2024-11-21T01:38:43.070000 +CVE-2012-2214,0,1,433333f7fa33634a7a34b9564f08b1d1dad62071a544241ea44bb8ce596fa8d2,2024-11-21T01:38:43.220000 +CVE-2012-2215,0,1,56074f5e8d49319a1ed1746ff591291f695c7cb74d1bd0b782dad531693d3aa1,2024-11-21T01:38:43.380000 CVE-2012-2216,0,0,75520e46457e63e7eda257412f8f5181298274d4c89cf437746706712e828258,2023-11-07T02:10:25.580000 -CVE-2012-2217,0,0,1b0a7df7629cf6f805a6dafe2504e08340692cd9edab7eeba570cb0053e7b31e,2017-12-14T02:29:02.433000 -CVE-2012-2223,0,0,88ab383cf787caafcc94c2f63844f527606bf0a5e284b062258a93011831fd66,2017-12-20T02:29:01.567000 -CVE-2012-2224,0,0,30af88e1ae530dd7a7034895b9bb98ff5f561d0560cacfa7ebfb98270b9fdee4,2017-12-20T02:29:01.630000 -CVE-2012-2225,0,0,c48c7e512e5a07382834ec9d7b3d97b7ca986cdd7dcf8ff544edf182b96af8ce,2017-12-20T02:29:01.677000 +CVE-2012-2217,0,1,8fc7f9f7e8e0d113fd2a8bb6375afe27248f7b6ead9f9e5d03bce45963da72de,2024-11-21T01:38:43.533000 +CVE-2012-2223,0,1,87e35c4eac6f5a128420dd8aed9ce75ff3001d0660f5bf0f007f508aade41826,2024-11-21T01:38:43.697000 +CVE-2012-2224,0,1,7edf27372e4286b7dd52e518cb181d7b250cb554ea7f2ec211baf31bb33fd183,2024-11-21T01:38:43.840000 +CVE-2012-2225,0,1,b656a4b3a06764a5c33f69b8ea5de10a308441582a852ff3284f6014fab2dbb6,2024-11-21T01:38:43.973000 CVE-2012-2226,0,0,2928cddbbff4a7e700d2f87bfad46fd5066a00c5d2037f456e9b153e686d35e8,2020-01-14T19:54:59.537000 -CVE-2012-2227,0,0,dc39a4b1cf6ad414b4b49159a268168daef4a5ba22b91324a9c2351f8469d5db,2017-08-29T01:31:34.147000 -CVE-2012-2230,0,0,61219637f9320a2113fe5e583f1634d8ec2d5783533d007f27c52bce7cdbf18c,2017-12-20T02:29:01.740000 -CVE-2012-2234,0,0,97a8334cf86512abe496a52dd8523649b32234877d877dd151ba216257ddce6d,2017-12-13T02:29:07.920000 -CVE-2012-2235,0,0,8bcd806c2e6344c259b1d32e5907797c416fe7124eb441a9522e173d7e31b5f7,2012-05-28T04:00:00 -CVE-2012-2236,0,0,7b7e40b5e0890cf7ae6b8f01e6832cce722c41e51798587a2a5d5dd827a86a57,2012-04-20T10:55:00.823000 +CVE-2012-2227,0,1,f187872401b08de33f07c005c254a8166bcf386895d97413575b100886498b76,2024-11-21T01:38:44.247000 +CVE-2012-2230,0,1,a29294221d48fab158c74b0ff67159724147aff0264d6596af8156e03e1c0904,2024-11-21T01:38:44.387000 +CVE-2012-2234,0,1,984c192732ae0a2c6517a722f65891ca10f36312e13716664a9f01e66ff4f35d,2024-11-21T01:38:44.513000 +CVE-2012-2235,0,1,18d29d1d503bfa5efb8c31fa80a19ae5d826f4240ad577585c96f427c577bb85,2024-11-21T01:38:44.647000 +CVE-2012-2236,0,1,b3a5dae9a7c00a11a7ae6c602b91bd4e819c9374869517831d938e97fd5efa8f,2024-11-21T01:38:44.780000 CVE-2012-2237,0,0,d70b04b47128caed1f82956958f7bb52953864004761ea8ca1314ae2af9609c7,2019-12-21T14:02:20.883000 CVE-2012-2238,0,0,a9bcae7221691d2579842dc92e0866661ae244fc3c1464f3aa44c69d0b93dd68,2019-11-22T14:41:35.900000 CVE-2012-2239,0,0,7b938aba5ca5e27ef3f604f11539e9767320c228447f051f3af1c22755d04d06,2024-02-15T03:19:58.853000 @@ -53887,80 +53887,80 @@ CVE-2012-2263,0,0,6e8d0817c2a960e877fa340a4142336d952f9bca099e6434024fdcaf10b3f2 CVE-2012-2264,0,0,c0912a0dcdaeeb302b7b3b420d491209a19a1027a0ac3eab6f3198388060faa8,2023-11-07T02:10:28.500000 CVE-2012-2265,0,0,5d7fccfd22e64985e26cd06f3b49521ec08a18671d0c9f0f5705c0733980ce40,2023-11-07T02:10:28.713000 CVE-2012-2266,0,0,03c2111741d4597f70b5fdf6e4ca8e475be42ac68487a116a4b1ad87a685c800,2023-11-07T02:10:28.927000 -CVE-2012-2267,0,0,9e05223ea8ac20bca906799ae81ce1399376fdfbb7aaba9e63db37fc32a9a269,2017-12-29T02:29:18.863000 -CVE-2012-2268,0,0,f7078d415f3236f9583cdd9943d510ec3f11eb697367ff1c53db6c54c008b246,2017-12-29T02:29:18.923000 -CVE-2012-2269,0,0,1aff91cc7bf9fe273f8b1dd2bd751b5f3219f9f68caa8d8047857a0177e43729,2018-01-04T02:29:02.707000 -CVE-2012-2270,0,0,87c7474ca4f675998b1e80cdf58234b1e96601b915db0d84f4dbba8c4f43c57a,2018-01-04T02:29:02.787000 -CVE-2012-2271,0,0,4b147143b34bc3b36f1ed7b4b1940d7c03fed2fb4b2c15c90db30867e4146a21,2017-12-05T02:29:03.670000 -CVE-2012-2273,0,0,e93fa0dcd6c43b96093011c8c38f35b0c5cc05b551f31f40d002e466976633ef,2018-10-30T16:27:20.233000 -CVE-2012-2274,0,0,785c57fd04d95bacf13ed9a308c4f5a935d9d6e9a10670e6d87288f225249515,2012-09-29T03:17:47.207000 +CVE-2012-2267,0,1,b8afa05a64ec1f14057fb0d86b4d3e9693efbdd3a4ee1eec3230c5127ec5470b,2024-11-21T01:38:46.953000 +CVE-2012-2268,0,1,99f09b5218d95ed00d2b961e8d98382d4ec737ad89643560b75a5f0d300e01d4,2024-11-21T01:38:47.087000 +CVE-2012-2269,0,1,9d361c0d759f9800273cbf1b3f4b1c8ec0f1d3370932ad0990416954f3a7bee6,2024-11-21T01:38:47.233000 +CVE-2012-2270,0,1,d08bec45bee14223521eb60cf57d9f67fcd46e83d5909b4c196b2a8385569cfa,2024-11-21T01:38:47.393000 +CVE-2012-2271,0,1,964f996605cbe88ea5946c2e039aecdbb3b9d24cec18bc74486290a044384fa2,2024-11-21T01:38:47.530000 +CVE-2012-2273,0,1,1593d72321019601f8cdd918ca2f5cfc2517f08df5332623db87d60a69bae8ca,2024-11-21T01:38:47.660000 +CVE-2012-2274,0,1,9610cc1614f02bf0a6d5c8603b33fbceb74fc34ce43cf30a4497a307a7bbcf91,2024-11-21T01:38:47.803000 CVE-2012-2275,0,0,f0f5cc182b25a7df38425820694479774c46a5e6d8d6fb1ad5382ee8e8f998d9,2017-08-29T01:31:34.477000 -CVE-2012-2276,0,0,3807940ee2452c5fd61c651138ee786d1740eba0b6402737cf8d1dc4ed099299,2017-08-29T01:31:34.540000 -CVE-2012-2277,0,0,fb3974957c6aad0a158beb66bebfb58742df3f24e28e791e3ea6000c46d183fb,2017-08-29T01:31:34.600000 -CVE-2012-2278,0,0,eddd5d5252ac1d58ec63bcd13cda84a5d3cd50be2076f3a9a72e33217e684ecc,2020-03-27T14:07:36.733000 -CVE-2012-2279,0,0,0aef8e59655c9992b0177c8b26dad68a893abcd73143e01019efc9ad56a6b700,2020-03-27T14:07:36.733000 -CVE-2012-2280,0,0,0c5c408a9a86d357ec8f89589130d7ae0fd4cc762d1aed5127bd84b8832f7edb,2020-03-27T14:07:36.733000 -CVE-2012-2281,0,0,472f31ad8af3147c91e7b301ba116dbf6a94e855cf280d76643745d263aa1985,2013-03-22T03:10:16.110000 -CVE-2012-2282,0,0,d0dcf70cf23ef18bb4efc7a1d5ade2170c5e013080616e0ebb2570ec4f9bdb92,2013-03-22T03:10:16.180000 -CVE-2012-2283,0,0,b955510eb731e93777e71d0409a5df5688593299eca7f10ee3c2b15e5ae42371,2020-04-21T18:02:05.200000 +CVE-2012-2276,0,1,03129843b17b106c0048a0bf06f9b9281404fb3588615f0d129d317bdf735f03,2024-11-21T01:38:48.077000 +CVE-2012-2277,0,1,a54c7ee28212c5cdcd3e54a7e442b45491323585c65d1c13d5a09f8fc21531b7,2024-11-21T01:38:48.190000 +CVE-2012-2278,0,1,f8af72fa36380908718ed351ae7df7532572a873c955b6d0535381a57f4d5fd9,2024-11-21T01:38:48.300000 +CVE-2012-2279,0,1,e53190dfa86386ff8071832fe76e8ce40441b07b331372e48773979032a30336,2024-11-21T01:38:48.413000 +CVE-2012-2280,0,1,898e2488d1dfe6d06e41e2763947c533ab722b656d0e5ccfd51994847d9f62a7,2024-11-21T01:38:48.507000 +CVE-2012-2281,0,1,6a86b4b7d60015b6340960f413a8dfe2d12a44c02f4845f90c65b50c31e13560,2024-11-21T01:38:48.600000 +CVE-2012-2282,0,1,8826d3df13054f8deab469e1e9e9e81f81475c47244e702f9c6fab4d834dae5e,2024-11-21T01:38:48.697000 +CVE-2012-2283,0,1,b71984bc1b456f9329b1d46c4dca73933b498d5d82c5525c37f0c51b1eaf624b,2024-11-21T01:38:48.800000 CVE-2012-2284,0,0,a36364f6facee132b3bd310a29cc24bb126da6db92ba7c9ce4ad16f9c13b0e14,2013-04-19T03:21:29.907000 -CVE-2012-2285,0,0,40412f18d5c2523ef3fe1285cba5fa8fd6605e0c01cdaddf6975ea1eb4c3ad56,2017-08-29T01:31:34.663000 +CVE-2012-2285,0,1,8ff03c0c78019cace1da88c7a98500dfe45963fdd4a2e8af838510375c95509a,2024-11-21T01:38:49.003000 CVE-2012-2286,0,0,d6644c06edcfa856a598f6120ec3d2c61d67263f83b2366f37b661739f052b5d,2013-02-12T05:08:38.977000 CVE-2012-2287,0,0,854ee335e9cd963373c3e9ba03988260e9f67723a328b837c670d62e761567df,2019-02-26T14:04:00.980000 -CVE-2012-2288,0,0,b621aaa5d1eee222add90e36629f7eb42374436696f5a24e1f9fe25e0046e65a,2013-03-06T04:59:22.143000 -CVE-2012-2289,0,0,26285ff47f07ccba45d4401662a855c308cdeaedff4ba4b0fbf943f78447822f,2013-02-14T04:52:28.523000 +CVE-2012-2288,0,1,a413606249c3b08cb3fc80dff23769f4ce67860bebf2e205de5ec19470479ff9,2024-11-21T01:38:49.297000 +CVE-2012-2289,0,1,1f219c17d43b1053763e25f46c55ccea9725d4a01b71b73bb608ba26c1ff7f88,2024-11-21T01:38:49.397000 CVE-2012-2290,0,0,7ef34bef1650de3f7a5fa20742f8e3a190b9b26677a90afbebb058d98b5d17d1,2013-04-19T03:21:30.320000 CVE-2012-2291,0,0,475d353fa8be3cff4e2be01c0730f5352710ef54bd25a8e286c2d331501c338c,2013-01-22T05:00:00 CVE-2012-2292,0,0,8a4f7b133756ddc376cb8d5417e5c19763e624dd7a51bc5974504a4cf14cc05f,2013-02-06T12:05:42.177000 CVE-2012-2293,0,0,7a77c00a895e6d7ca401b5de03489d23ea1b0a0215f4aee3210758047655bc6c,2013-02-07T05:00:00 CVE-2012-2294,0,0,44a253f62277ea5afa952a52f0a77053471f1a8d9c8fee57eb7a4270a2eebc8e,2013-02-06T18:20:01.507000 CVE-2012-2295,0,0,3b742838cf52e76712775dcdb9e18fc5cfdee9ebf006cf5b42954d8112dfd15e,2023-11-07T02:10:29.400000 -CVE-2012-2296,0,0,57f7f827d9ffa54663acf0d1fe2c5088ce9060458d74c1af0d0d1be89b27c5da,2017-08-29T01:31:34.790000 -CVE-2012-2297,0,0,75a56cae56841c4690678d8ab636bd6a820c9eb469e0a76064b64bcf7a4e32e3,2017-08-29T01:31:34.850000 -CVE-2012-2298,0,0,22d68f94734f16dcb5981a96f3f105ded614272fac830e042e1b65b96f4d285b,2017-08-29T01:31:34.913000 -CVE-2012-2299,0,0,24e24ac26a6d555440ec3e6baff55a16da4fa180c5dee616f2e1d6534d7003cf,2012-08-15T04:00:00 -CVE-2012-2300,0,0,6fae1fe1d068176389f89b10ca185cc842f87571cf85c8c91d5ace9a82aa5d18,2012-08-15T18:47:31.727000 +CVE-2012-2296,0,1,3d9f352985c054394a693f0748d9d15abd7e66f476e279b3a9c4e38194f427d5,2024-11-21T01:38:50.017000 +CVE-2012-2297,0,1,a934f9c11ecb27802a004d69f914aaf48ccba0e2cd82116133e2a90162594af0,2024-11-21T01:38:50.127000 +CVE-2012-2298,0,1,00251f1f77bb255e3926460596a9a5af8f7f2071fe35012499964474da8a6973,2024-11-21T01:38:50.233000 +CVE-2012-2299,0,1,ddd03d7a4a1d913006367b30b4a849ad3107e3b78661a90847cf244b21c22a44,2024-11-21T01:38:50.347000 +CVE-2012-2300,0,1,90acc6208084dcddd84d9f5ebf866a9958c75b5faf8e97f69af12338fc032c1b,2024-11-21T01:38:50.453000 CVE-2012-2301,0,0,ddbc02bec6803f0f043b928fb6287fafb6ff3cc45abbc7ffc8746409f7243011,2014-11-19T19:34:50.807000 -CVE-2012-2302,0,0,ed79be7cf5a46494a6df0655d5e9adb11ef286d6936ab222be813311517921ba,2012-08-08T04:00:00 -CVE-2012-2303,0,0,1435161efb24b58d285985efc5af3036b9202cf3984c153df55cdc790b187dd4,2012-08-09T04:00:00 -CVE-2012-2304,0,0,21416b2e90c5076d63ad934ebc4c90a740411e9cde8a974b7efe908c2152db96,2017-08-29T01:31:35.007000 -CVE-2012-2305,0,0,564108f394cfd0bca27101eb8dc2fc2e67d3cfbb36de523f4efcba590d9bdd16,2012-08-09T04:00:00 -CVE-2012-2306,0,0,08dffca12e2f25089676959734c609526b46b63dccececd2a9f9d354341518fd,2012-09-11T04:00:00 -CVE-2012-2307,0,0,b641376f5fafdab00061016dfb1581d7b7315a08b09535c85f79a3fee7923904,2012-07-30T04:00:00 -CVE-2012-2308,0,0,373003673f98309caccd92824ac1178d2d9724c1dce065f20ac6cba3a59c6bdd,2017-08-29T01:31:35.100000 -CVE-2012-2309,0,0,e8957eec13e8d6fda460cb90baa2ce1bbb851b8e02ef974dd2f70e393791ba35,2012-07-30T04:00:00 -CVE-2012-2310,0,0,8c9dfb5f76c71a8e5350e081d4d4145222d91f0e967f6701c596ef71e4b5d3ac,2012-08-08T04:00:00 -CVE-2012-2311,0,0,1f8dc8b4b39f98f5292d91206f41183b0a6b0c5f42ef63db915e84634bd70439,2023-11-07T02:10:29.747000 +CVE-2012-2302,0,1,b00e3ec9981731295c76990285ae1aabd92b3271fdb480dfe4cc3551e8461334,2024-11-21T01:38:50.677000 +CVE-2012-2303,0,1,d6ec2f4e1e1f6ea81a21b70963645b093358f48e173a114be1998b9da8e6c328,2024-11-21T01:38:50.797000 +CVE-2012-2304,0,1,364469f8a4f4b078a5564c140a4eff7568ca5327c1bb7ea06a0ac2cd5d920b26,2024-11-21T01:38:50.913000 +CVE-2012-2305,0,1,76743d18c2be45a7971f616218b5dce8436989260dfb05c0befdad0415e6377f,2024-11-21T01:38:51.030000 +CVE-2012-2306,0,1,d842f2ab97288c9742ab4cb6f13591f40473170af176941e3c2dc95fea1c2552,2024-11-21T01:38:51.137000 +CVE-2012-2307,0,1,09f5265237da83e85c62b255002a49e387e995976cc6f523d244a2a938efa244,2024-11-21T01:38:51.247000 +CVE-2012-2308,0,1,686d14f72f8a93e61259b720bc944ccdbbc6996f23a35249d1eeb9459baa2493,2024-11-21T01:38:51.350000 +CVE-2012-2309,0,1,0683ed068e3a2a83b9a565e2b9a0727facb84fdf6581c35664ae4886aadc9c86,2024-11-21T01:38:51.457000 +CVE-2012-2310,0,1,579a8c98f9d31fbf06b8b7d3659c6cc59fb8740b1ce728fca9d284d815d0f50a,2024-11-21T01:38:51.580000 +CVE-2012-2311,0,1,4fed35c18d13badeb0527460c6bbe5ad8dee0b5028011c705dc3cb9cd3a1cf27,2024-11-21T01:38:51.737000 CVE-2012-2312,0,0,74537b136f740850802cc88800eeb5bd12798d456d51c06910c24beb05a59aeb,2019-12-23T20:32:06.563000 -CVE-2012-2313,0,0,a01e6584c7d5805caab0894f139a54b2a91b48f0c15a131dd18a6e5115619e7c,2023-02-13T00:24:25.350000 -CVE-2012-2314,0,0,d636d30f4f48829273f9cdb071db0701c8b6a4d83639b508ccfae62e5540385e,2024-01-16T01:15:33.763000 -CVE-2012-2315,0,0,6d3b0e99ab5561c29bef35ec24726107fb37984712c19c37ce03b5c9afaa7b36,2017-08-29T01:31:35.163000 -CVE-2012-2316,0,0,2936fcc16e9e436d28b8642fc87efb7ba42c5ba75f4ae5655bf5947e63877c36,2012-09-10T18:25:55.337000 -CVE-2012-2317,0,0,e2c020890d3b2adcd657e3680b955a8ff0eed05fde0e2065ea884bf1777f6ba0,2012-08-08T04:00:00 -CVE-2012-2318,0,0,2d6651a1fa97189d17606c53fd845288b95129fe55275289e45a1e777d9e9691,2017-12-29T02:29:18.987000 -CVE-2012-2319,0,0,b486130797af8d7be5085fb5476c3f4b173b98b0e2c8c1be8b8c37865d381e1f,2023-02-13T00:24:34.330000 -CVE-2012-2320,0,0,3f15ed4f93a8af76865299261744d7931e272f8e8577c95ba252effbc512e911,2023-11-07T02:10:30.057000 -CVE-2012-2321,0,0,890982e628745ebb71b666c51e9ffb934bc8ff0f150ee0258a14cc9899fe02bd,2023-11-07T02:10:30.213000 -CVE-2012-2322,0,0,a17783df6ae414b21434d0843358443607b9b8b0f6e5518778ebd47e291f3b51,2023-11-07T02:10:30.300000 +CVE-2012-2313,0,1,92b84a8736d7d809ba5b10a765332ce0b5675a75863ed7879a0b2aab97bfb5a4,2024-11-21T01:38:52.070000 +CVE-2012-2314,0,1,acc2cb9baa13b054617a6d9b74420d493589d45af552403d6c8720760b9cfcdf,2024-11-21T01:38:52.223000 +CVE-2012-2315,0,1,69c035609615cc9c9bed81b63cc0337dde7ffa373fdf76644fc09ced60c2d1c1,2024-11-21T01:38:52.367000 +CVE-2012-2316,0,1,2a568a0ae6750b53e3f597d91334006a1eaff0cdbe0fb69845246893a27074e3,2024-11-21T01:38:52.520000 +CVE-2012-2317,0,1,329dd960610eafeb376ed360e3fc679892ebaabf7b69ea9a9a4818d0ae911573,2024-11-21T01:38:52.663000 +CVE-2012-2318,0,1,b162718b39f177e003eeb4050cdcfef5f3094a5990db1b7305d4600237381aaf,2024-11-21T01:38:52.797000 +CVE-2012-2319,0,1,f6ac6ebc55bba9757e7eddbbcd3a51f1ccac7f159380e2ac3d185d52ed542207,2024-11-21T01:38:52.950000 +CVE-2012-2320,0,1,bd427de3a60f4aa29a27bd47f3b041b9bc80e705beb2b961de6016ea72d33330,2024-11-21T01:38:53.097000 +CVE-2012-2321,0,1,e92a6d10cd54266402729715d398280bce0509ca443ec12741e33c2a02aac5c5,2024-11-21T01:38:53.230000 +CVE-2012-2322,0,1,95b6c09282687bb106e51c2e3df0559d508034032498c1b59ca57d9cf3c322f3,2024-11-21T01:38:53.363000 CVE-2012-2323,0,0,7e9c03f1af13ca6872079dfca5c495ef2971f52852004e12f4e075dc1b2ff286,2023-11-07T02:10:30.380000 -CVE-2012-2324,0,0,31b23dd596d80c23f58f8c56d06a26e8f75e16e6ab34d04d21ba7d9de40c5909,2012-08-29T04:00:00 -CVE-2012-2325,0,0,c7b9ba61d43f53ceddf455fcd52f9d493f4e565da0d29d0ab6734e6ce30545b6,2012-08-14T04:00:00 -CVE-2012-2326,0,0,ba364d3c386e02a337366d642203081fc74d80a4f710461c1d05714135dbcad6,2012-08-14T13:48:01.660000 -CVE-2012-2327,0,0,adae6e05eb4291e404121fff8e7bf7cef5b0dead229d857448c110b2133ba79a,2012-08-14T13:49:59.673000 +CVE-2012-2324,0,1,5966cc770ec8acad43d84fe9b78be816aab5759d4f774d220f46962ba67cb1f7,2024-11-21T01:38:53.527000 +CVE-2012-2325,0,1,7da4dcd16c776801ab582ece11b5deb8c20bb6a99e2c9ef2897c4c064a8c13f6,2024-11-21T01:38:53.650000 +CVE-2012-2326,0,1,962b84bd90221c9827a8f2d931d7ca011b152f791928158a0daa344bd4765e7f,2024-11-21T01:38:53.763000 +CVE-2012-2327,0,1,79d830574812e043bfd92711109de20bdd10c93d3e11f850d5f1096a2e6751c0,2024-11-21T01:38:53.883000 CVE-2012-2328,0,0,de48ed320f46c0ba0db120458e3c950019ceb2f0c5dbfb179d9dcec1fac9cc86,2018-10-30T16:27:33.937000 -CVE-2012-2329,0,0,d06b87608a0c1adc7405cb9efb1b8979cdd6e0daca9c7810839e7426d483786c,2017-08-29T01:31:35.460000 -CVE-2012-2330,0,0,8dd8fc2c6ddf7478033d40c3e9cae3e2d90d202b76aaa375cf72d5a4c50eaf5f,2023-02-13T04:33:24.827000 -CVE-2012-2331,0,0,d75b44a1b1eb466a58c9254cf886778512ed3503713ddfbcbed7e68030c9fc26,2012-08-14T04:00:00 -CVE-2012-2332,0,0,a3b26867188b8f6bab036f29e7fdf53fe093d9abc44e8144e18446dcd5878503,2012-08-14T04:00:00 -CVE-2012-2333,0,0,83b17dc7094737cfe9a47f4665730b231fc16ea6c9553cc5113be86d92065bc1,2018-01-05T02:29:32.413000 -CVE-2012-2334,0,0,67a85f48a8a80273b063c0bf6cf1ca63f5426d49e8da879a2dc11be7f8416146,2023-02-13T04:33:25.880000 -CVE-2012-2335,0,0,165bf60687b3adfdaa1f83b0d3e2f3290be5229fdd772f5052df3ee7cf4c90c5,2023-02-13T04:33:26.177000 -CVE-2012-2336,0,0,38566f5431c173ada6fbc6163b551d7e931d14a0a1ddd4029ad5feb79cfc0d04,2023-11-07T02:10:30.727000 -CVE-2012-2337,0,0,a114452d5c12ae95eb429e1a6ea424e3f81a11a1c1587ba9fada00d86f2d92c6,2018-01-05T02:29:32.697000 -CVE-2012-2338,0,0,1cc4f40e05ec53025cbb3397db7b2edcbec51eede0f2b3040ab2bc4d2f847041,2012-05-22T17:25:51.757000 -CVE-2012-2339,0,0,a68f57fba8499aef1ef26988d77f91d41af223d919a27e66ec534e62c54bed02,2017-08-29T01:31:35.743000 -CVE-2012-2340,0,0,cfc9367e03bd924ccdf38218e3949262cd7e50cdf3ad16516fca6e6f47f80c22,2012-06-28T03:43:29.117000 -CVE-2012-2341,0,0,19561295a468da45b76f6dba5ae0cb34ac19204f1700bc4d37d85ae3c514dc1e,2017-12-29T02:29:19.050000 +CVE-2012-2329,0,1,103bed1c560483935ec5beea1cdd4f3602e5672f5ea95a4e188ae6ba955d8c5b,2024-11-21T01:38:54.100000 +CVE-2012-2330,0,1,b224dda9ef1c7ec149bd20a1f942ed69422992cb13199711ee11094402f55c50,2024-11-21T01:38:54.210000 +CVE-2012-2331,0,1,34f2f7fb68ed391f366965ce5cd39317c73be700731662f73c946893d8147437,2024-11-21T01:38:54.320000 +CVE-2012-2332,0,1,c3936a3c4adc6ca7d57187bcaaf2a3d0ee94517243d9082f7152fd561963aac5,2024-11-21T01:38:54.443000 +CVE-2012-2333,0,1,c0069dce38601753f9296fea1f70e15428af716d6bf7375f9b09c05a0fe5b6ec,2024-11-21T01:38:54.553000 +CVE-2012-2334,0,1,68e259c7b73132ee6de113ef2c1fad50437f2c874d81455b03f022c4a6e9e0c5,2024-11-21T01:38:54.697000 +CVE-2012-2335,0,1,eb73bbac1d002d1d801f9e3ca782d15461e812f37f1f8821a9efc5b0ed02307a,2024-11-21T01:38:54.827000 +CVE-2012-2336,0,1,11ac3738630a39fe2fd61de54813c7eb80c84ba4eadfcb56ce0e1ff2bcab7dd5,2024-11-21T01:38:54.937000 +CVE-2012-2337,0,1,b7aa383449a3dfff80f88dbf1f44afabe8ba99d572afc8b314e7c30f6696bc79,2024-11-21T01:38:55.063000 +CVE-2012-2338,0,1,02f805f3acd515c91d8da084ba500f2745c96bbd19e0d2f4367b1186ce050db9,2024-11-21T01:38:55.190000 +CVE-2012-2339,0,1,4016d683093634a9c5f49a1f8ee6663b581333601232b59213baaa94d2e3ebfa,2024-11-21T01:38:55.303000 +CVE-2012-2340,0,1,08210188374b367280de060b0320ccb989afbdcee4ef06f45133ac4767c87e5a,2024-11-21T01:38:55.427000 +CVE-2012-2341,0,1,aaeb116e78859b84e006c7a67cc10ecef5c74ae52eeeccda8285eaa291ae1820,2024-11-21T01:38:55.550000 CVE-2012-2342,0,0,97685a6e38baf4fb1903361a1ebe516a622f6ecde18e4604207ab3b9fdad97ed,2023-11-07T02:10:30.837000 CVE-2012-2343,0,0,c4a3019507c829d5f7fffdee745338d6ccb7621571b6cf4779b7b598dd630f76,2023-11-07T02:10:31.070000 CVE-2012-2344,0,0,588f58e7b2bd97edbe472950ee30513a2f4def6013b3be8a8d0d517692e3e53f,2023-11-07T02:10:31.280000 @@ -53970,134 +53970,134 @@ CVE-2012-2347,0,0,8adf43c74c01d8675dbb10cabd3dd51cb33344cc12be0b2b9f2b6c8d4c0a83 CVE-2012-2348,0,0,f265fbbd884b13465f0c8d20b93000d19693952f8f4211f564d5b0b6adb71970,2023-11-07T02:10:32.153000 CVE-2012-2349,0,0,596cf2a698def2abd5cf54a52329ff958cad7db8605cf721cf2c85986dbd7810,2023-11-07T02:10:32.367000 CVE-2012-2350,0,0,ea1ca707e079d9cf013f29e9806d1585219924ef0942f8ab4547a05a8e453b34,2020-08-18T15:05:57.580000 -CVE-2012-2351,0,0,f6a383e3c4139ce32d18c97b1a1f70d9be6c5d8c221cff5fccce7c1e2ecd87a7,2016-12-07T17:43:10.117000 -CVE-2012-2352,0,0,84a8c8974ad3c477bccfc897ed160a17008bbb638605bbb2c9b99ee07be9b275,2012-08-14T03:37:20.707000 -CVE-2012-2353,0,0,9ce1f4532a8ccadc4c9b99de14343de2f31f4b14086a119d02646f46cfd4a73d,2020-12-01T14:43:58.053000 -CVE-2012-2354,0,0,3e425646ff8908922ae8c8b83d993ad81b789e1e2d98461a441c9f1feac057f6,2023-02-13T04:33:28.293000 -CVE-2012-2355,0,0,4898abb0ecb166ad2de4c51e283e754762a9592ed0621cd57ab540e7e3795db9,2020-12-01T14:43:58.053000 -CVE-2012-2356,0,0,1d78a512420d9b81183f33f75057c51940bfbef6c399c095d701ee9dc40e79fe,2020-12-01T14:43:58.053000 -CVE-2012-2357,0,0,0c211d82fe7af7ae717edd41c765106fcacbcc3c7a139ab42b34dd5512c0d7d3,2023-02-13T04:33:29.087000 -CVE-2012-2358,0,0,a31b87b49106b676ccadf80a38899552d020e9ca37bdea8c035b97f852f0a51a,2020-12-01T14:43:58.053000 -CVE-2012-2359,0,0,06bfd28b110c1bf93027dcea4951530e5ebec78f87bf65268084d76623f867c8,2023-02-13T00:24:34.883000 -CVE-2012-2360,0,0,97dddd9d1c0dfb50c0031894001598e6174e90a138e525d1695810a9716bc0b8,2020-12-01T14:43:58.053000 -CVE-2012-2361,0,0,3f55e8830b1c93abbdf4832b1f97ab4bddaa23a58b94df3381a45de72d5450d1,2020-12-01T14:43:58.053000 -CVE-2012-2362,0,0,1dfc4980d2f4d6e7ab84cb4e12ce59d6e3fb8fe0e699b4aab854fd33f21c2ed7,2023-02-13T00:24:46.683000 -CVE-2012-2363,0,0,4f9d46cc2e1a3a319ed097990f9eda3392b5da4a35e37ae7814659b370b13d82,2020-12-01T14:43:53.067000 -CVE-2012-2364,0,0,19b8e4d1726b86fbd48f2ca4ad5c6730a33d2e02adc24e647aa23a5db6fb60c0,2023-02-13T04:33:29.637000 -CVE-2012-2365,0,0,7ff6fd54d441a9cb12ec6afbb0b2886e9eb291fb3385dcd06c0080a627bb385e,2020-12-01T14:43:58.053000 -CVE-2012-2366,0,0,b7ec6c5d7c222dc79e783f7c972289a26d2308e6bf8741512cef35d0299b9421,2020-12-01T14:43:58.053000 -CVE-2012-2367,0,0,a484cfe45613f3656787b7e315202c0108da9fb429eeeb99a73372b7153914bf,2020-12-01T14:43:58.053000 -CVE-2012-2368,0,0,99672348786d5ae78e645e85f1d1f0bd95b7317e48ad89816f10f77aad516f03,2012-08-14T04:00:00 -CVE-2012-2369,0,0,2cab4919aaf66904f74e59061ccb3840737ff3bd27b8764e3a82f917717be2fe,2018-01-06T02:29:38.550000 -CVE-2012-2370,0,0,9fb358deefa75e26a5552433a1bacc6954cd7fa9b359ee276f5aa252e06501c6,2023-02-13T04:33:30.547000 -CVE-2012-2371,0,0,ec64582decc93ffc5c68e05edac1a29be1e7ec6a3f1d5af10a9ee9117997500c,2012-08-14T04:00:00 +CVE-2012-2351,0,1,8da2d5b621e5d9e8c4fb1c1fe315b4a3910ac053884a9b4257de0b3992da0f10,2024-11-21T01:38:55.923000 +CVE-2012-2352,0,1,614cea85545233eb99fa01695096e70009eb75119894d1353c075efb2cf0a102,2024-11-21T01:38:56.070000 +CVE-2012-2353,0,1,12da02d326da9277c80c6cb7c06e6e3e506d71d542704a1e4d784d9308c4c752,2024-11-21T01:38:56.200000 +CVE-2012-2354,0,1,b35e9e4d1c59f34bdd1ba934859099ab9388490f10a3f8f9aab88d7d8afc66fa,2024-11-21T01:38:56.303000 +CVE-2012-2355,0,1,a3988685b831e3a66e0d38ec10936bd3f0c980a09b4686953defb20b61065890,2024-11-21T01:38:56.407000 +CVE-2012-2356,0,1,85f2ed32aa638980e3ba26dd98b6e1f47950634b551b77399e26eca0ee465e8b,2024-11-21T01:38:56.510000 +CVE-2012-2357,0,1,781acfb82bc62f96628255ecd91dc6651f058b9517cb105741834d67ccfb1d5a,2024-11-21T01:38:56.607000 +CVE-2012-2358,0,1,0fb0c0202a1b7e97748e2a676b4e34a0bec71ee3fe2d32216c41d66d49cc43f6,2024-11-21T01:38:56.710000 +CVE-2012-2359,0,1,d6ccf6861c6160e87324c1e7412295698aa038035ac831d734662760a933637c,2024-11-21T01:38:56.807000 +CVE-2012-2360,0,1,caf0adff6172f6d4860ac3ccf8da9be3b8cd00b3bf273ee60c7ec7237a6e9123,2024-11-21T01:38:56.917000 +CVE-2012-2361,0,1,136673a9265ca85fd4ca071d6247c053554b2b896330d3c49c627ed01cc3d613,2024-11-21T01:38:57.020000 +CVE-2012-2362,0,1,307a2755a249ba343bd980ac825595012bbe91d1b944ad9f4c8df56e1a3debc5,2024-11-21T01:38:57.123000 +CVE-2012-2363,0,1,aaef43cd7d13297d7590ed725318faefcd78a61a21938d8bc5b6d00b6fdd88dc,2024-11-21T01:38:57.230000 +CVE-2012-2364,0,1,186ace6642a0ad47abb2ffbebbd9c18d1d2785f337cae4e195364508c0747b78,2024-11-21T01:38:57.340000 +CVE-2012-2365,0,1,6c78aa26b8240d8719995b50494691ceb745ed90951ca02f6eb40906e0f66707,2024-11-21T01:38:57.450000 +CVE-2012-2366,0,1,49155a3d1bb84c3f9c5447fd25f0ad5bd164b97bbf706f569026d593e1629fd9,2024-11-21T01:38:57.570000 +CVE-2012-2367,0,1,348352eb052a68bcfa49bb4ba16c15325512c16d75b2977b6b7560da160db6e5,2024-11-21T01:38:57.663000 +CVE-2012-2368,0,1,d3c94fa95beb8734cfd0f2e2d1a2b6ca29234f3d6fc5e58c23553136dd7aa969,2024-11-21T01:38:57.773000 +CVE-2012-2369,0,1,9335e479792192da857377b237ed80db1958490e80a74b08d8d1bb960c7e133d,2024-11-21T01:38:57.943000 +CVE-2012-2370,0,1,2e5467a70ac8737155422a5e2508ac16d8943a534cb8da713b70904beb3c6e35,2024-11-21T01:38:58.047000 +CVE-2012-2371,0,1,47b3cebb0ae0c9afda18e34c901bd9f519d594b023462042d0126cd9fb153f4c,2024-11-21T01:38:58.163000 CVE-2012-2372,0,0,4c18c678b851fd53b3df7e2f78a4f84f6d3b1e80be9cc3b73694d7858bc55bdb,2023-02-13T00:24:48.320000 -CVE-2012-2373,0,0,f6e31c15ee41a9769a9b3d77b4840b22191846214e2c7403381c72fe2fea920f,2023-02-13T00:24:52.950000 -CVE-2012-2374,0,0,a37065b91af2a678c410f6e84287fcbd4c69a44fc61ffc1d517657ae680af785,2012-09-05T03:23:03.897000 -CVE-2012-2375,0,0,c786e557dea97ad8f993255e4b49f892184547254472434886d75f8de6211690,2023-11-07T02:10:32.753000 -CVE-2012-2376,0,0,e56bc75744d244c6e9d15927db1a2994719250232724eed78235ac6fc1f8dcc2,2017-08-29T01:31:35.960000 +CVE-2012-2373,0,1,778e0c0cb61f136580036b4d49977ffb2ec9afcfda1a0ceced62b165446dc780,2024-11-21T01:38:58.390000 +CVE-2012-2374,0,1,e4a0c6e5e7e8d70c54bb173f4617dd0daac47fbe731d6f3451838c84ea4a76ee,2024-11-21T01:38:58.503000 +CVE-2012-2375,0,1,5e4c194526c72fd86cfad4da4c73339b97c2766f00e6de5a7397d1ff776fbba2,2024-11-21T01:38:58.613000 +CVE-2012-2376,0,1,4a64ca97bd1146105eca03172eb8795b61bc5ae71262e9b85398018311a51c3c,2024-11-21T01:38:58.720000 CVE-2012-2377,0,0,05ac39413df237f550fb27435ffc227f422c51fa4ea00f2128b1ee2b8a36d0a1,2017-08-29T01:31:36.057000 CVE-2012-2378,0,0,1a86f794677dd9a75b6fbd5cead4397ea85f95df18cbe6dda272fd8109bb2ff1,2023-02-13T04:33:31.807000 CVE-2012-2379,0,0,3626534d2c1ee512546e99517e15ab0028e60b3045ed7f40981b924ded8269bd,2023-02-13T00:24:58.890000 -CVE-2012-2380,0,0,6f3bb81e0592c666117c86e1bd969bc8c179025f715bfc36d390bcb5f7fc4231,2013-10-04T15:11:09.913000 -CVE-2012-2381,0,0,4112f1289c7a8e5bde41a06d16eaca71158aaa432bf5a978471a5cdd3832ff5e,2013-10-03T19:45:44.263000 +CVE-2012-2380,0,1,63dce48e9183ae0a8de6b351fa0d8d1de29e402d3c08aa4998bc5f3d0f07a887,2024-11-21T01:38:59.240000 +CVE-2012-2381,0,1,176e457e107735ebc4b1e8df29d2470bd1c56d8bec7d117ea1ca01856c1b1f4a,2024-11-21T01:38:59.343000 CVE-2012-2382,0,0,fa7ce5961dbf4f22c31c1921c91a489419bf342cb82e1bc4706de65f25a213f0,2023-11-07T02:10:32.863000 -CVE-2012-2383,0,0,75c89b02fa7a127662523a388319262f2112109601b8e207b58516d3eb77a8c5,2023-02-13T00:25:05.843000 -CVE-2012-2384,0,0,7685a5554cd3d6299c734c5c0242754baea44d500fad4583bfefabeaf830990a,2023-02-13T04:33:32.817000 -CVE-2012-2385,0,0,02c41df734dd039b190ec36b6e02879e2e96111bcacf89d54f299713c0c66a63,2017-08-29T01:31:36.117000 -CVE-2012-2386,0,0,cbc47a6589ccae70c0676b623fef8fed25937b5ebe14a22c5fbde462ea54c692,2023-02-13T04:33:33.950000 -CVE-2012-2387,0,0,4d3646465a0a4f384a2a45ac4aa220a4d58326260890437f18effac06b3ab912,2012-08-21T04:00:00 -CVE-2012-2388,0,0,008c88a9a28a19640927f91c1de8e939b67552c221050807a772fa56f840044a,2017-08-29T01:31:36.210000 -CVE-2012-2389,0,0,7a10c00b24258983192310305e498915d7762a0c0f1549c9dc2c3754ac3c0238,2013-04-19T03:21:41.637000 -CVE-2012-2390,0,0,38b054898b1315bd0e894217ccd1c784c1ba72d9621d4349789176dedea34b2c,2023-02-13T04:33:34.320000 +CVE-2012-2383,0,1,985c01654c7aa2a60a6a32ca9ccfa69422fd500d2bfef9ae733fdd7515a050dd,2024-11-21T01:38:59.460000 +CVE-2012-2384,0,1,27dd4a84238de6965c76604e9a98faa854969fafc3ae5b500333fb0cf769a7f8,2024-11-21T01:38:59.577000 +CVE-2012-2385,0,1,bea14e1f7d0679a61d35e2b2dfb91f8922ee44502d50a5824d5b8ed628279518,2024-11-21T01:38:59.690000 +CVE-2012-2386,0,1,90f15676596235a3c8437fd54bfc97164373da33a53d3cf8a4a411cb943323d3,2024-11-21T01:38:59.803000 +CVE-2012-2387,0,1,58e2da7e8fc188431e83ebc5a18fb28cb77bfe017646014d933276aae95c1043,2024-11-21T01:38:59.923000 +CVE-2012-2388,0,1,9308449fd13296062c5aa33843dd46a01617424dad6611379217340738ad3670,2024-11-21T01:39:00.030000 +CVE-2012-2389,0,1,50822dcc284e5ad02ad55a6f5c4800d4ee0216831148f8afbaecfc66920c1577,2024-11-21T01:39:00.153000 +CVE-2012-2390,0,1,6dbc7003e94f7a8188136ddf9a5fe42b797067208918d7c5efb5fd17a58ccc4d,2024-11-21T01:39:00.267000 CVE-2012-2391,0,0,d81640745711c260deae5700def5f4a5dc64b82b85a6c2d4b609c6c1e8e5e74e,2023-11-07T02:10:33.197000 -CVE-2012-2392,0,0,283dabf8642427486750622ebbf83b94a20750f9ef916a31a76e15955d90cc24,2017-09-19T01:34:56.637000 -CVE-2012-2393,0,0,09dea980725a52edd6da7920646dc29634cd94c2de109912b245784ccaedcdb7,2017-09-19T01:34:56.697000 -CVE-2012-2394,0,0,896a0f1b9c873bed274ec3bb51917b6afb75d6690a405a3362878f608117ef13,2012-11-06T05:11:46.187000 -CVE-2012-2395,0,0,546aff258fa60d99aab3b3776092824d93e47f30d246baacd06e3d93b3e4964d,2023-02-13T04:33:34.770000 -CVE-2012-2396,0,0,5760101650647460fcde3d127723cd9ca3a021553f9f17df6bdd58c5dfc42539,2017-12-13T02:29:07.983000 -CVE-2012-2397,0,0,4f31238b9acdf45df68c21b8263ac3153b685fd744ca7c19ff222f6328564ad3,2017-12-13T02:29:08.060000 -CVE-2012-2398,0,0,25e65a587fc322e680530f4db3d2fbbc66ac34160f37c768689638d0d193b419,2013-10-07T16:29:52.323000 -CVE-2012-2399,0,0,d5377a39489e9de31d35c03356534a4d8740a7478104db26385d9a2f08c6b103,2017-12-19T02:29:39.817000 -CVE-2012-2400,0,0,b2afed90538120c4ece4fd80e997df5717ea433ca471647e88673d04b43d5f54,2017-12-19T02:29:39.910000 -CVE-2012-2401,0,0,115c37ac7d1ad7bd07fb2e143c5226321950b39ec14c1acf98b5760ad8bafd5c,2017-12-19T02:29:39.987000 -CVE-2012-2402,0,0,ddb15803bbae0429911509658790273aa15e561f72b648fb531d13833e649909,2017-12-19T02:29:40.083000 -CVE-2012-2403,0,0,9d830eafe0409263275805c533f4f7a768e22cf8ed4486cdc5cec57ad0fab992,2017-12-19T02:29:40.177000 -CVE-2012-2404,0,0,8efa7a8ebc8db4ec048e652f2726c1512eeb9fcd592ad42b9729bfa74de5646f,2017-12-19T02:29:40.287000 -CVE-2012-2405,0,0,12f656ad2415f1a1cda3444d86b2df1d44b6fdf4aec8e79aa831c1ef53db086f,2017-12-14T02:29:03.153000 -CVE-2012-2406,0,0,91437ebfbd7516b6babbb005cebfc6f5e14b88199a92ef4732516da4d210c4ca,2017-08-29T01:31:36.273000 -CVE-2012-2407,0,0,c6a188ba96872427725f46f94b24d228b174fbf565523d60715edaf04eeddf88,2017-08-29T01:31:36.397000 -CVE-2012-2408,0,0,f92ad7a40bab8962bd2fafc3e471fd37ba6f3a6b0f4e5d2c581328da7de8e2de,2017-08-29T01:31:36.523000 -CVE-2012-2409,0,0,33829be57de363326a80877beef1a24c5a2a5d060e4f5e450b39a610b1b20ae9,2017-08-29T01:31:36.587000 +CVE-2012-2392,0,1,bd01dfae73ceb2576e5a32fd3edef8700e34946d7bc99c40a4a773dc3c029769,2024-11-21T01:39:00.400000 +CVE-2012-2393,0,1,13fb6466cba2455c36c00b4e43813bab02564c937465b9d56d45bd9b90b8b409,2024-11-21T01:39:00.517000 +CVE-2012-2394,0,1,808cf2e92e1e38eddd76d5e960da648ffcb0d24fe3d9927ecbaa3f134b16f162,2024-11-21T01:39:00.643000 +CVE-2012-2395,0,1,0808b7dbb79911990b0b4157b57fe5468d3367fb7f51d14bb651335429cdd262,2024-11-21T01:39:00.770000 +CVE-2012-2396,0,1,cec59e25a5b6ffb44e167a4d27e27bd76e88bbcfc4e43d0f7dba301ae0c579aa,2024-11-21T01:39:00.893000 +CVE-2012-2397,0,1,e7ad1434074cc2b79da4a01ed4cdbe80fe8fd7551e0748fde5117422c7e9ec43,2024-11-21T01:39:01.033000 +CVE-2012-2398,0,1,b6f47719eb6a24c845a628abc4d2c48eeb516fe296ebcefd1c8769427fb5f926,2024-11-21T01:39:01.200000 +CVE-2012-2399,0,1,7a5cddc665ea736007463ce02673cfd2d11d765a2df9a297df6a091bf8b2291c,2024-11-21T01:39:01.377000 +CVE-2012-2400,0,1,96075f461fbfa8059bc11dea6d6542294c6bf48b64635d88f08c93c97eb3b747,2024-11-21T01:39:01.557000 +CVE-2012-2401,0,1,c59eb68c3cb5b4622be72caaffe3a4896b593c10de2dc910d1d6d821ac054935,2024-11-21T01:39:01.727000 +CVE-2012-2402,0,1,daab77d95e10295af4e2922247074b3d01f0727c9719e6f443dc8a669d462b37,2024-11-21T01:39:01.887000 +CVE-2012-2403,0,1,ce2920b0cde473b2cef4e5f4ed8a9bda5c1145103940e11f483d437abb9bffb2,2024-11-21T01:39:02.037000 +CVE-2012-2404,0,1,4ddba7d4781c5a11ae9affd196eafefddc4261c668e98928b00ce18013a0c18a,2024-11-21T01:39:02.200000 +CVE-2012-2405,0,1,2e547c808d1e401c1a6d5480ae46afd02cb4f83068df01f59084ddfe8cecc8af,2024-11-21T01:39:02.370000 +CVE-2012-2406,0,1,16157ed8062d6e52db099a6b002cdb3d248c7601df7c773505104f38c55d27df,2024-11-21T01:39:02.507000 +CVE-2012-2407,0,1,87e0047ed34b2b02534ea861a3e1738a2243f3b0904c83adc190be8d5fcfc986,2024-11-21T01:39:02.653000 +CVE-2012-2408,0,1,79c67553146277f7057803c0138a4ddb6007cd50ea8f72eda3db47cf7b6f1923,2024-11-21T01:39:02.793000 +CVE-2012-2409,0,1,cfa34e480aa8623a881f4b17bf5100e07cbeec74cce8c49068278754f06b16cf,2024-11-21T01:39:02.940000 CVE-2012-2410,0,0,845f7fa44b7431c9b1cece6069ab5c0d79744b1d3957171e566561297b148dc5,2017-08-29T01:31:36.647000 -CVE-2012-2411,0,0,e840b5a32f280d510f98d405004eee3d314e929624e1558fb64beb914e9f47f5,2017-08-29T01:31:36.710000 +CVE-2012-2411,0,1,b181ebddae4916c9921e028e03b1e62778888f02234cdb20b6a9793d87d0834c,2024-11-21T01:39:03.250000 CVE-2012-2412,0,0,ef452ecb54b67f3d2ba0f1d2da61ff8f345b9005e47f0faaf61fc980d25775a7,2023-11-07T02:10:33.713000 CVE-2012-2413,0,0,267000c271e864e22fd266226231ab85e96be00f0268185354de59ebfd7f7b54,2017-08-29T01:31:36.790000 -CVE-2012-2414,0,0,5496fe1227a1a5f6b0c1ef2ddbd6cd30d2c982f7c70ff4618ee70e622bc63452,2017-12-14T02:29:03.230000 -CVE-2012-2415,0,0,371380b2782773e1e3b92eff0178e2c14519bc222a0a1ad04ecdc5186ef0af27,2017-12-14T02:29:03.340000 -CVE-2012-2416,0,0,aa2967a6c22aaeda1b1b7cc1734a92e3fb242afcf266551af3f8ceaf11e283c8,2017-12-14T02:29:03.450000 -CVE-2012-2417,0,0,64a887acf50063cbd2b672f7c30a97e958f8edd526ef727ca4c434e0a9a44cfc,2017-08-29T01:31:36.867000 -CVE-2012-2418,0,0,fc699cd6c0937f605c5d88a02a8705a73b581a616dae150e5f200a1cb65bd1b3,2021-07-23T15:12:10.537000 -CVE-2012-2419,0,0,67b2ecc72f2e94d08fdfb42d7e41bd54c95773c9c62233772623ab5bf0dfb96c,2021-07-23T15:12:10.537000 -CVE-2012-2420,0,0,a1949b9078544385e40e425d3fd4b3c9bb946a3469828227c73aa6976f11eee6,2021-07-23T15:12:10.537000 -CVE-2012-2421,0,0,0c9a82b74fd184daedbed0c803b3c4c3eca02cc628feb04ffd2cba72287e9dfb,2021-07-23T15:12:10.537000 -CVE-2012-2422,0,0,e0cf8f3e377bc4d92e20a8dc7b0f943013eb2c39f96f57609d3ca2ecc7ad2ffb,2017-12-19T02:29:40.597000 -CVE-2012-2423,0,0,c0371a6d4a03acab1712c86c360ce44bd7caebef4e610894ae9cdd2189eb96c3,2021-07-23T15:12:10.537000 -CVE-2012-2424,0,0,3f6cf86b5b6884a7e5803729f95449e951e69b6062bf53852c169762018d37ca,2021-07-23T15:12:10.537000 -CVE-2012-2425,0,0,0422e1a66d9187a919edcafb287ec8d7c1ee03347022858eed671b087f599565,2021-07-23T15:12:10.537000 -CVE-2012-2426,0,0,91ae604c38a15feee17dfb7af5a1480c89fcd70c339a503064a76f609290c0db,2012-05-28T04:00:00 -CVE-2012-2427,0,0,e4eca28a9e74dbbc4e3bd16ba8f88a776ebcc7dfafc390c1cba3d14af9a0ec8b,2012-05-28T04:00:00 -CVE-2012-2428,0,0,3d3fb7a88c0975824d843335f83c609ea59ff1cc06991a34d6ab9bf2496c85d7,2012-05-28T04:00:00 -CVE-2012-2429,0,0,e2423e6b8d9503901af32f38bdec80574b3f6aedce9ebbe428584bc3bd44528e,2012-05-28T04:00:00 -CVE-2012-2435,0,0,c02921895653a04a21ecd5b2791edbb3de785ea2fe5e4793f129e0094797a7ac,2012-05-29T04:00:00 -CVE-2012-2436,0,0,75f198f3275c6af7d04b2cdd0c913df8249965d6babc31e1bb9aad338ebc60f6,2017-08-29T01:31:37.007000 +CVE-2012-2414,0,1,c4669f90b82dd7d812278a302bf9e49e8244deea9872a00b5b6d2f45477a0f06,2024-11-21T01:39:03.553000 +CVE-2012-2415,0,1,5f52bddf777dced343569862a9eab7ad99e5e76576adcf852b3da21a6d651b1e,2024-11-21T01:39:03.717000 +CVE-2012-2416,0,1,c3c01f406e4661b6a2135b3f0d85d5a23e03d0c1605680a03638d45858b75dd4,2024-11-21T01:39:03.893000 +CVE-2012-2417,0,1,b143f5b4518dfea811b85660c374505de2f034ed122bb8d3a385c20c9778c94b,2024-11-21T01:39:04.053000 +CVE-2012-2418,0,1,ce718013943c596a334786180dd98c43222ad88611cdd052fe80df6146612e42,2024-11-21T01:39:04.213000 +CVE-2012-2419,0,1,95504c54f33aae2d2f79087a4fd905fec0d5c7643e6d680c59c073c72423f5a8,2024-11-21T01:39:04.360000 +CVE-2012-2420,0,1,aab320f538d235f0a440132a789986335026dfc089481c6f64d6961d0bcb35dd,2024-11-21T01:39:04.500000 +CVE-2012-2421,0,1,679279068ff5c878ed5baf46690e77092ad2fbb8e89164fbb5be19a82176856e,2024-11-21T01:39:04.643000 +CVE-2012-2422,0,1,450a3e692ec0801ece7605c6a0a3eb87e00404064eca4ef6bbbfe7f6757c33e3,2024-11-21T01:39:04.787000 +CVE-2012-2423,0,1,619af141360d5ecc3855e5500d3796a4373e76cca5a12859fbf66c092a8a82f9,2024-11-21T01:39:04.930000 +CVE-2012-2424,0,1,da67122c7537149095c742302eb2597b175d6176a4b836add6f4dd60522d773f,2024-11-21T01:39:05.063000 +CVE-2012-2425,0,1,4d137b2483ace07ccf3f6fecd8a320c1480721fafaee7f5011818aa93d21da36,2024-11-21T01:39:05.210000 +CVE-2012-2426,0,1,e14d50cdfde7aca41519633ec1c2cc9935b0eb24c9a9e624208c2ae8d481564f,2024-11-21T01:39:05.360000 +CVE-2012-2427,0,1,1d8c10dbd4c266d4c346d10ba99ecc1128fadaa6572c37b8d24fe269d5d422d9,2024-11-21T01:39:05.480000 +CVE-2012-2428,0,1,ba3186ca222d1523db746e8b2c8b29a865f4dbeb709d6b8def6d08c1f84854b4,2024-11-21T01:39:05.593000 +CVE-2012-2429,0,1,f1b463ea7cc8e15223ac8713fe442770c2a7b2a3ec75eeb8de14824721448f1f,2024-11-21T01:39:05.703000 +CVE-2012-2435,0,1,295c04a282e335e6da13beadba28c3b55ce3ef24e6b74b85a0be7c72847897c1,2024-11-21T01:39:05.807000 +CVE-2012-2436,0,1,f04e32ff988e8958e659355c44a36ae3bd6764599c2246a212da16a3a8b67b74,2024-11-21T01:39:05.953000 CVE-2012-2437,0,0,686799fe088ea1d49462683298a4db5d8ee8a8dea5aee6f79dac8704a3855fe4,2017-08-29T01:31:37.057000 CVE-2012-2438,0,0,81a5c67eb52bab682fcfb71032b61b2fa4316417221709b0eb571344fdcfa2c5,2017-08-29T01:31:37.103000 -CVE-2012-2439,0,0,a9a82a164f9ec22d5b6675c0025341041e61c2e0b5f8fda3739de3468f0cc1ae,2012-09-21T04:00:00 -CVE-2012-2440,0,0,e8fa9e7d35302b726076825dcc497c866e5be26e9f10f95e6986d862df576115,2017-08-29T01:31:37.163000 -CVE-2012-2441,0,0,ec6fea78c26d8f0508af615543b29a11b4918fc5246cc0717b106755ef80b45a,2022-02-01T16:53:34.140000 -CVE-2012-2442,0,0,470c983a25daf915a1267db52e484b7b36955350583a8d7c8b3e34373795f794,2017-08-29T01:31:37.210000 -CVE-2012-2446,0,0,601bac80ed503961f82677ae1bc32502b25a2e3b930ed434bdc82449b7ba9c24,2012-07-10T14:05:50.947000 -CVE-2012-2447,0,0,c91eb5522b2bf0128367a2b91b8610d810e73a2ba916dd9d8e54561339b063eb,2012-07-10T14:10:35.637000 -CVE-2012-2448,0,0,b1c9f6eccd74cdf7532074b2a56f06b0ab1f96b35e09db926b6fd1241419b494,2017-12-14T02:29:03.590000 -CVE-2012-2449,0,0,f124f21cd96af0d84ea4dd78c9d21dababa9526c121f77f566588a42bf0a2a15,2017-12-14T02:29:03.653000 -CVE-2012-2450,0,0,e27ee03d25edffc626b749b6ec81ec3e2138a29aed9eec20d5dad4d78a26ae6d,2017-12-14T02:29:03.747000 -CVE-2012-2451,0,0,f10133e423a3a98feff2f0c70e644560e941aa4c0eba6ba1dc6e92edf000fc46,2017-08-29T01:31:37.273000 +CVE-2012-2439,0,1,b685f591d92f2be6eea2206776cd308b6f80add69a5f19fd67723ecda1e17f64,2024-11-21T01:39:06.417000 +CVE-2012-2440,0,1,e9e50a0bf17f88d54a10ce52722780ea77b8ce33f247ab24a953abc69eb102c0,2024-11-21T01:39:06.583000 +CVE-2012-2441,0,1,c837963c7e0487f306b4b44b3e243698f078f7cdc434c493249cb2f3ab43ae42,2024-11-21T01:39:06.727000 +CVE-2012-2442,0,1,66c521209ca15736c8dad8047cdfc4b7b318334087069df4ea19886a7776ee0a,2024-11-21T01:39:06.867000 +CVE-2012-2446,0,1,dd07e454beb1b1892e9cf467a6006d69edb1906bc6298a266a89ce8460aac227,2024-11-21T01:39:07.010000 +CVE-2012-2447,0,1,dd8bff6347940f8ad99fc3ab9ad999f3a9bcd0cfd9ec172e00bf0a478fc40b8a,2024-11-21T01:39:07.150000 +CVE-2012-2448,0,1,7a8155c0968476ff1ef76d6d95e7a75627531da8a3a9672dfdc5aad69a7b945d,2024-11-21T01:39:07.280000 +CVE-2012-2449,0,1,f37a9b460de86744b066db2dd08efdb28423b85a534bf9978241747961010153,2024-11-21T01:39:07.420000 +CVE-2012-2450,0,1,573b2fefeafcfa03e473839c8c317f6846b8b0f3499d1f96d1d4b382c1c83d35,2024-11-21T01:39:07.567000 +CVE-2012-2451,0,1,0c1a6f9acd6bb62feb105eb9476b8e41d136b4fc7623fdb18cc61944a9ebc25a,2024-11-21T01:39:07.727000 CVE-2012-2452,0,0,5d4fdf1069a5ac2a39760950a964f4f90b93a057ac94ba11750cf4913472a6f9,2020-02-12T15:46:39.940000 CVE-2012-2455,0,0,5322abb71d3211d4b1f059ba4620f95f5b201ccc1a676d6cf3553866b8c8923a,2012-11-12T05:00:00 CVE-2012-2456,0,0,35df1923d402f8e23fb2b0ec058448ba1a5a962adaf78c6c1b4b2f0bfa3539d8,2023-11-07T02:10:34 -CVE-2012-2459,0,0,be7dfd936d0c37eacd40e600cf927d50577873827a0d17c36afbb09a458b575c,2020-03-18T17:37:42.477000 -CVE-2012-2469,0,0,bb46813110e03abb00d36d9f6d3b2bdca0463ba8ef8b7e2759e0ced7b63cf8b1,2013-03-23T03:10:38.957000 -CVE-2012-2472,0,0,42a4b9afb226dd58348005aa516061b7b11c14416d9e2fd07adfd3ced7b4532b,2023-08-15T14:28:06.997000 -CVE-2012-2474,0,0,22503a8e9566e4eaea6ca3caaca1f33b772641722e8f3453f41bed2b27b01e04,2023-08-15T14:28:06.997000 -CVE-2012-2486,0,0,31f91621fda492a65c358c6e26287d305ef0c03100b3eb319959ca40f910dc16,2018-10-30T16:26:48.763000 -CVE-2012-2488,0,0,b58e056c1516bf98273324bd5fd89c8444842f52f8739ce06ede97650d14b861,2012-08-25T03:27:12.130000 -CVE-2012-2490,0,0,6efbcbc8412d145c3593641c48cfc2769f037a69dae97d731be45367850e994b,2012-08-07T19:47:38.593000 -CVE-2012-2493,0,0,05b214d0e4a98de6cedd7ceb04c076d344ba9bb7a66f3e2cb88152dc3dc51d79,2012-06-21T04:00:00 -CVE-2012-2494,0,0,6069bd15580bf5d3ffee110eb577aae3da3bd278da344c94d147e855a15adf96,2012-06-21T04:00:00 -CVE-2012-2495,0,0,fef1367503e4b9bf859ee1c77649010d875d6bb517ff421b19c34ee80f1b0f17,2012-06-21T04:00:00 -CVE-2012-2496,0,0,24dd73c1458ed79a9c73270c29e3c217a9278c2fe85d5278908ae9c55b783bb9,2012-08-24T04:00:00 +CVE-2012-2459,0,1,0d27dc269c4a5eed4254f923dc968f0ece9a50cbf957a296b56241b08ab4809a,2024-11-21T01:39:08.147000 +CVE-2012-2469,0,1,aa3370c83590e43f200e69ec5805bfb52b59aa19cbe880c6ede473de3a9e892b,2024-11-21T01:39:08.293000 +CVE-2012-2472,0,1,97c9a3ab79fd9813cffb8619d4d9a768f45641502949d8ec548e883e6718bd60,2024-11-21T01:39:08.403000 +CVE-2012-2474,0,1,6d0a628f87740691aed9682e276e2c0cf4f37771b83d3db3859854fb6c2871b8,2024-11-21T01:39:08.510000 +CVE-2012-2486,0,1,ea509da34d69bcef5618f5b6c1e92ca938e6dd039d20c10e631ad057a8c473e3,2024-11-21T01:39:08.610000 +CVE-2012-2488,0,1,230e5b028f968d0c69cfff3a8bc0bd585937a469cb26be3f6175522ea0bd11ed,2024-11-21T01:39:08.737000 +CVE-2012-2490,0,1,147866f10747a4c1219dfbaa007aae81f25491ed7ab802fa3e1a2bc1e500010b,2024-11-21T01:39:08.847000 +CVE-2012-2493,0,1,012c610f08874b92e016c964119cfdd9b7024bc148d72c429522a41d4be9cc38,2024-11-21T01:39:08.943000 +CVE-2012-2494,0,1,cdc1df9edb7b37d779778510be73e1de1f7cbd3f3f526b8fd393ede4db6d7ee2,2024-11-21T01:39:09.047000 +CVE-2012-2495,0,1,b31dbe1e4194152e1d30b69c39439011bc7295f41c3de4314883785b15a5f80e,2024-11-21T01:39:09.153000 +CVE-2012-2496,0,1,38d861966b7a7ad1262f861fb65a810ee9c9e59808f6c5b6368876c6f13e7f34,2024-11-21T01:39:09.257000 CVE-2012-2497,0,0,785c6056e214678323e6b202096af00acce4ebe4fc75f2be0f6a508b078c4a54,2023-11-07T02:10:34.120000 -CVE-2012-2498,0,0,9bd15e2cd4b6c7c35722a0c84546fba633d4951cc8d2d05775a482c159238c33,2012-08-07T04:00:00 -CVE-2012-2499,0,0,4c11bf1ef9190db2d3a6975b37982d22a7f1d7709d3ff471e24d9a00d950d451,2012-08-07T04:00:00 -CVE-2012-2500,0,0,807718d6644fba139ed87bb68cfc3877e9d1c88c5f2806ce234c89a00643d8e4,2012-08-07T04:00:00 -CVE-2012-2511,0,0,2e0dc9068782fbe6ea768b202a425096309acd63de67d4749468554bed0388c1,2017-08-29T01:31:37.337000 -CVE-2012-2512,0,0,79127997c5641420dab8ef937a89e521c996679372fb3626a3a676f6ddc70be0,2017-08-29T01:31:37.383000 -CVE-2012-2513,0,0,4aec4ac001c3c6833cddedaefe78ad965890772ec8f984cd8f96742c078783a7,2017-08-29T01:31:37.447000 -CVE-2012-2514,0,0,0a08c6c3219c82d31160210655eae7b3ee1acbab53411a3fa1d628d8d0d7677c,2017-12-06T02:29:05.617000 -CVE-2012-2515,0,0,725568d444ea2058e211e868540e90f92a2154bfa99105bb83b716b8fb4f26e8,2012-07-17T04:00:00 -CVE-2012-2516,0,0,9b2553efd923ed3095d514c7c4482df4bcd660713a70d3e4287adc3560255bcb,2012-07-17T04:00:00 +CVE-2012-2498,0,1,17466ea37ee46ea6c4145f83f8e4e2e053a6966654bbfe20b0da2853bd459959,2024-11-21T01:39:09.370000 +CVE-2012-2499,0,1,0accc61197ee8fee4e42c5f337efe022ad415b26b41d1e6fd0575a673b1eda1f,2024-11-21T01:39:09.477000 +CVE-2012-2500,0,1,0c653403dbebc046f74a3db910f5101f5618a32af123184e146bd659fa7351e4,2024-11-21T01:39:09.580000 +CVE-2012-2511,0,1,85ce1a3088f36a6e80096e09c21f62d0acb91abd5b1b8561a7f94d0a5583c8c1,2024-11-21T01:39:09.683000 +CVE-2012-2512,0,1,dbbcfad6e972ab11b9bf3186573913df9a29e7a9cf2dd2efd0d17e8746acf63a,2024-11-21T01:39:09.817000 +CVE-2012-2513,0,1,aecb6ecc9affd90630d3ee34204ede3521379a6310874a07553053bdec2f9fd6,2024-11-21T01:39:09.950000 +CVE-2012-2514,0,1,5f8d6365ee3638ed00a3e35e95f2c88be111f8d6926d55a673e6db84ee6d8992,2024-11-21T01:39:10.083000 +CVE-2012-2515,0,1,fd45e297036256737ccb5515072a94b920930a838b8d7f50ca978e0826656dde,2024-11-21T01:39:10.217000 +CVE-2012-2516,0,1,bf3780afe127bd42198a290513b9c35ac2872be38487ddbd45efa86247246a25,2024-11-21T01:39:10.333000 CVE-2012-2517,0,0,6e9b0353f755f741d9beaa434aebc532c48bcb10c68d7858ab4548535e2518d7,2020-02-12T15:56:58.373000 CVE-2012-2518,0,0,c20c6ff9e5929f3452d697bf290a3311496b48a971801a92ce9876069ba7043c,2023-11-07T02:10:34.410000 CVE-2012-2519,0,0,b1d4a352fb27e3ccb601c8616bd6001fb1094a683680af17b9f98ff7a79efe5a,2023-12-07T18:38:56.693000 CVE-2012-2520,0,0,8ade689d3ab36e3cf8445d975e52dc8ec8ef7e5672d1667d48c9aba4e5aadd50,2018-10-12T22:03:03.217000 -CVE-2012-2521,0,0,992897c10c70cfaf7de3d1221245d46a00f22fdfc2177cc35463e91476a8025e,2018-10-12T22:03:03.983000 -CVE-2012-2522,0,0,0faf20eaf370aeb4dfc3ef56dbd53c2fec89c39b935426bb521492e757322b58,2018-10-12T22:03:04.280000 -CVE-2012-2523,0,0,d56869bb00617dc207caa90911f4503fa9de4b732e25e117bb671b0a62f30648,2018-10-12T22:03:04.623000 -CVE-2012-2524,0,0,813bc6e5677c59208e62b4bd9544647569c3286e14ba44cd894e74d11af36ece,2018-10-12T22:03:05.170000 +CVE-2012-2521,0,1,19333002f9ab58f9241b362562fb3cc3fe299220468d3979ce56445969f4acf8,2024-11-21T01:39:10.857000 +CVE-2012-2522,0,1,73fa19494aacc75df87074de09894fe9417d32df3ef2af8ec2fad495b078e9f8,2024-11-21T01:39:10.957000 +CVE-2012-2523,0,1,9bd796e1c83a2067ee68ab3594afb39ed91e8b2bb73dd9f48c2c1fed5e7c103a,2024-11-21T01:39:11.063000 +CVE-2012-2524,0,1,72602526e914f29b65db6ada0f03cfd1e17478537c38a740fedbd92d867be9a6,2024-11-21T01:39:11.187000 CVE-2012-2525,0,0,bc0e37c863d7d45889329955539a4974db35732db9a2c76e77caddf9942df6db,2023-11-07T02:10:34.673000 -CVE-2012-2526,0,0,fb2be3f020f107daa8dcb65763c2d757f13655327b6274d890413d1705186a07,2018-10-12T22:03:05.483000 -CVE-2012-2527,0,0,2ab99920a5c7d1db0a48495135a7b9cdc2c6c9daf60e8e3ba3632a2568eca650,2023-12-07T18:38:56.693000 +CVE-2012-2526,0,1,a60b63efcd167e63c21526cdaad9c1232fa050ab7d1f63a12f79de7b9d289c89,2024-11-21T01:39:11.313000 +CVE-2012-2527,0,1,d385b7124b37baecdc32220e347a64a91c55d6f783f0d72b1d09b92dab923041,2024-11-21T01:39:11.427000 CVE-2012-2528,0,0,2e91d2ce9af2e178e2116287937215fa5127dc1582b90cab126c5fc221e55cea,2018-10-12T22:03:06.107000 CVE-2012-2529,0,0,619c3af5e55d887a6622fbe87dc6ca954ad3d20c665ab95efcd7864701b4c0a3,2023-12-07T18:38:56.693000 CVE-2012-2530,0,0,1e9a8ace92d2ed091de4601985e2cfab8af44495392ca93f0c6bea467efa40e1,2023-12-07T18:38:56.693000 @@ -54106,7 +54106,7 @@ CVE-2012-2532,0,0,11f11affb56b06c4a4d98c9744d16c09682b66b9d886d1c99ec19d3fad5a33 CVE-2012-2533,0,0,1ed95df3a1688467bfb0cab66e732c86f26d5f67c0a810527ac3703a64812cc4,2023-11-07T02:10:34.940000 CVE-2012-2534,0,0,fbc359d11f0e8740b0be22e26137133191d79085fd4e1675156700102230e9a6,2023-11-07T02:10:35.197000 CVE-2012-2535,0,0,c1a56dc627438b3bc7a77180ff0653b7808606e5c3bd09f45a6b7e4223f46464,2023-11-07T02:10:35.427000 -CVE-2012-2536,0,0,c9378b2c76c3ec570f0a9dbec037ab8b4dba44e78cdde973c5102ceca0e4675c,2018-10-12T22:03:08.013000 +CVE-2012-2536,0,1,4e6d1fab2d55ccf26b52298f5fbc6333119397638b796f1e679303c44e096522,2024-11-21T01:39:12.203000 CVE-2012-2537,0,0,cfae5258f77451687d7e67cc5cdf16ce77fbd5ff6bd771ec3bba93c638e1feca,2023-11-07T02:10:35.650000 CVE-2012-2538,0,0,e964e9587080694648f1ad8115ca07a3ed8763a2115450101454aa6c376d6fdd,2023-11-07T02:10:35.870000 CVE-2012-2539,0,0,16ee52a7b957e33728849e4893ea469a8c789062479a289eb17dadc1e3487e6f,2024-07-09T18:23:09.950000 @@ -54128,109 +54128,109 @@ CVE-2012-2554,0,0,e6d38d5c22602390265cd3a7bde6fdcae59dee6846f989040bd7cb1990cb17 CVE-2012-2555,0,0,52182e23a9a7f47a1c29a0f8c74f8c5f959d08ed381e6dcdab2b8d8489c609b7,2023-11-07T02:10:37.717000 CVE-2012-2556,0,0,05203a2c03c82909c8b0f7d70979be0a9886e823e8269aa08688c9da55fc2618,2023-12-07T18:38:56.693000 CVE-2012-2557,0,0,a62066d5b9e51f628be00728dc3606521cd56fda1ea4324fc70cc4f8af899787,2018-10-12T22:03:12.733000 -CVE-2012-2559,0,0,59dcb82c4e41721582514e13b0d21d664cb2e8f2a7ed3a23e26e550bbc5ffc43,2012-07-17T04:00:00 -CVE-2012-2560,0,0,94ccbdf1aaf036e73d302408d3340aa5f9e695e8c1bb82f34f4d5978fcf8cb8f,2012-07-17T04:00:00 -CVE-2012-2561,0,0,0b3b610a75ba2b78bf909896f959d8c5918acfe8fc8d7c3e9cb84e93cc8eb3b9,2013-05-25T03:11:12.093000 -CVE-2012-2562,0,0,8df02bf479d986fc2109005a3a56c76852f7f4f4f0aab7491e5652436889e741,2017-08-29T01:31:37.570000 -CVE-2012-2563,0,0,6aa93510722645c1243879ca49d9892129893091ed7e3d260af1ed7a51b52237,2012-08-19T03:44:21.097000 -CVE-2012-2564,0,0,d8630aa93a0b410952d43172f2b9db28a3b47cdac7697600b48da2e352d39b77,2012-08-19T03:44:21.270000 -CVE-2012-2565,0,0,0bdf57bc3ca8a7f563c6fe90dcec900336f4bb24bf173336a90be0b7e42fca6c,2012-08-19T03:44:21.427000 -CVE-2012-2566,0,0,7579cc87428cb219d5241883a052ed02cd287be16ff64e6e474bf349bb52f6cd,2012-08-19T03:44:21.597000 -CVE-2012-2567,0,0,957333804c50b06afe5035b797f65faea2dc75a17f1d1292b142ca9213d1dd84,2017-08-29T01:31:37.633000 -CVE-2012-2568,0,0,906989cf1b00ac7eaaf9475d6e5576a9d11dcceeb29aab3606fb90a9cd4b52c0,2017-08-29T01:31:37.680000 +CVE-2012-2559,0,1,9f94ed6da72970df6560ad1d3d9f02f9a36e2dd8771e79fc74d2de4bc0bb369c,2024-11-21T01:39:13.630000 +CVE-2012-2560,0,1,ed5b5c5de9e5fc78d7e40fab5e1cfb151dcc0accf6b5e3c6872ea03bf638259c,2024-11-21T01:39:13.733000 +CVE-2012-2561,0,1,4ead45421f8cbe92fe679f2f68e1ded77679f4d1ae834da21cecb3240cf933b9,2024-11-21T01:39:13.840000 +CVE-2012-2562,0,1,1faef0f4af43c97f38bb7bc4d21670cc03efe6cd900707565047022f325f6884,2024-11-21T01:39:13.950000 +CVE-2012-2563,0,1,b8db918b5f07d2b5d9b01950867ad1b7749bacf8cebf7ad6c262edaad8039dd9,2024-11-21T01:39:14.053000 +CVE-2012-2564,0,1,58adbcf29d3acf87b8c4448f1edf5e89f0d66825cf6b4b58fdeac9ff953bd22c,2024-11-21T01:39:14.160000 +CVE-2012-2565,0,1,21cd6671ea3c85362daab9f60ca51d6b2afe06c0a4f8719e6c90a11b4bcc70e6,2024-11-21T01:39:14.257000 +CVE-2012-2566,0,1,990236adbb93336104a18f68c1d23f7e07c3439db4efc0ebab30a5f001b1c6f1,2024-11-21T01:39:14.357000 +CVE-2012-2567,0,1,1cb228d6a45e2dcf6830d4b6ece2c76eb09aeefb7b00265a6f3ec0a96ed34e3b,2024-11-21T01:39:14.453000 +CVE-2012-2568,0,1,236f52878ba0e7da05e8498499151ba5c902f94a6a132f8ce47d2cd97ca7c898,2024-11-21T01:39:14.557000 CVE-2012-2569,0,0,b2576a0da9bc1e440448550d432a7bb99521ec3a452ef60fff134c2b6bfd2380,2017-08-29T01:31:37.743000 -CVE-2012-2570,0,0,0c8ddeedc8aaee5f781ca47f64172a066e1f28ace7cb03cd1ee9bad7dc6c3ad9,2017-08-29T01:31:37.790000 -CVE-2012-2571,0,0,6cc37dfb6607a8427fb01a3057ac1e13852e9d39ca944091c969faf915a92677,2012-08-13T04:00:00 +CVE-2012-2570,0,1,880db9cbf7fdf2eeefa3e67679f2b7eac146438454e9f871e45699656b3aa1f6,2024-11-21T01:39:14.767000 +CVE-2012-2571,0,1,b096014fffcfbd899f968fc99b7cd7ee992d908bc225907571313d0bc20591ed,2024-11-21T01:39:14.873000 CVE-2012-2572,0,0,bfa6e85153f5eaf0ca97835f1e180400256321536c7f954583cea93c89a4f844,2017-08-29T01:31:37.853000 -CVE-2012-2573,0,0,9cd428a6c1aace4f595f273a69ded063f78f6d1cc98c3895c003140cf5b06cdf,2012-08-13T04:00:00 -CVE-2012-2574,0,0,395db2acb11893817a280d3593ff11bc7756b4d00618c18395a4e6dfa7ccac58,2017-12-22T02:29:10.167000 +CVE-2012-2573,0,1,d08d437f666938a88f4a652fda7fb131ff21d5e8d70fba259f7a160abd97258c,2024-11-21T01:39:15.080000 +CVE-2012-2574,0,1,89e96297780403e38125e45e8ebcd42748b8bd1fcada141929460238eeb9f5b5,2024-11-21T01:39:15.180000 CVE-2012-2575,0,0,880dccfbced248206a17a0ea1133373205f9cc43d9d1c9730917d812d8ea825d,2012-09-18T04:00:00 CVE-2012-2576,0,0,c0792f09da346d56b150602e9a6523383aa6e0291a5c7d4d5b97e7cc0dbb9b05,2018-01-11T14:26:31.287000 -CVE-2012-2577,0,0,959f9df2d38403e2616ab202597d61f68090551aea0810838adba0579a1f0bee,2017-08-29T01:31:37.897000 +CVE-2012-2577,0,1,b4862f648ddf315bb835bff087d2affd62dc5e1da87a95be0a97ff3d96c7132a,2024-11-21T01:39:15.483000 CVE-2012-2578,0,0,f707df4b40207bd1532c81e8f54126a47d64a6c66c26625924a32fc2e88c110b,2012-10-26T04:00:00 CVE-2012-2579,0,0,ae7e9665e53d54c4de5a92a08d727ca5e41d2c49e18dccbf9c32f1bcd1dff8c3,2017-08-29T01:31:37.960000 CVE-2012-2580,0,0,e0e13b3c74dc52635fdfb58ed671b5c1bcc39649661563bdebdcf57c8b2fee5e,2020-01-10T16:54:04.523000 -CVE-2012-2582,0,0,b79d2dd46ba5c0f6dc13c86aa7264fe7ee058e9fee050cad1513932b2a6c91f4,2013-03-22T03:10:32.503000 +CVE-2012-2582,0,1,46f2a11360580c1af7e1795ee8b363b95ddb388316fc196d5cbc7b9af298c396,2024-11-21T01:39:15.887000 CVE-2012-2583,0,0,de3cb13ba0e379e09ca8be30dd58d4e641a24cd12fb9d77042b438d4b8a9e0ae,2017-08-29T01:31:38.070000 -CVE-2012-2584,0,0,0516cc87b8fd89d14876853a8820bae07b6ed8a750df67c1a4262d9d1a74a119,2017-08-29T01:31:38.133000 -CVE-2012-2585,0,0,b6ddc16133fb0967833a297c16e6af595df0148ad0b6f047208520436cb69408,2012-08-13T17:22:05.740000 +CVE-2012-2584,0,1,5b9e32043f0a3f620563268d0d365246e71371fa13a4789c34bfafdc40de27b2,2024-11-21T01:39:16.093000 +CVE-2012-2585,0,1,36e94e763cf8f6a77791da17e29d76ba8c435f1394319249667177fb288eb51c,2024-11-21T01:39:16.190000 CVE-2012-2586,0,0,e61f631df95d42b1193e1cce8335d20e5e6f65d8070435787dc33d5adb1d8947,2012-10-26T04:00:00 -CVE-2012-2587,0,0,8a97545cf9ab65cc06d81fe199bbef19e2678bdf6a6ef9e1c14d5ca46427b7ab,2012-08-29T04:00:00 +CVE-2012-2587,0,1,e6ff88c653efb7e21553be1e21c27729c1fab67de8473d76a5f546a5531f00db,2024-11-21T01:39:16.383000 CVE-2012-2588,0,0,f675ff770c0ead54589ad26c362ceb569363ee8a7dbde8f3edb48d4eb23793b5,2017-08-29T01:31:38.210000 CVE-2012-2589,0,0,fbddefc2f61a7576b6f75cdcdfe679b359cc68f59b361884c625ab4a54ef7676,2023-11-07T02:10:38.190000 -CVE-2012-2590,0,0,e41e1fa883cedd6442c3745913048d38f0a6d29dd2674fef03090693be798467,2012-08-13T04:00:00 +CVE-2012-2590,0,1,6a94a9151019199ddba353168cfdb2561d837a5834a04ec59937c5fe2f8e3363,2024-11-21T01:39:16.580000 CVE-2012-2591,0,0,4911420a8d9510c1f6b4b22fb8898519f6cd555140f5cc5eed6b7a6ab3c07421,2017-08-29T01:31:38.273000 CVE-2012-2592,0,0,382b3902e821dea8fce0ca386bb1a75c2617b1e5a95d65d1bb8d2a6c1132283b,2017-08-29T01:31:38.320000 CVE-2012-2593,0,0,3d10047a08398275c7125d53d9030d600a7561b277713ae55dbef7dff9b64b7f,2020-02-10T15:17:47.613000 -CVE-2012-2595,0,0,48bb06645f925db4c2f5ff9f0573064362c1edeede773c046b73b7ef4e3821b6,2012-06-12T04:00:00 -CVE-2012-2596,0,0,8b7a3e6c55b8e5cb39525be84c4f0b60187b69af69bfb8a1c11f78bdd705fd13,2012-06-12T04:00:00 -CVE-2012-2597,0,0,58a64df34f4ca9e37c4a061158b4e0b46b6964dd19823adc5f8f1e7897e7da05,2012-06-12T04:00:00 -CVE-2012-2598,0,0,1957f6d0983b267e4882fbcd84cc1d4c2c7f163652fccd112407ce90a67d34e2,2012-06-12T04:00:00 +CVE-2012-2595,0,1,eeca0375abe8893644385fce6198fb4dd525b5ed308843c30bc762aaaeffceb0,2024-11-21T01:39:17 +CVE-2012-2596,0,1,dbbd608776c3a702c75ab9299c71f3643eaf7724df79b14aeac58a9b037ca2be,2024-11-21T01:39:17.103000 +CVE-2012-2597,0,1,9e3d6f3cc8c745e2922b6df6775d788ca76b250c9085fdc345ab7c3f5da1f240,2024-11-21T01:39:17.203000 +CVE-2012-2598,0,1,4d14fe17e748bb857136f875172ad4e6daad1429412ff6b22c496dd8d0088e3f,2024-11-21T01:39:17.300000 CVE-2012-2599,0,0,7f0a81b6f02abf08b561dfb9b64d92fdb00de97e6fa039807538b8602d7dbe11,2023-11-07T02:10:38.473000 -CVE-2012-2601,0,0,27b91d722f52fadaa313127a269d53e760c594616dd874afa64295e35862ee69,2024-08-27T17:48:24.383000 -CVE-2012-2602,0,0,9f4a2a2d301084684f8fd7ed9fdd6f4428d44850435bd7c679a01ed02498b3a1,2012-08-13T04:00:00 -CVE-2012-2603,0,0,3ba0a20622c897320d860960a863df1fe645b178f74fc78fbb6160c045fc7605,2012-06-28T04:00:00 -CVE-2012-2604,0,0,dd42440cc37ed1bff58d600a2b407addd4a737c3614e18b70fb9b58fe0533932,2012-06-13T15:55:01.290000 -CVE-2012-2605,0,0,dfa58af08ad5b8a233d62f9c0f42e33c8c42e1e6a6b0fa14b10b9a5cc89151de,2012-06-13T15:55:01.337000 -CVE-2012-2606,0,0,0af6cf2f20e6e9ceb5c04d7f8cb1f4523e217f9480faab0e6442acf6f38289c7,2012-06-13T15:55:01.387000 -CVE-2012-2607,0,0,0001e2747e6618f67f6d690e8cbe3db98513f9bff286576f9442be336f98f88f,2012-07-17T04:00:00 -CVE-2012-2611,0,0,47a2c443bfd85883aa2790b001b1f0de385ecc561348c6efef8ed7dc0bb8be9e,2012-08-19T03:44:24.613000 -CVE-2012-2612,0,0,288019494c27fa0ab93ddacdfb0e3bdf94616eda696e4da0fda49b699fb0ac28,2017-12-29T02:29:19.127000 -CVE-2012-2614,0,0,c8c311830c9e37494ed6ce7f98d786e920a149a8ad43b15eb89fc92d90061dd8,2012-08-18T04:00:00 +CVE-2012-2601,0,1,a84ec99e45c624d01e1589c70dc3e704c98975257c973676a314ed62a79be4c0,2024-11-21T01:39:17.430000 +CVE-2012-2602,0,1,dc90f615b21bb7178c6d87f5213e7dd43aca3ec4a284be4c6baa978315026d25,2024-11-21T01:39:17.533000 +CVE-2012-2603,0,1,8985d97b71822e6b16894fcc70974b7f0da35c64adad0d944830b102bed743e0,2024-11-21T01:39:17.633000 +CVE-2012-2604,0,1,f278d7f555306b09d6b5d6a65467340f460f056785b088794b8b98efdaa2c9e0,2024-11-21T01:39:17.743000 +CVE-2012-2605,0,1,a633ba9d4e7348f94f3983b3b17933b5c63248a8da45941bd34ff3af4ffdd490,2024-11-21T01:39:17.857000 +CVE-2012-2606,0,1,bd1d93f25dd17f0885a1a2dfce1162a10285c9effcb4a69c669d4d12a718a32e,2024-11-21T01:39:17.960000 +CVE-2012-2607,0,1,510a43945676f9eead687064c7a5b6a2f2348fe993ab8799a6c0fe3d5342208a,2024-11-21T01:39:18.073000 +CVE-2012-2611,0,1,b18c06aed8349fddc057012b6be6f684bcb00544f720831646f1d3a865d76db7,2024-11-21T01:39:18.183000 +CVE-2012-2612,0,1,eb847a9743882efb52a849a29254d939fda9b54028127abf65084ab712b35208,2024-11-21T01:39:18.323000 +CVE-2012-2614,0,1,8a7b5933515bf4dfd8de8807693833dcad812028ef896f34f4173907d74b1564,2024-11-21T01:39:18.457000 CVE-2012-2615,0,0,3fec9eb8ae3ccf2146cf5fd86d8d6cf3e98c01d15d57a680ec99191f05b9b7ac,2023-11-07T02:10:38.773000 CVE-2012-2619,0,0,d7361f5053b4c90248dc8e8a5d182f6aa93aa9ad75742794fe1fb231f3776366,2013-02-05T05:00:00 CVE-2012-2624,0,0,68984b063f491311051edaa1cb93a0effec49498de83c918648cad8a5478a4b3,2013-09-24T13:56:13.917000 CVE-2012-2625,0,0,6e37fef8c7d9b79ec5fc2f467d11be170a4fbc478835d9d28f7a3926bcf6dd78,2018-04-13T13:00:09.980000 -CVE-2012-2626,0,0,3accfc0fb963fefcd087c232f515929215b0230bf5fc3a2bbb4b2b88a40ab295,2018-03-08T19:03:21.467000 -CVE-2012-2627,0,0,a6fa3136f62f6017c2e188b788dddf560f079a354a07f03f6d06dc5904c074ff,2018-03-12T17:21:17.130000 +CVE-2012-2626,0,1,c97b562a4d7a09a5c9fed16009a2e19c04dd0d03ea48d23bdbdfafdc6f3b233c,2024-11-21T01:39:19.063000 +CVE-2012-2627,0,1,44c1ca98b548482f073631cb24e679e19b4a3c9f510092a9efa914e9efa423aa,2024-11-21T01:39:19.200000 CVE-2012-2629,0,0,d4de1fa073d69cf9dcf36452476bf99acffa34c1c72d583d83f8ec108b04469c,2020-02-28T20:47:53.550000 -CVE-2012-2630,0,0,ad36ce77897d691921dad4dc16fcaa5194dc837ff7d7cd702cb69f8d2a338076,2012-06-06T04:00:00 -CVE-2012-2631,0,0,747ed5ea38389fc368857d8e24ee010febf782f2f4f447896248685ee527ab5d,2012-06-15T14:55:01.703000 -CVE-2012-2632,0,0,20ffaad8dd1c9c39063d5d60a5d2808b3708817eb942ba85ea9005f726fb9cbe,2012-06-18T04:00:00 -CVE-2012-2633,0,0,90ead8ca0b21f976f61afe6621cd2b3554db5e4719200bf8fc375deacddc0f9a,2013-10-07T16:29:24.243000 -CVE-2012-2634,0,0,7a5d2731480b38b9d2a5fbeb3de2c80f5223cf5804fb9ca2320207ab306bbf3e,2012-06-18T04:00:00 -CVE-2012-2635,0,0,a1c438227e7d7ebd9e6ca955f861b117b372e9f4bce56e6748ea3bebb0afa2cc,2012-06-18T04:00:00 -CVE-2012-2636,0,0,1146b425105f536783c5f0099fb60f45bff0719f82a0eccc0537803704d23bed,2012-06-20T04:00:00 -CVE-2012-2637,0,0,d382f397f64edc88a3f2775eaafd95f95c488d360bc09d1bc7a0bd9abec759ee,2012-06-20T04:00:00 -CVE-2012-2638,0,0,d121ef0f1366b9f96b82644ba5dd2a1f734f2d9d1dc2e7f3b806efd714908390,2012-06-20T04:00:00 +CVE-2012-2630,0,1,2c6d553ebea7a54952d795e17e39e44c17e1cba7488ec23bbc4e04ed93cf44a3,2024-11-21T01:39:19.470000 +CVE-2012-2631,0,1,440c8172ab01734d171e64469d15e7e0ec0d33025540c4329bec2a28e0c69775,2024-11-21T01:39:19.570000 +CVE-2012-2632,0,1,a568e936f14aece122166830316401a99ab41382ed300590a830a71224246bcf,2024-11-21T01:39:19.670000 +CVE-2012-2633,0,1,f5f33e60b75dd85ec7835bf639f3f2a6ad9bd0420e66af4263d3da71dbcb113a,2024-11-21T01:39:19.790000 +CVE-2012-2634,0,1,687b544c119c183ee1126a3ee1be27525b6217344860df9e957f2a23c49e936b,2024-11-21T01:39:19.897000 +CVE-2012-2635,0,1,2fbf5d3d6420839393bfad3eaab86094be21b3b02244c3ceae0f04b3eb09745e,2024-11-21T01:39:19.997000 +CVE-2012-2636,0,1,c8592677789a1a24e8e64e429f3b8aa2eb2d8deb2655950204edf2b8e41c9178,2024-11-21T01:39:20.093000 +CVE-2012-2637,0,1,e8d1e4747f7d1975507ba4fb0d509151d003253472d86c80a6bb0101e0c7059e,2024-11-21T01:39:20.190000 +CVE-2012-2638,0,1,35cacf1a2362adbd71c36fa7f21a09430a9590e6bd8fab2b32d14ea77123e1a0,2024-11-21T01:39:20.290000 CVE-2012-2639,0,0,6cac58322d6985184361474dd96602c4e4ad8b603f0f96ad25f555aa2dc2f05b,2023-11-07T02:10:38.920000 -CVE-2012-2640,0,0,1f8b436622d469f81c8796c4ac4a00faa24de0a5162b58f47b712aa3c9be14c8,2012-07-17T04:00:00 -CVE-2012-2641,0,0,0ab1b2116716d2429fd47aff6e4cdbdfdca505bafb0f751759ffbccdce1a23ed,2012-07-06T04:00:00 -CVE-2012-2642,0,0,adcefa17fab6461a13faf792d30e6fde80364a8409ffbacfb3aa1a1bcd5d26ed,2012-07-09T04:00:00 -CVE-2012-2643,0,0,f4f884d370e2eb721f9dcbff75dbcf6b1047f0b4754108ef676157e759fcd691,2012-07-09T04:00:00 -CVE-2012-2644,0,0,869fbda1baf59d26d6a5d2c5c0c67b3ad2a152c23615f59a7583c7ef7f9a2e06,2012-07-09T14:28:47.697000 -CVE-2012-2645,0,0,26e75e04b8b7bcf7504522e85da01c8f37041e3896fb7e330aea54331bbc40f9,2017-12-22T02:29:10.213000 -CVE-2012-2646,0,0,3e1bdaacf16ef7d095ea83a5d4f76c56dd41775c43db9f4d96af575faf53ea16,2018-11-29T16:54:03.567000 -CVE-2012-2647,0,0,8ec8fecd3f42174549ea05cbbd58d9df3cbd03f0ad6d81c866dfd998e7b0c2b6,2012-07-31T10:45:42.093000 -CVE-2012-2648,0,0,b0d3dfc70a02d30b8f37c88df950b1634ca93875aa0573f651e8cdc4c06b0243,2022-08-09T13:49:00.607000 -CVE-2012-2649,0,0,4316e03b20a4f73a34844d105ba453f70560fd2ae74cc320663d8ee70f651b07,2012-08-13T04:00:00 -CVE-2012-2652,0,0,e67902f265b3dc592bbc74f4a1abc6089fe902169cbe3422bbb3b4392f771ee5,2023-02-13T00:25:07.177000 -CVE-2012-2653,0,0,13809bc3c77936ee6b61a9a5307fe82e1da0137f10050cac5dd4b1679cad0dba,2016-11-28T19:08:02.510000 -CVE-2012-2654,0,0,1dc6cb4c9f836bd90ce61b791e0107acd29a9826c06badb75b82097306911115,2017-08-29T01:31:38.460000 -CVE-2012-2655,0,0,28ba24182a49261484de4bc327544556bc1955b5fbd4edbcad91c4cd9133cbcb,2013-04-19T03:22:09.863000 +CVE-2012-2640,0,1,57a9f4d22f1083cf79a762de765622513f2cadda2b197ddcbf05e4be5977d249,2024-11-21T01:39:20.407000 +CVE-2012-2641,0,1,29f8e5c458f624e1ea9d821e0c58bcc190086e1aa609892efaa9a1f44c7ea22c,2024-11-21T01:39:20.510000 +CVE-2012-2642,0,1,072a00839e3bec18d0f41fef9dd95a2e0da47af9497eccdbcd789a7d649fa565,2024-11-21T01:39:20.613000 +CVE-2012-2643,0,1,ea855694ca22f1cd6ee8c3593d9c4c512b6f7e6506ceb64dacb00012a9856f6c,2024-11-21T01:39:20.710000 +CVE-2012-2644,0,1,7d59523ec568ff9588a36c01b3243c7b0fc797d501d8e5ad47b0e593b1a26698,2024-11-21T01:39:20.807000 +CVE-2012-2645,0,1,740234a9b53ed9dcb61bbbcc837cd9e61e6e440e4596b4734132b9ccd807bfeb,2024-11-21T01:39:20.907000 +CVE-2012-2646,0,1,9baaaba09a2f903d86a694e6cb8a61eccf75aa575a81eb59b058a2a9b4fdd93b,2024-11-21T01:39:21.010000 +CVE-2012-2647,0,1,7ce3d02e8bf39209dfa9eb8ba76739dc371a913aec71e5ed1b66ef8a33df72c8,2024-11-21T01:39:21.120000 +CVE-2012-2648,0,1,eefbd6f1fc604d3b003206f1663d0c8641107d3c1fe6db90c1457de6307bc7c9,2024-11-21T01:39:21.223000 +CVE-2012-2649,0,1,ae56c98a9db753cb53b99d5d01a8b3d40f678533c190b5d8bdff7e88c5780464,2024-11-21T01:39:21.343000 +CVE-2012-2652,0,1,24d944911320865f97aebc0bde711db2e09f26d649a6938bbc086a0e61b769c2,2024-11-21T01:39:21.443000 +CVE-2012-2653,0,1,ada6c14b4236c11efe852f9f3fd924bef665c0e746a6d0bcf3dcbf485cd89c3c,2024-11-21T01:39:21.560000 +CVE-2012-2654,0,1,84965cb4d00ff65ecb384fc51d9e3daa98dfacacadc32dda86f29b883b9b42e9,2024-11-21T01:39:21.673000 +CVE-2012-2655,0,1,cde9157cf6af4e46c7d21fb17628422c88541c72873f4a24d16e6934871dbfe4,2024-11-21T01:39:21.880000 CVE-2012-2656,0,0,54140560cfb6bbffc231d5035bc5da1e518fcabcbb3ceafc81613df841f4263f,2019-12-23T19:59:12.943000 -CVE-2012-2657,0,0,09fdfd03bf0960f05e970d850a9d874f4eec954b6fd3eafbb90ca7d08e41aff9,2024-08-06T20:15:27.507000 -CVE-2012-2658,0,0,905394dd2d6461f5a9312e5198433c880b3c9585573d235b7e245f0356f40e7e,2024-08-06T20:15:27.603000 +CVE-2012-2657,0,1,5728106dd90ce075bd0e4ea08ccc367c3c2ce4855654269097a6f54c8aeac275,2024-11-21T01:39:23.093000 +CVE-2012-2658,0,1,daa27bf510562130d4d9ff77a77aed6957e593344ab9c7a57734fb62f6ab0bef,2024-11-21T01:39:23.420000 CVE-2012-2659,0,0,ed6985e653e55773c11f992ea5ba847568d5b9107246b4049338dbf72902b221,2023-11-07T02:10:39.477000 -CVE-2012-2660,0,0,5a2164288a3d635e113428c3d507fd6f95f7d51ef81df1d5ff4f0540d8f71696,2019-08-08T15:42:45.623000 -CVE-2012-2661,0,0,023f4eb9caa844f2430433ab456457ca992b276ad3aea3512688407c42e4cc97,2019-08-08T15:42:45.623000 -CVE-2012-2662,0,0,6fc1c042ad4ecc9b0948c546734f9aff159697f69c94c7cd66ce2d28e28e73bb,2023-02-13T00:25:11.870000 +CVE-2012-2660,0,1,8205e54a8555078d0d00865f00a943791cc53a229c1e5174aa177f4dd82acbf6,2024-11-21T01:39:23.550000 +CVE-2012-2661,0,1,445590fdbc7f28d344664f21934fd9c15b2c546f6ee167de7969afaf6e062a63,2024-11-21T01:39:23.693000 +CVE-2012-2662,0,1,d2c638c77a7b07fca2736f39b2e044c487b492e120346a1fd16f06e316f67b16,2024-11-21T01:39:23.840000 CVE-2012-2663,0,0,ed62b7b3d081766f820f95ec6b30beb76acd3ec4d0a3f49351f8fb63ef5b9575,2023-11-07T02:10:39.770000 -CVE-2012-2664,0,0,050d9b757946d6989bc982b39fc8458028c170232154922fb48c0f54e30d7d42,2017-08-29T01:31:38.697000 -CVE-2012-2665,0,0,0cff45e650a23a581013f377ea003c7598f37de9f03401cc203930f69d486648,2023-02-13T04:33:39.533000 +CVE-2012-2664,0,1,69d7508034d833dbe83dcffded2c06410e9307ae66ba7b3c43726f4ed532dd5e,2024-11-21T01:39:24.060000 +CVE-2012-2665,0,1,72a81f17884d9f3bb9a61eee7fa0b76b2961c9b96a307862d5c1cff49b66c0c8,2024-11-21T01:39:24.170000 CVE-2012-2666,0,0,f5a89866b112bdc36c695d887fea97c30a2d281129546aabc5abb444d67d100a,2021-10-18T12:54:21.473000 -CVE-2012-2667,0,0,45acf240c657d6372a51c4c286bfa64b32ba864bec8e529e1dee31b5354f19c2,2017-08-29T01:31:38.743000 -CVE-2012-2668,0,0,b7237bb7700940914ec9cac3d5c9b504b54618cccd93ed8e841f9f14beaef422,2023-02-13T04:33:39.750000 +CVE-2012-2667,0,1,b2c6405934dd3d5a8e1bf8f2ddc59efcfc4b82bf774fd6d1938a8bd6c92f9a59,2024-11-21T01:39:24.437000 +CVE-2012-2668,0,1,e94534a6ee7a71f5050d5ba4a1204756e0acf0b7129fad80076e6de204de0520,2024-11-21T01:39:24.550000 CVE-2012-2669,0,0,d23d2c05222a33a17396c5d194b69d76e9928fcd0fd9c464cdbcbb07c5f4f340,2023-02-13T00:25:14.347000 -CVE-2012-2670,0,0,226313a6a112ebf7309c8759b60ea4b8c41814d061309a79bbc81a326a963a6f,2017-08-29T01:31:38.883000 -CVE-2012-2671,0,0,a0e6aaf0d23511fe81956f0b5efe3305226e85d5ee03842d26dc2c3f2c9a9d08,2013-08-28T06:47:11.577000 -CVE-2012-2672,0,0,2a0ebe53ed4dc947fb06fa3656c736d40dc5d54184dbb2432a3d0ea3c622a95c,2017-08-29T01:31:38.960000 -CVE-2012-2673,0,0,74f8ffe2748c13f3d54971578bee87e1f689f65a00085c6d90f30ea861da3b81,2016-09-29T01:59:06.160000 -CVE-2012-2674,0,0,d4447ebee8efb18c1f2b5c47ce0a6e7e715236eb1fa70a9c0c643a7ca3a53314,2012-08-24T04:00:00 -CVE-2012-2675,0,0,ae6db6b40e73d572afc38ee1ddd532eee9483d62af7caf452921c783692645e1,2012-07-30T04:00:00 -CVE-2012-2676,0,0,e11483d47713b05290a6cfa7ef942f3477d682890e5602dde54bc90f76a6e2e9,2012-07-30T04:00:00 -CVE-2012-2677,0,0,58435eec15b4f4b31c227f60cc6102e8c9548cd1e0b345d801543001b65e5f78,2021-05-26T10:15:07.797000 -CVE-2012-2678,0,0,b0a960f5e6e0c0ee62b436a8f95ddebb7dba6c325b66839c737ab23a8be663ef,2017-09-19T01:34:58.527000 +CVE-2012-2670,0,1,641c7a0412e5810ba14493057bad4538109ac6faf78458840384cf187115d78a,2024-11-21T01:39:24.780000 +CVE-2012-2671,0,1,e6f5f48ce8bffef887070ce7d0ac74d454bcf3b0124a7dab4f8a34dcdb5456bf,2024-11-21T01:39:24.897000 +CVE-2012-2672,0,1,58e84eaea463134fb1eb16f58100d9da3744b1efe905229e0f4265795538bfcf,2024-11-21T01:39:25 +CVE-2012-2673,0,1,6bf3ca52f887e04ea525e2e3336fead809bfd75fc6bc4da1529b78becfc2aeb9,2024-11-21T01:39:25.127000 +CVE-2012-2674,0,1,2f306832d8b5c1cd7347e7ecb3d2771b00b8461bef04463df7cfdb76e29e4ac9,2024-11-21T01:39:25.270000 +CVE-2012-2675,0,1,f8a7c2987e9208cac6cda3984d0be7cd78a0203f8fe37323dce02f5602346f49,2024-11-21T01:39:25.403000 +CVE-2012-2676,0,1,f6ac50b556ef6b13267a63bee1926f8f5a041dedac869a16082ccd8e06114277,2024-11-21T01:39:25.533000 +CVE-2012-2677,0,1,054d6357487d53e2ea7e13848c8d87d56c741fb2f7887613b1f4b12f7ab0aa75,2024-11-21T01:39:25.650000 +CVE-2012-2678,0,1,68ddaddd3f228a6271aca2e9659ceb3fbab618aa5dfb56a82922721b2e8264ee,2024-11-21T01:39:25.777000 CVE-2012-2679,0,0,e5dc541f8b4e7e2e9cea1fa8c82aca3cb5b79e9e7e4fa0fe86ccfe9d5e315c50,2017-08-29T01:31:39.023000 CVE-2012-2680,0,0,8851ea111ae50b1a5f3e0730e401be640e8bcfec6f2b604a8ef9efa4d8803488,2021-07-15T19:16:09.750000 CVE-2012-2681,0,0,e1b7b76381f2fe97aeb949a0c6aa24ca2cdfabbc5fe9e53e72d06d1ec2247d2b,2021-07-15T19:16:09.750000 @@ -54239,176 +54239,176 @@ CVE-2012-2683,0,0,b61c601b9e3bd9def5d59661816398546413f960f541f253b2cb7b2b0dd327 CVE-2012-2684,0,0,700be8d478d6a4976d22d7459caccecc974ef958cab2e4154753b37092fa0705,2021-07-15T19:16:09.750000 CVE-2012-2685,0,0,f4488d74d78799d14840cdb5b41a6266988ee13bd1940f1f31600f72e6414aff,2021-07-15T19:16:09.750000 CVE-2012-2686,0,0,6d92287ab55a39b6bec4c89ff8f33336e24a0d93bbb4256b33018b3824710a5a,2023-11-07T02:10:40.013000 -CVE-2012-2687,0,0,5e7ca6e415094f1bffdc3ea53a726456a2a14d7607361d84c8b6f311adccbe0a,2023-11-07T02:10:40.107000 -CVE-2012-2688,0,0,00be65b41440b605805dcb26baed717b419e4c4d5db50d97fafac5787b5ae300,2017-12-22T02:29:10.323000 +CVE-2012-2687,0,1,d56c8726d67b07661eebd941e0c134ec1840475ad8501231055a3966a68330c2,2024-11-21T01:39:26.897000 +CVE-2012-2688,0,1,66070667cb20ce35157517e3d52756fa069b16845872888a721095aa2d08e4f1,2024-11-21T01:39:27.063000 CVE-2012-2689,0,0,90cac4764e5eaa5faa35c491fe9931c8e25b78b30fc7744f8a673d7b13624c26,2023-11-07T02:10:40.280000 -CVE-2012-2690,0,0,05a90b6140eee2db92db0cb0d11f76d59050e7937919f817fa1b38e8e7ea17de,2017-08-29T01:31:39.413000 -CVE-2012-2691,0,0,86b4ba50c8527a280eb3b487e1afc023daf890ed8d582572d9c03b76719d25f9,2021-01-12T18:05:59.507000 -CVE-2012-2692,0,0,b6949ec0a6e8dc796b6006573d6dacb12b8fabeba593ec1dc955f70e076b559f,2021-01-12T18:05:56.147000 -CVE-2012-2693,0,0,452c4951c402f78eb05f64631113acfb92fa693b27e331ff10cf9bea0203937e,2013-01-15T04:30:36.820000 -CVE-2012-2694,0,0,4cfc5723430b90788d68a0882d23bca3196410835845171c893381bde3d11e7c,2019-08-08T15:42:45.623000 -CVE-2012-2695,0,0,4c44c5a4b1439b8128bb868c167d6378be981e9229aa25812e60e6c481e667c0,2019-08-08T15:42:45.623000 +CVE-2012-2690,0,1,62034ed3523303eae6cbe4cb353ade98a265a874426b0bf9a7a7c39c010797dc,2024-11-21T01:39:27.230000 +CVE-2012-2691,0,1,f2fa1f6054d05d57654e35243ff8b2232c3cf39726e447ca21c0414ef604f366,2024-11-21T01:39:27.343000 +CVE-2012-2692,0,1,fd69b7b5ca739a054c74e36903049a58fb8f089334d6dafbd4efae5f9931b47c,2024-11-21T01:39:27.473000 +CVE-2012-2693,0,1,0a3ba34f330bcbe6535f60c10dd3d37b4123772378e6b34765a75c405cc81287,2024-11-21T01:39:27.597000 +CVE-2012-2694,0,1,1b879d8eb0195bf8257c3816ab66f397b160a292b8ff30e548a181b13d4f2fe7,2024-11-21T01:39:27.720000 +CVE-2012-2695,0,1,a4a1748cf0a38ff0f6e4159eed5d6c5c6ccdf19cf0969d6328e96abed90cf979,2024-11-21T01:39:27.853000 CVE-2012-2696,0,0,2e7d1cb3d1699cd6920861dc7772617ec481af32027e7b1e2e8643e6f10207a1,2017-08-29T01:31:39.557000 CVE-2012-2697,0,0,37bb84b5dfad011b104be4a8fb99a8d3a89745928fcfeb0d7f7909fd36719d91,2016-12-08T03:02:29.327000 -CVE-2012-2698,0,0,c5f06d0d38023b179af382415ecd4c35dea2c71e1e0c115abfd45bc801820261,2017-08-29T01:31:39.663000 +CVE-2012-2698,0,1,e637c1aff21d3f7cdafbcfdd9259e734911e2148fdb8242225d0b253a12ee668,2024-11-21T01:39:28.197000 CVE-2012-2699,0,0,c3bc9277001919fc9ebe917a8fc687394ca08f2f6c5a547a8449b975c29bbc75,2023-11-07T02:10:40.570000 CVE-2012-2700,0,0,3361d0ddb40780e9372cb5c1018664504b1a2143cb24bee185fbf10ffd5b4d65,2023-11-07T02:10:40.790000 CVE-2012-2701,0,0,4efdea16ad6cdc13ed339c5522db1f79c1f9bc01c8cff106a2f696a225fe09aa,2023-11-07T02:10:41.003000 -CVE-2012-2702,0,0,e0337c8b08ba078cf28f2036bdda620cf4c1ea031308d68d372e51c89f048ec4,2017-08-29T01:31:39.743000 -CVE-2012-2703,0,0,def86e4518aac76fad30d8864ca9aa99ed211d23667381dbb825e6ff1bb019f6,2017-08-29T01:31:39.807000 -CVE-2012-2704,0,0,52eec89c63d69e64abb1d60a4299c246ac9c5f4f49ec25a0bf38b4ac54bcfbca,2017-08-29T01:31:39.867000 -CVE-2012-2705,0,0,f174c83794719b81e213cb6c693a1214bcba38ffd7397b296d2146089d48bbf3,2017-08-29T01:31:39.930000 -CVE-2012-2706,0,0,9e89cc244e9e3d9c6155ab27f45a0f30dcaf714c6cb19f35e9909b7529c630c6,2017-08-29T01:31:39.977000 -CVE-2012-2707,0,0,61fafc31da17341eece8af5c937412818aa15cd3f16589b2ed1003625e18e8ad,2017-08-29T01:31:40.070000 -CVE-2012-2708,0,0,806e494dbb68b4d50b10dfd291fe188899a0c396174058ac09dc1fad6face314,2017-08-29T01:31:40.133000 +CVE-2012-2702,0,1,4f2ad32790985436eed6bbce7aa823e66ec16d6a2157f6b10753d1da9c1dc13e,2024-11-21T01:39:28.380000 +CVE-2012-2703,0,1,3e0427d034ae67d28a777a9b5507dd2cb7e8c7400f458785b5942c2981dd2899,2024-11-21T01:39:28.490000 +CVE-2012-2704,0,1,a99e3935033f3d53a64c4491387e54481f01213e90ac7eaa02e6d05c4c5da670,2024-11-21T01:39:28.597000 +CVE-2012-2705,0,1,4fe3aca99b203aa615a89e41af3c0e1daed7c516bf521f800f00b5986ea874c4,2024-11-21T01:39:28.707000 +CVE-2012-2706,0,1,17ba3700087411ff3f2064440bf538f707b5ee8f626728da408c804ea8668c63,2024-11-21T01:39:28.820000 +CVE-2012-2707,0,1,2aef175f1ab62980a3391c963e77400581379a991ac7c7e271de766adb5df70a,2024-11-21T01:39:28.927000 +CVE-2012-2708,0,1,ac922526cea815970211eab3c375e9aa3a51ce65692d36788eeeb4776fc003be,2024-11-21T01:39:29.033000 CVE-2012-2709,0,0,1650b21a17dae0a1e3c59bda09e1b93fe26cb7d4582615603ae83da46a54df66,2023-11-07T02:10:41.290000 -CVE-2012-2710,0,0,e9d6edaaefa1efd352aecf4652be9a35046193ff72d3699dcde9dcd37708b38b,2017-08-29T01:31:40.197000 -CVE-2012-2711,0,0,f2493ce25bf3be1142c1f5fc77460691926f3a1915889628a03d3dff2c339549,2017-08-29T01:31:40.257000 -CVE-2012-2712,0,0,5c1b8c73f40319ac86f3a671cc5664e50b2d89f35bc9a682527175cdaf54b7da,2017-08-29T01:31:40.337000 -CVE-2012-2713,0,0,4c9432e52091eb68da0c7297aacd4e482c76db6c27db71162a7d03d502457ff4,2020-01-27T16:24:25.083000 +CVE-2012-2710,0,1,dd990e984ec872d60948e6e5737d599fb69997899f26d71608ebc724496b0ab3,2024-11-21T01:39:29.160000 +CVE-2012-2711,0,1,51aa24062405a05614ea0080f3b6ef4808f2bd1e8ec7a5a77a5fd94c126477fa,2024-11-21T01:39:29.270000 +CVE-2012-2712,0,1,d133d24eff59d849071588c0dce4330d14a8f47d86a0202c7fd650014a78eae7,2024-11-21T01:39:29.390000 +CVE-2012-2713,0,1,794afd6b3da5141f7ad3a7d6a64c8e3a1ceda252d222b235339f3ade957f09c3,2024-11-21T01:39:29.500000 CVE-2012-2714,0,0,28ae2efce21f077d8df16e1a5f511f263be43aa6566583c95ec82324cb057dfc,2020-01-27T12:48:43.497000 -CVE-2012-2715,0,0,cb4b72ddf51c88daa3f8c939db26246cfe994452e312db13cf63c88552cf1137,2017-08-29T01:31:40.447000 -CVE-2012-2716,0,0,5eb6ef6ae75af4275782e704ba954116616bc6a9b9cb02554552cd4f11190d5e,2017-08-29T01:31:40.507000 -CVE-2012-2717,0,0,3fcd6d356a62e7d112f06644f03c24d103866efcaa26bd2af93185d412cba615,2017-08-29T01:31:40.570000 -CVE-2012-2718,0,0,0ffa339b7c4df871df20fbf43cefecdcfea50c4e70375e8bc36f9c2f4b09cca7,2017-08-29T01:31:40.617000 -CVE-2012-2719,0,0,b9bbc6e701ffc81dfaf5e06a07bff5a7c41a3c9f0840c0256c7cebb90c37c195,2012-06-27T16:51:03.563000 -CVE-2012-2720,0,0,607552b11a61125640c524a3665fe89863133a3d154ff815d986a3d2820f57ab,2017-08-29T01:31:40.680000 -CVE-2012-2721,0,0,2e84d1c491712a234489adb66dd6e362b8a6b26a8d686fde59aaec92177b40a2,2017-08-29T01:31:40.727000 -CVE-2012-2722,0,0,8bf23039d9c0da323d26d6e61a4c59001c572df76fca2c1e40b5b3c779346460,2017-08-29T01:31:40.790000 -CVE-2012-2723,0,0,db6261a91869eb76abbd0cc75736f14a15d5a8c976d346788c20546c33c81633,2017-08-29T01:31:40.853000 +CVE-2012-2715,0,1,5b1e81576e1dc2b8f0e2e23fc1cd7fc345d2c9f04b7fa505da929b34a7bae820,2024-11-21T01:39:29.720000 +CVE-2012-2716,0,1,7ec7800098a5712dbcd56ab433a2586a73ce1de3e30789c7b43b424c5cdfb4ab,2024-11-21T01:39:29.823000 +CVE-2012-2717,0,1,cf42d9cfae22f172c1eccb384101b165af0cf9467c3ecc93a1d1d96b7f75126d,2024-11-21T01:39:29.937000 +CVE-2012-2718,0,1,46c629819b5d0490bf8e0ab2d8b1cdd3be9b6828010603ca460d4229b609b074,2024-11-21T01:39:30.057000 +CVE-2012-2719,0,1,6afa043fb2d66878ca11019c1ab031b8fac9f6b6e3bab20127bc435a1f63e4bc,2024-11-21T01:39:30.163000 +CVE-2012-2720,0,1,3b1f78d47d3d032844e0622c7442f594d2821ac006dac8639c27b64289396f7e,2024-11-21T01:39:30.287000 +CVE-2012-2721,0,1,2c53cebb082023d77db277ed5e9a0f9d25547ffd92626d72812dcfd7ea186d37,2024-11-21T01:39:30.400000 +CVE-2012-2722,0,1,fcf60e67c83994856a4e5dafec287f18b510b56ebf531eb5d3d5920ad40a5f77,2024-11-21T01:39:30.517000 +CVE-2012-2723,0,1,acffeb1a77c873356c4d608b5ebe79732764770e651d88534ba86d133d7c4976,2024-11-21T01:39:30.640000 CVE-2012-2724,0,0,d658175003bdfa366b4cc7369adc43d63424c70d6097c72a0092651a430e68ee,2020-01-28T19:42:02.137000 -CVE-2012-2725,0,0,485cf694655aafe1485db0653a69fb647cab56d889ed3e7ee888dbb02631633a,2017-08-29T01:31:40.913000 -CVE-2012-2726,0,0,c7392b22489da07b7058f34e49f33aa6a5f133c7ff5aa3a894fec6444942d56f,2017-08-29T01:31:40.977000 -CVE-2012-2727,0,0,1d645e6a0ebd03b54dca69708b8840b5586facb551fa47913a60cedcd2662324,2017-08-29T01:31:41.023000 -CVE-2012-2728,0,0,8e43a57dccc3b99d1eb0000f89652bf4a5503f591f2d77bb001b37653ef94a3d,2017-08-29T01:31:41.087000 -CVE-2012-2729,0,0,b2e7b8f53ea0feef5ade445e6e2aeaf8bb9a472a4711fdfad62d6f068ac5888f,2017-08-29T01:31:41.150000 -CVE-2012-2730,0,0,b0444748cc1230d52d90cda657e9a8e95f9f059f78affec3d43b39bb7e74bba2,2017-08-29T01:31:41.243000 -CVE-2012-2731,0,0,431b2aad8dd200d64721dbbe81b929b88791c51be27cb91198c9f7272988dd90,2017-08-29T01:31:41.290000 +CVE-2012-2725,0,1,c7456b16b3272c8b9623808a9f69111db282bd9b39f305c6e1799ac21bf52957,2024-11-21T01:39:30.887000 +CVE-2012-2726,0,1,ea080b2cc6e361c9067efe19923d66104cdb1192f8136a6162d8a69761852569,2024-11-21T01:39:31 +CVE-2012-2727,0,1,57bf0f6ba8a005ac0f58b4678a33440f55a505000b5c37af9bf37f356cc87298,2024-11-21T01:39:31.127000 +CVE-2012-2728,0,1,ccc01dca16ad3f4fe09f7ce9829e85864858fbd75f028802c12c2524da00b488,2024-11-21T01:39:31.280000 +CVE-2012-2729,0,1,cc943d7dd7f513654967a5e3b91a113ef0728accf478635dcfd737a8061fb1ae,2024-11-21T01:39:31.397000 +CVE-2012-2730,0,1,4447dde9aafa4bb1f96e464ba66b4a667a4ea5f0936855960d1631669098f6bd,2024-11-21T01:39:31.530000 +CVE-2012-2731,0,1,66909fbec53d47d09cbb1b55eeeed95671d4ad1ec746c247f8994238cc54a39e,2024-11-21T01:39:31.647000 CVE-2012-2732,0,0,db58024f8cdb9893f5622f2b5923381b17ea93b93807bf9225faf48583ef6616,2023-11-07T02:10:41.703000 CVE-2012-2733,0,0,534870b838bbff31f7b97d2e7bbbc1e2d723eaf9f7f5eb856044c80cdb7ae686,2017-09-19T01:34:58.760000 CVE-2012-2734,0,0,c90a3ca51b4adacae9dc26e3a32453cb2979febbe238bb45e60edf7a8e56b8a1,2023-02-13T04:33:46.037000 CVE-2012-2735,0,0,9f59f7d2155ab77a6fd22f9c5d25a93cfb78704c224fae4fb33e3747ef65df4f,2023-02-13T04:33:46.743000 CVE-2012-2736,0,0,4e2970e49d520c0c861357bd0ce5d97b3a44468b72a9cfe1df4543ffbf4c6e08,2020-08-18T15:05:58.063000 -CVE-2012-2737,0,0,6f6badbd18508e22bd0dddfae796eb694696c5cf7c8b2a25d760153e5635ac92,2017-08-29T01:31:41.507000 -CVE-2012-2738,0,0,1a19a0014344389d7168480fa2ad04057b0a01e0f817747607c917ed3743394a,2016-10-26T01:59:10.197000 +CVE-2012-2737,0,1,c5ecdc6fe39b34eb2e0df145ed6e18b3a37eafbf179d7677df2fea4d114c6c98,2024-11-21T01:39:32.353000 +CVE-2012-2738,0,1,90b5ca7af266fdfef8b09f9350285756defa3eeecb0bc65ad7507af59e9adc49,2024-11-21T01:39:32.507000 CVE-2012-2739,0,0,20da33698edb3494dffe2ac04db89a44da89154f7ab7c334084004a1ef77d32a,2012-11-28T13:03:09.793000 -CVE-2012-2740,0,0,bd11ccae840cbc1a3d9e6358be5e6ce837b14577429cc97833d960af199b4db8,2012-09-13T04:00:00 -CVE-2012-2741,0,0,af44ff97263d71a05d6f780535013c4e550e2dfebc25928d53d0a8a75d5b0d20,2012-09-13T04:00:00 -CVE-2012-2742,0,0,b6b3e9af9b71fcfa10926d19cf7bf7db6a31c5510833ef7da80f223775ce9936,2017-08-29T01:31:41.570000 -CVE-2012-2743,0,0,2c0020066910ccc22ee97587d9072e1c3776563eaaf00d016399a458dd682a46,2017-08-29T01:31:41.633000 -CVE-2012-2744,0,0,b21b88fac6b8d3dc1956a4def2539c1c61581b35c2d14940ce42f7e9cb499b8c,2023-02-13T04:33:47.950000 -CVE-2012-2745,0,0,d9f024f6181b59ee81b962b52be830cebbc48341a89283a75586f21400bb1188,2023-02-13T04:33:48.110000 -CVE-2012-2746,0,0,def4f5ddb1ff1b7d474f99cc0862662ec6204332c4fe73f1404feb9a406db275,2017-09-19T01:34:58.840000 -CVE-2012-2747,0,0,d212e8d6c2274f89f8e3c5e90c02eb1fc52cf6de9fac23e24babbafe40efe8d3,2020-02-25T15:48:34.643000 -CVE-2012-2748,0,0,c183ff9935c507b07da21cd2010f6e606cf722065e1fc1ea9a495ccb5b1fe3b9,2017-08-29T01:31:41.867000 -CVE-2012-2749,0,0,f5613de4a13f5d0e65304cb3184752211b6620cd8dfb00f42cb265892486102a,2019-12-17T20:23:43.220000 -CVE-2012-2750,0,0,949816d3d697d24ac6ca1b09be1919d61775c51df07c98ac666afb4709699d57,2022-06-23T16:28:47.770000 -CVE-2012-2751,0,0,bb5cc482f7d9f13f4f8275f1971f6d4667d9d1a77239134487e791f5b564dd9d,2023-11-07T02:10:42.107000 -CVE-2012-2752,0,0,0b6ce23a234ef7e4456ffdcfa5f86cc3d0989e2909ee535783a03d7429bb7d89,2017-08-29T01:31:41.947000 -CVE-2012-2753,0,0,1b1000792e21a567d5dce5353f7296d015f60f7900d0de35184aaebbe14c1241,2012-06-26T04:00:00 -CVE-2012-2759,0,0,8bc4b0e886dadc02d6f08c7d31f9ed30d0f5d0b8294d08b137cc363201f8f23f,2017-08-29T01:31:42.010000 -CVE-2012-2760,0,0,75b5c089b7b7d82e36fd6b275ad22741296261e5812024c3a6f19889516495a8,2017-08-29T01:31:42.070000 -CVE-2012-2762,0,0,c2f1dbd0f36d9911b8dcdec6b338470dfe316a52a3eb28463cfdc9c6d785bb87,2017-08-29T01:31:42.133000 -CVE-2012-2763,0,0,a3c4372297cc947d8567e84bb73c41082182514177856e8ec97819f56c2168f0,2022-02-07T17:25:39.963000 -CVE-2012-2764,0,0,0b77a527672c0bc0bf3ff2c54fa88615b91cd486f40f55041258c10d2cccc025,2017-09-19T01:34:58.900000 -CVE-2012-2768,0,0,9c52ec7446f958f15da7919428ab72ba77673a348cd8d1fbd844d94383ee97c7,2017-08-29T01:31:42.197000 -CVE-2012-2769,0,0,47034b934c50cb6eeb27138753bc8b2c79f0416b7482bf056d25b75332b478b4,2017-08-29T01:31:42.257000 -CVE-2012-2770,0,0,1a89e96ffd44e9504b1f56be5a924f9e62cca1e01283152fe2f3e3ef68a2456f,2017-08-29T01:31:42.320000 +CVE-2012-2740,0,1,b55f90554dcd18bd59be5e0ca4844f78006eac143e6fdf8dc60cdc9ed8bfc75c,2024-11-21T01:39:32.773000 +CVE-2012-2741,0,1,269aad4ddd745ac3cb9bc92ea2d6eb824c023fa9128223cb20ffc834164a1647,2024-11-21T01:39:32.907000 +CVE-2012-2742,0,1,db2dfdad46c8d6c66ce3e61fb58c450fb52b74198476194142a8126a5c97d37b,2024-11-21T01:39:33.027000 +CVE-2012-2743,0,1,4453f35cb7b4a90bdfe665d130eaba570ec7bf33bf0b8632ec6bab2676dc4261,2024-11-21T01:39:33.163000 +CVE-2012-2744,0,1,d291a433c4bbad10c0a560b5d889f09f712e99e6fbbef478b22073419098e427,2024-11-21T01:39:33.320000 +CVE-2012-2745,0,1,59741c9be094d81be01e73e0deffff52cd2fa9aae58dac281ecd3be09f4e9d49,2024-11-21T01:39:33.460000 +CVE-2012-2746,0,1,ca8115c89c97e2352fb17f33ed3d32342439d1aeca990cfe1ab2eaa1c0b55f67,2024-11-21T01:39:33.607000 +CVE-2012-2747,0,1,1293d3c0ec350b9ed794596cac6c971da9b835777e90b9cfddd1dbbf5107b0cd,2024-11-21T01:39:33.753000 +CVE-2012-2748,0,1,557cce98718f57080f92a4ec2d46e32654ae409053d5eb2a357dd4c7a87637b4,2024-11-21T01:39:33.897000 +CVE-2012-2749,0,1,42daea00117719e8db9432fa10095b1bf88b8f8dc75107a1fe9b92bbefaa88a2,2024-11-21T01:39:34.033000 +CVE-2012-2750,0,1,16144293193d3e84916cc3a394f1aecc2b15a6ef6c64f394c52be46e6e62f3a8,2024-11-21T01:39:34.183000 +CVE-2012-2751,0,1,fdbdce342469c37fbc648141095eee34cde2e3ac3d95a37a333bdfd6bdf740bc,2024-11-21T01:39:34.323000 +CVE-2012-2752,0,1,db52b15625d50a4a44a89ed9bd45f2e75f959654a3ecc9c4cbe443af02fa14aa,2024-11-21T01:39:34.480000 +CVE-2012-2753,0,1,1e6085a8def5516124257b8e4e5eecd83b705ccb1ac860954990931fe1d5ae3a,2024-11-21T01:39:34.640000 +CVE-2012-2759,0,1,56862337e3e5dfe6af6342850fd551ecf781936bd3d8fee2505e1084ae8324c7,2024-11-21T01:39:34.780000 +CVE-2012-2760,0,1,150adf9c2c0a9c9cacdb7f5d15d943632902eed3f5b98a2483554559ff78258d,2024-11-21T01:39:34.923000 +CVE-2012-2762,0,1,f2beaa8bf2210fb68b882d45e637d9c0721bb9cc361e6d27663d08b5a15b1e7f,2024-11-21T01:39:35.073000 +CVE-2012-2763,0,1,c0ceaddd332691699747d5b1ad83333b6c8452c98c3e4aa2ad4b626333a2cce9,2024-11-21T01:39:35.243000 +CVE-2012-2764,0,1,90c60a2c9381043a4d866f932722beaa5c1f5a58b65ef89bf27e8cf219ee4665,2024-11-21T01:39:35.400000 +CVE-2012-2768,0,1,91d1660ec93ad610adbffbdbc5f2f80ba269faaf50e98024f9b4c33acf1c6896,2024-11-21T01:39:35.570000 +CVE-2012-2769,0,1,f57b98176172c449bb38a6ebe6e86d5ab567e1a3bc3619ef9db364d01964924b,2024-11-21T01:39:35.703000 +CVE-2012-2770,0,1,5ede339b976cf9a58490d5b2e34aa7d9b5b6bd7e6a74f1879c2024905bf71324,2024-11-21T01:39:35.850000 CVE-2012-2771,0,0,57e7ad3e6fe16cbc73dae16374518e0de406be6fb72b29d80175bb8be00a70a5,2023-11-07T02:10:42.270000 -CVE-2012-2772,0,0,de1aff25e2d2c77161cceb7695f4ff382987937b6c78eac9fa61d668848b8b27,2023-11-07T02:10:42.530000 +CVE-2012-2772,0,1,01465131e714d5004dc47b3350630791389d9fef57991e332d259d8c395555af,2024-11-21T01:39:36.097000 CVE-2012-2773,0,0,d0a37e2d9bfbcdec10e0d3e8d4d77781dd2b84988174dfd604bff0814de37ba7,2023-11-07T02:10:42.813000 -CVE-2012-2774,0,0,3a287814cf92c6216f4425938affe889be3475f3f3946b338a5d510f914dfd42,2023-11-07T02:10:43.070000 -CVE-2012-2775,0,0,3388c467bf6ac0ebcb5778aa03a6b4ec5ebcbb0a33307f0689456a30b00f40e9,2023-11-07T02:10:43.340000 -CVE-2012-2776,0,0,9150a81fd756dd853cb682d7271f44d32e3fb95e5099aa27ae62972ffd61c3c2,2023-11-07T02:10:43.623000 -CVE-2012-2777,0,0,fa9ca884bd9c8622ba7776126b6b68a918d73bd32f80aade3aa70378abd37a18,2023-11-07T02:10:43.900000 +CVE-2012-2774,0,1,a9619d4c10fad7179ad08c842df16a4f1b647243202c418c1cc531e417ab7974,2024-11-21T01:39:36.327000 +CVE-2012-2775,0,1,85bccc5766f017e5baf9fed450f0ed0c7abcb92abd7c0b4d831446d91647a925,2024-11-21T01:39:36.447000 +CVE-2012-2776,0,1,02db5bb537c688b4055cca1d42379451dec8c4806b47062168ff0de8f5118604,2024-11-21T01:39:36.560000 +CVE-2012-2777,0,1,eb29f51dd8026a1d8a00e07cc0c440639b77cca5664905c29c7a7d735ac030ff,2024-11-21T01:39:36.677000 CVE-2012-2778,0,0,6b2e01d19c61de8917704e73c0edd5a5fccea304ef99f15a8f787c027fbf4c7f,2023-11-07T02:10:44.247000 -CVE-2012-2779,0,0,95e4c32a2516973da0e7fe13d9e15990a413574e13d1b18f1c57b693547fbab6,2023-11-07T02:10:44.503000 +CVE-2012-2779,0,1,ff5acf40c8f5fcea5b3bd84a02ad78803c6ec5cbaf15bc21ed888808c83bd92d,2024-11-21T01:39:36.927000 CVE-2012-2780,0,0,d52d363648d1e201cdd27712100302272208a45fcdaa0d93310e90b34fc0c754,2023-11-07T02:10:44.763000 CVE-2012-2781,0,0,2e9bf6a6bd07f0f762d70c308171b7313905cca80df57f796866e22f6ac5a878,2023-11-07T02:10:45.020000 -CVE-2012-2782,0,0,5481bc9f59fc278644e5ad049ad5b4f35192e30f2a709309249f84d5c422007d,2023-11-07T02:10:45.330000 -CVE-2012-2783,0,0,f2dbeb8188e12154adb17c583cc35c06ac443ed1cc32cdf7dd7db92664a1de88,2023-11-07T02:10:45.597000 -CVE-2012-2784,0,0,a42a7646a77c9713b3f507c037fc43ce07507f9b34a470d7ef2c1bf857b170a9,2023-11-07T02:10:45.877000 -CVE-2012-2785,0,0,33e4d1968128c611841a899a644310fc3cf3a3552fd18e184db8271bc0f655c0,2023-11-07T02:10:46.167000 -CVE-2012-2786,0,0,42238b4e7c423025996cee837abcf930b146b3608ac8115f9a64dc23e3236f5b,2023-11-07T02:10:46.440000 -CVE-2012-2787,0,0,b34d6d3c1a5c760f6bd27f7c255bdf0971c445c484931d8daee996826cd2baff,2023-11-07T02:10:46.723000 -CVE-2012-2788,0,0,ac5382c47a30dfad2cc62d4b77781df428cd7991623e9fd0f05ca8997b33b680,2023-11-07T02:10:47.007000 -CVE-2012-2789,0,0,b1c4dd194de2ba79bd81c9b0ed688124aa87109d7a3846a882d5803245583319,2023-11-07T02:10:47.290000 -CVE-2012-2790,0,0,80667e77c42623cd4601c634c24a1a5588d22c4a64954e4c227322bb0f8ff2c8,2023-11-07T02:10:47.560000 -CVE-2012-2791,0,0,8d896817f5b8dfd9de4186bbfd90599abd90dbee40465f23005e99e1f726d858,2023-11-07T02:10:47.837000 -CVE-2012-2792,0,0,c06b1d11c7c594dea11f2e4ab53973d3d1a0755c7fcaeed3ff152496dfaa7fc5,2023-11-07T02:10:48.133000 -CVE-2012-2793,0,0,4fe6c83a7d544ad1261de35446c2b7e843a5b9d462a9fbe9e5b2f0c1b623a117,2023-11-07T02:10:48.517000 -CVE-2012-2794,0,0,349fa248311286f63b40a7a10c4a71227f1a7dcc821ab4868a98d1515bd37ae0,2023-11-07T02:10:48.793000 -CVE-2012-2795,0,0,fc1eebf6d66e1e28a41ef524b64429c47eb2567382948427aca82c92234310b8,2023-11-07T02:10:49.117000 -CVE-2012-2796,0,0,fef8aa6e14b1942db9c16e8026fe3218ba077378ccbdef68fd649583522f61b4,2023-11-07T02:10:49.410000 -CVE-2012-2797,0,0,73c4a29041184506b826260531209e1a8dd2bfaeeae7109a33b13a70ea45b360,2023-11-07T02:10:49.680000 -CVE-2012-2798,0,0,56da2f45c559dc31dd8c856f3b16fb437f21d532700a717bee314705d0f247e6,2023-11-07T02:10:49.990000 -CVE-2012-2799,0,0,755de1b4cc763100331d40a2878404a88590139a52d782ff4b9cb39411e23bc3,2023-11-07T02:10:50.360000 -CVE-2012-2800,0,0,c4ee8fd8e46f2e867f9dbb06c223e0478f4e7db90adfce80485fcc6383676cba,2023-11-07T02:10:50.627000 -CVE-2012-2801,0,0,c777f83453af75bdda6493ab1eb921a45a5c163a0b00066cd7b12ad5e830666f,2023-11-07T02:10:50.913000 -CVE-2012-2802,0,0,8d2cf716c0717153f0bd7768e5a8e0388d42ce2926fb67c64f3ef81c4df9212d,2023-11-07T02:10:51.203000 -CVE-2012-2803,0,0,5b921be27f4ea9af459821b424d6d5d4205433d800cb88672534e55d3aa70dc5,2023-11-07T02:10:51.477000 -CVE-2012-2804,0,0,a83dc3bda68dea568ad2e69efdb4ec60c21c892ef4fdcebbdcde2b7c677f23d7,2023-11-07T02:10:51.743000 +CVE-2012-2782,0,1,c6c61b7389f1f17d7585fb32198e80195b061c1644229270b9b59e56d47a77f4,2024-11-21T01:39:37.250000 +CVE-2012-2783,0,1,606ea1c9352142267b514ed1a5da1f6ff7c3980b67470bb9a911465827b43dbb,2024-11-21T01:39:37.370000 +CVE-2012-2784,0,1,20cb03c4a4cd3ce64f350def219d996e4188e6af897ea5889e1fad450e89aaa9,2024-11-21T01:39:37.530000 +CVE-2012-2785,0,1,9e4c37a653c14fdf4ffad2ae41e9cf7bf8bc383dafeadf983eab1a685028f3ed,2024-11-21T01:39:37.673000 +CVE-2012-2786,0,1,c92ada7dc4aecbcf199a09b293055517277cda3843d5120e00b078547060cf04,2024-11-21T01:39:37.800000 +CVE-2012-2787,0,1,e60250bdad9a2980244af2039e53e41d56f444e5643126f39b8c271ce4ed82fd,2024-11-21T01:39:37.927000 +CVE-2012-2788,0,1,ea8e2c391262387ab559bf8f5b1391a85752edebcbbe380f7d868b38f1927f35,2024-11-21T01:39:38.057000 +CVE-2012-2789,0,1,db76988c32e3a51611d0c5e6e61cef6df0cd3817a1ad0ae583128b436fca2ddb,2024-11-21T01:39:38.190000 +CVE-2012-2790,0,1,499d34d85fc6ad6259a7acef597f93f41aa798e7a7443a5030d44a8bc7c24b93,2024-11-21T01:39:38.313000 +CVE-2012-2791,0,1,bd5566ac4ee4fa610606f2d002f036e3f619088d82dbda13293edc58973829d3,2024-11-21T01:39:38.433000 +CVE-2012-2792,0,1,e1ba18d24d1c7c7befa0ffbbf0b85bb281652a3fe75c41f981e925bfeb9402f0,2024-11-21T01:39:38.563000 +CVE-2012-2793,0,1,5944b368a0c02e8e5dbb8fc9e0fa068126152a2048f955f41256d6136cc0c44b,2024-11-21T01:39:38.697000 +CVE-2012-2794,0,1,46825f564944f2a7427bf1a634f274b8f37df851dd9715d7c137c4e8d50e21e4,2024-11-21T01:39:38.840000 +CVE-2012-2795,0,1,42fa3411969def8e1e364793050cd1113c5b53954b86174c1c3c4dc2e45d77c7,2024-11-21T01:39:38.977000 +CVE-2012-2796,0,1,f9d9912ed8b888aa43a52ba2ab7eaae946c276d90b5149f2fa1db41611ac1361,2024-11-21T01:39:39.100000 +CVE-2012-2797,0,1,e26c4c0bf25c04adc25dd4c2a6ac76d8105b58592d1e0de74d67f39d4ccaad82,2024-11-21T01:39:39.233000 +CVE-2012-2798,0,1,0e45097609fc585239ef6eac50ac0b35880abf59011d92c161709b92374cf0a3,2024-11-21T01:39:39.373000 +CVE-2012-2799,0,1,c7a5e5fde1c784879d4e122e6e303f8e5e3668b76e598c3e8e163b633bb13a2e,2024-11-21T01:39:39.510000 +CVE-2012-2800,0,1,f7f52e1daffabd841a264d9286beaf4637c2bf08d75a5be789e76cf78f1f7cee,2024-11-21T01:39:39.637000 +CVE-2012-2801,0,1,68efcb06787d609d9c5b1e93b43b370eaba0ea321588997bcadf84c8d08f82b8,2024-11-21T01:39:39.777000 +CVE-2012-2802,0,1,99fe25dfa32ca7751995d2cfdb0a72ca95bba0bd9a07c4af99c3763f414b5015,2024-11-21T01:39:39.927000 +CVE-2012-2803,0,1,9b23ffa170c51f8431c886e101481c1d8073cee244b4fafb60476c2d91b0da00,2024-11-21T01:39:40.050000 +CVE-2012-2804,0,1,3919e62751afc22a8c7bb52a024f2dbf128fd4b3ab172df49c7cf56f70aa3354,2024-11-21T01:39:40.187000 CVE-2012-2805,0,0,cafdf1f74b5c59fc2ce1940019d3707cafcb98d8e8e3c6403388484a5a01042e,2023-11-07T02:10:52.013000 -CVE-2012-2806,0,0,0eb57e5bc809f09e9a16492c5f698be983dfdacfcbd9e8242034598b3debbf55,2023-12-20T18:28:58.957000 -CVE-2012-2807,0,0,614d9c9a9a74a70edc0b6df7e70155e526f21b2befab3de705a9636a83c145b4,2023-11-07T02:10:52.540000 +CVE-2012-2806,0,1,ce0da91c74edeb95ec52212b2c5a1006c55e9a9ad82c373f6cdfb72e25cd4fa7,2024-11-21T01:39:40.453000 +CVE-2012-2807,0,1,e175244f39974d2c45195459f49f117adb34b04cea1e2f834f5b2f4bbd7dbed7,2024-11-21T01:39:40.580000 CVE-2012-2808,0,0,03adbb2b0872e0dddef4696c2274b5c63040224c89cef7ff5240a4c48c5a943e,2023-11-07T02:10:52.857000 -CVE-2012-2812,0,0,cfee76774320fa02fd8dbbd2cd3e5020611ac389425b7d41b84847b48e71e386,2023-11-07T02:10:53.180000 -CVE-2012-2813,0,0,cd297982c4ef14b2fb79c9bfcc2a8bb42c97936d4cec6423c84c5e6192983291,2023-11-07T02:10:53.430000 -CVE-2012-2814,0,0,68c3337a427a6a65b221af2f2dd59d5766b5e4fa837d9f38177128d283db87a7,2023-11-07T02:10:53.680000 -CVE-2012-2815,0,0,09876b073c8dd92dccbf0f3fcde577135342a345f89247a70be12d70ec424da4,2023-11-07T02:10:53.927000 -CVE-2012-2816,0,0,30c147d93b79639bf40c8261fa57d2f495e372b27097d98fdde7b3943489c6c3,2023-11-07T02:10:54.210000 -CVE-2012-2817,0,0,08c95a6f3bb941e1f2ee792bc04395527c2801f7e144848a177e690a653c0e40,2023-11-07T02:10:54.630000 -CVE-2012-2818,0,0,d29ddb718d1ebf0368124e700cdfed8875ce85365356c4dc24d433ac6d54f852,2023-11-07T02:10:55.037000 -CVE-2012-2819,0,0,f89dfbc7f506564e41695118b31e34eb6985d3cfbfab6065e78b1e98a65ca8c0,2023-11-07T02:10:55.397000 -CVE-2012-2820,0,0,283e7dc83320a516561d51a6dc86a8e9a256a5e313f2cfa02a338c8be3acf311,2023-11-07T02:10:55.763000 -CVE-2012-2821,0,0,4bb42a5cceb1d518e002ea4cd967f9786e44bfaf32a74be8095a1072bb18c76c,2023-11-07T02:10:56.170000 -CVE-2012-2822,0,0,38c9ce4c3e52b75fc16912c8e0845bec426e053c56793cf36001082bce01fe72,2023-11-07T02:10:56.577000 -CVE-2012-2823,0,0,d52044a62ffa8cffc841274f3b470cd37d171a7f64a3a72f96a508508e8b16f0,2023-11-07T02:10:56.980000 -CVE-2012-2824,0,0,83dc63162b3875cc8d40d2298b9ee95c2def1efc604c419c251f16a5c60e2ca9,2023-11-07T02:10:57.330000 -CVE-2012-2825,0,0,8eca1c08cc81d963b63ea50518a73778cb931d62a73279d102363af23eb69c94,2023-11-07T02:10:57.663000 -CVE-2012-2826,0,0,a07da16bdea7e23986cb4bb8d763114df4071f1a42629ef725f7c17e844b5dfe,2023-11-07T02:10:58.010000 -CVE-2012-2827,0,0,782b023ea026056eb51df3c7548ab1fcf6efe5dcfca0726e8b981415914e6dd8,2023-11-07T02:10:58.360000 -CVE-2012-2828,0,0,3a5f8c02e7433525936f99b69bfa3651d99c150dbb02fe16f029d001901b4050,2023-11-07T02:10:58.763000 -CVE-2012-2829,0,0,0b9f02c8d6d765d0badf670b4fc81abcf70f288cbb3e768b19c30afecd6b5d8b,2023-11-07T02:10:59.217000 -CVE-2012-2830,0,0,dca9e64cfb587d8c3ee6bac07b8d0f9b0e01057e25184c00c534ba5ffa03ac54,2023-11-07T02:10:59.630000 -CVE-2012-2831,0,0,67307e9ffa978816acd721a4ecd5a1b6ae9554dde0499c3855640f72be6e0107,2023-11-07T02:11:00.227000 -CVE-2012-2832,0,0,2ea84754c91158bfcdaef4c2e1e239e38072aeab9d9682a412eb4b7b6c5095b6,2023-11-07T02:11:00.643000 -CVE-2012-2833,0,0,36ac4bf737145e6440725d8343c836b021a2655dc90b5d31b6d2c13071c000f1,2023-11-07T02:11:01.057000 -CVE-2012-2834,0,0,0027524a637ef566f50b576778fae6f18e214dcae0d42e95dd69fe0a81b24067,2023-11-07T02:11:01.383000 -CVE-2012-2836,0,0,4c78c807890479c9fded628819236c12799991e16cf9ad01cf03308ff71a5333,2023-11-07T02:11:01.800000 -CVE-2012-2837,0,0,00fbb5161c60d55294d28d5defd093269152771900fe4f635a3b6297ebfcba34,2023-11-07T02:11:02.133000 -CVE-2012-2840,0,0,7c2875354ecd6dbe26c9007a5c4ce853761f5a77782be995b40bdd6ba5ec5835,2023-11-07T02:11:02.380000 -CVE-2012-2841,0,0,452869bb50bb5a4d22b57d8142bf63bf63527b46601006790cb72213f0740526,2023-11-07T02:11:02.633000 -CVE-2012-2842,0,0,b35fe252f8a29f6de6ffd7d5387b8e8b2129ee98acc3a786adfe5149b346efdf,2023-11-07T02:11:02.890000 -CVE-2012-2843,0,0,9132df84e0e5219d06d3c4bed0840f6063907067e17bedfb78f05032a4a0a099,2023-11-07T02:11:03.177000 -CVE-2012-2844,0,0,1f64b941f7b5660f9c1ceb2334cf4549e6f935d35e93c83b66fc65ca58b1f6c7,2023-11-07T02:11:03.603000 -CVE-2012-2845,0,0,48da7b6b69a08041842fc3a8fc6e956e96ed67324cdb6140565e568a2ecfb954,2023-11-07T02:11:03.937000 -CVE-2012-2846,0,0,4c78ea0f5167aa014799eaeca90ba33349b491d20088a36eb0b5b1fdd3624478,2023-11-07T02:11:04.360000 -CVE-2012-2847,0,0,7b980bb2129babe11e9c162ce368bdf57f1456416fc86806e528c851fcf850e1,2023-11-07T02:11:04.610000 -CVE-2012-2848,0,0,0c53dcbe9dac1f17e608512ebbd36b035a6e5c711926784ab669ea8b0109ce03,2023-11-07T02:11:05.113000 -CVE-2012-2849,0,0,9cbf55d672b3a3f7bde8e814d0f09ec3debeb23a4cd68c517dc06655714cab07,2023-11-07T02:11:05.527000 -CVE-2012-2850,0,0,74b5683f858042406607e6cbc82a153e040c76053794c54ed3a4a928b28fe283,2023-11-07T02:11:05.917000 -CVE-2012-2851,0,0,5d8af8b9a8c5d50371946274f66f779c09b73b39ffcc1291431d7a29121cbb73,2023-11-07T02:11:06.480000 -CVE-2012-2852,0,0,1dce9089179f9c2a08cdb0d88d9f8b4197d3765ae8de7aeb03454302240cd801,2023-11-07T02:11:06.883000 -CVE-2012-2853,0,0,31005f1d9b26edc4aa19daac5976dbd44fb632f3e057f6bcc66e2b26d8992fb7,2023-11-07T02:11:07.250000 -CVE-2012-2854,0,0,aeb62978d5413da4326aaa508f9b0b5a9c742e47515995b695307070525d2117,2023-11-07T02:11:07.640000 -CVE-2012-2855,0,0,5d6bc9903b36ad9b8fe389b669f98a8dfcd0395b12f34ff2ac82c369ec1a002f,2023-11-07T02:11:08.017000 -CVE-2012-2856,0,0,27606ab3f3622789529831ef61f960a48bc6a7a074709c942267a3f1887918ea,2023-11-07T02:11:08.477000 -CVE-2012-2857,0,0,b5c99eaddec886ed7ea7291e70fff45c8496c70ce443e5acbe4146d39ff4e5a3,2023-11-07T02:11:08.927000 -CVE-2012-2858,0,0,eac6a14a165ff74cf365abd9d5309a53e5424898609e84e29c2d273d26e41b00,2023-11-07T02:11:09.640000 -CVE-2012-2859,0,0,ca575ced4635dce58e893b8aaf4af0a3e0bb7d1341909311a8c8eefc347cd047,2023-11-07T02:11:10.357000 -CVE-2012-2860,0,0,8d9fa8ef8c7c95a458ebe8b088743669942250729a3909423a53eab61a406e0f,2023-11-07T02:11:10.870000 -CVE-2012-2862,0,0,937e6a6020a8201639c743ad42a3dedca565d984f4f198e337252e957e6c7b7a,2023-11-07T02:11:11.437000 -CVE-2012-2863,0,0,3b616503c38ec890bf6467916e23f94913b8bc6cfcfb1c34c230ebb66ea2d4d2,2023-11-07T02:11:11.877000 -CVE-2012-2864,0,0,328fb23e1df5c5681b82e3a8af945ee7c87265a444aff500baf0c323a1f64df7,2023-11-07T02:11:12.340000 -CVE-2012-2865,0,0,fb2f8d8533b05c93f32454a2f3b381a3fa3f658208f15c599fb3ede4502af2c8,2023-11-07T02:11:12.870000 -CVE-2012-2866,0,0,7288039b4502875e050afe6f72b4a4854384a0438f743dcbbc353aef7cb09fb3,2023-11-07T02:11:13.490000 -CVE-2012-2867,0,0,c0ffd92fd4e1b1dc95272ba49c05b8d43c37872c5b9bc43aed61c2d05e23e65d,2023-11-07T02:11:14.013000 -CVE-2012-2868,0,0,d36ef541ce6ad2c5b05ad0b6104c1002a0db468bbab99b6b304b116b1f220b43,2023-11-07T02:11:14.437000 -CVE-2012-2869,0,0,c1142679253aa34a63c84a8b0e420ce4d003a183e296f3de4fb23ef74142439f,2023-11-07T02:11:14.850000 -CVE-2012-2870,0,0,2c8e316819a21ef41829baa6ab6c11a3c008f6de60870ed657e73640c8def9e2,2023-11-07T02:11:15.267000 -CVE-2012-2871,0,0,4429d24bb88bbe88316fc8c98b3555f328af066b0915408eed88723cd2334688,2023-11-07T02:11:15.687000 -CVE-2012-2872,0,0,d6380199db8171ac17ae76c6c9d41766c0e3a4197999b7cfadb5e5f995ca9ffc,2023-11-07T02:11:16.040000 +CVE-2012-2812,0,1,274807b3e3c3666911f397c642516618dc0ca025fc0af8eea263d610e66639da,2024-11-21T01:39:40.847000 +CVE-2012-2813,0,1,f375e7878d41063b85cf73fe0dddf95d0352cce4f7742fc39d9c982ae800e95c,2024-11-21T01:39:40.967000 +CVE-2012-2814,0,1,4d3bc89b9b91fb4549405e7313d878763428be885bfe15e04aae25339b5d737d,2024-11-21T01:39:41.097000 +CVE-2012-2815,0,1,e2efe0d91c30f46426fc0df0c1c09e4ea9a59dc8090251ae4d7c738f86914600,2024-11-21T01:39:41.220000 +CVE-2012-2816,0,1,1f006ce6a6e154674067948934e78aec5589d90dec6174c833446c77a201c89a,2024-11-21T01:39:41.370000 +CVE-2012-2817,0,1,ed98abba46daaf6e4fd07fad6e2682d2376dbe2309ee037f3093a4feda7a5525,2024-11-21T01:39:41.490000 +CVE-2012-2818,0,1,a5c9ecaed3a062744e0f8501334670c3b7d2695179066b2e41a31b5e25d18a7b,2024-11-21T01:39:41.620000 +CVE-2012-2819,0,1,b91bdbf91907af62dfb29cff5747d1266a58e4e786b923c151de9e08325bba70,2024-11-21T01:39:41.750000 +CVE-2012-2820,0,1,e60e58ee13fbc728ce563d41534d3c0d32739b97e1a108908a18c1e52b5a2555,2024-11-21T01:39:41.880000 +CVE-2012-2821,0,1,b34a40ccc80ab55ec56ae11b9ca233c134e35719218e2e86695c50b8772d85cf,2024-11-21T01:39:42.003000 +CVE-2012-2822,0,1,5c278627590713f610efa3b11ab3ad25e0f1a73f5a9e468758a247bae2f99e2d,2024-11-21T01:39:42.113000 +CVE-2012-2823,0,1,9b41efcc13759541293305ba223209512318e329adb2a43b8e2222f54474356e,2024-11-21T01:39:42.233000 +CVE-2012-2824,0,1,df1d0631d703100fa82ba6122c8d72824928a6525055c6ec01cfaa56037b7b39,2024-11-21T01:39:42.353000 +CVE-2012-2825,0,1,3f79a00661702bfccd4fdf8c92d7e050800bcbc575d3cd7a38daddcffff88c32,2024-11-21T01:39:42.487000 +CVE-2012-2826,0,1,d3b800611f3a56d3de0fb39f1653d77c5daca715b94b9de71ad120a80f7eb3a0,2024-11-21T01:39:42.610000 +CVE-2012-2827,0,1,bc10791dcf051602a1ae50f72dc0625aa5b8fef16c8502f654aafd684c41a632,2024-11-21T01:39:42.753000 +CVE-2012-2828,0,1,d6c237c7ebf4919470ebf88a64ed51ddc757de0f4438e7b58527bdf7c01a6a1c,2024-11-21T01:39:42.900000 +CVE-2012-2829,0,1,1a5887f6067d2c1eec8727d2df11bfae4411f94ac9a68723a157287f9fdaa359,2024-11-21T01:39:43.020000 +CVE-2012-2830,0,1,0ab8e34e9d4cc0662acb90efd4d95637e2b38cf76c6b8436c17b9e62f8f2088f,2024-11-21T01:39:43.147000 +CVE-2012-2831,0,1,af7875cd27cbe01fbc7afac9cd557144ee2346a8e1beb41776f6d3db9903a6d1,2024-11-21T01:39:43.277000 +CVE-2012-2832,0,1,7d50a4367f81ba237582fa8b7ac93ac4932ac1009be701c75e4b66aaa5090a3e,2024-11-21T01:39:43.407000 +CVE-2012-2833,0,1,0aa91d4e2e184d739444c8750e2c64f00a0c84e4eb6e4e717706cf34f007bac8,2024-11-21T01:39:43.517000 +CVE-2012-2834,0,1,db979f6dd3b399cc61d2e1a8a5b9e685622c0767195c575b87d8e4a4d253373a,2024-11-21T01:39:43.630000 +CVE-2012-2836,0,1,24529637c9d3394fd32172bcc7082cfefe93bf712664252b2e9b17924ef61728,2024-11-21T01:39:43.747000 +CVE-2012-2837,0,1,4e2f910ee969b3e0a7e5b6482b75f5f68accfa4447fb67a6747b25d479306bf0,2024-11-21T01:39:43.870000 +CVE-2012-2840,0,1,873ff0754c1820604041c002125c1a28e7d4da887170875edf7f8bbe16bac581,2024-11-21T01:39:43.980000 +CVE-2012-2841,0,1,5e2748078879ef1254119bd6b95e7bfd209a63493f50b1874679197918c9eece,2024-11-21T01:39:44.093000 +CVE-2012-2842,0,1,00475d09318217c70ff435a7e56f7b0741f5e5e34b7e72e2aa38e59a6d61851a,2024-11-21T01:39:44.213000 +CVE-2012-2843,0,1,d54b5cc90aa0e7cf276eef156a38d490107fef62ec6ec4a6954b4562757a0384,2024-11-21T01:39:44.343000 +CVE-2012-2844,0,1,078bfb9ef3d90cc285ca5bb7bca2ef7aff595a88d3e4bb5a7cbd0ed3379c1cbf,2024-11-21T01:39:44.477000 +CVE-2012-2845,0,1,3dcf4dcede82904ccfcd8948c1a5ea331eb1d51339b6b21672305f6e77ff0ba4,2024-11-21T01:39:44.603000 +CVE-2012-2846,0,1,a3dc29a2e66cf03ef7abcf66fbf722facdf48c5075300ddd329d8cccc0935448,2024-11-21T01:39:44.720000 +CVE-2012-2847,0,1,73219d969a88b7fd11eba648d9aa870d7460c7446137532bca7cba66c49605fb,2024-11-21T01:39:44.840000 +CVE-2012-2848,0,1,5fc06ebe88232d63d815a18e9eea9e3bc96bfaef3c3f8963878fd931ec86e48b,2024-11-21T01:39:44.977000 +CVE-2012-2849,0,1,42dd2208f6114d9fdc286b45de122e9e73c343328b3145a0bbd228e0a4f3fe1a,2024-11-21T01:39:45.110000 +CVE-2012-2850,0,1,274d0bd3a7c590dc0d33c0857b642f585a6e791ac7ed4b1b87a3187dc584ba96,2024-11-21T01:39:45.243000 +CVE-2012-2851,0,1,5e59e4df5743a7b5b89099241d3099bed1b407488f0a2ba625944ccb09c29bdb,2024-11-21T01:39:45.380000 +CVE-2012-2852,0,1,8d33533cfef0205536e8f8a3a698f884f0d186a962d9ec6071af93114e62e75c,2024-11-21T01:39:45.897000 +CVE-2012-2853,0,1,95b1aac0afeaa30f34ca52dddab2f16e1c893626d4d2644a3b3159219f05801f,2024-11-21T01:39:46.017000 +CVE-2012-2854,0,1,63b959af68ac930a1658fb8d2e8581fa03e8d27d07d9fa27fdd677ce34a5a47c,2024-11-21T01:39:46.133000 +CVE-2012-2855,0,1,4f7360cd36833c21a72c11b3b1260a4303d202b6dc169035a1c9cef19da4b144,2024-11-21T01:39:46.253000 +CVE-2012-2856,0,1,a6a242f3b5e78578fa90a76f485d95e28fe0f116b415a868e2b5377aaff9fa47,2024-11-21T01:39:46.367000 +CVE-2012-2857,0,1,875f170cbc6d3eb1551a0181e28f9395009e0d47b09040a488c40693fe638651,2024-11-21T01:39:46.510000 +CVE-2012-2858,0,1,30a6cd11852690066cd7eb094ca60cf3400546665e7dae23550546fbdd2b45e2,2024-11-21T01:39:46.653000 +CVE-2012-2859,0,1,410fff88d6d623ff94dfd2f50e8afc2ce91e206e5c33e465b79824ab9cce3b4c,2024-11-21T01:39:46.783000 +CVE-2012-2860,0,1,9ab636125e1828056680e8fd000a20adf6059690ed406a2d78ea474abe2494cb,2024-11-21T01:39:46.897000 +CVE-2012-2862,0,1,20346faf8f2ef833d4eb7b75309e747753437a02480e56474c72004820b2b0b1,2024-11-21T01:39:47.023000 +CVE-2012-2863,0,1,4b9a77f5fd07f57460e4e7ce1c86956165d00fca43a9088fad297603d61a6ee5,2024-11-21T01:39:47.137000 +CVE-2012-2864,0,1,3324f88ebf6e09f725ca4214acbbe5eed21a27f78f2ea1a9037872b7c0a3cd9e,2024-11-21T01:39:47.247000 +CVE-2012-2865,0,1,cdb9064f6e1dd7c2a9d9fa6f2ea965dffef58d4370c54064049f9c0cb5290982,2024-11-21T01:39:47.370000 +CVE-2012-2866,0,1,2ab1f4460e8eab6f79010f516598c3c665b98e312fa77fc540dd335a830e3d61,2024-11-21T01:39:47.487000 +CVE-2012-2867,0,1,0598505dfbcfd49131f5b66a43d065001c5cf27e0fe7756a33f39c0d4cde8933,2024-11-21T01:39:47.617000 +CVE-2012-2868,0,1,5fa007eb62299a75a652f25c2f8d5f2602910cb2e60a935d4460a47869d2baeb,2024-11-21T01:39:47.730000 +CVE-2012-2869,0,1,7973bcb0d1748ee249a78ed2f78073f94902961eeebe2a9b359a55d6aaca15a8,2024-11-21T01:39:47.857000 +CVE-2012-2870,0,1,c27234faa372f7ffaf3fab5247089f1d5d7fab9e81eba029a37729141fd4b275,2024-11-21T01:39:48 +CVE-2012-2871,0,1,833079c7e627e439fb0384e494b26a3276e95c777e71b4903d3483de61591c86,2024-11-21T01:39:48.170000 +CVE-2012-2872,0,1,57837f722bfceefb47b46d3c95fbb362cc17a37b4c6139242a334ba2385c3888,2024-11-21T01:39:48.320000 CVE-2012-2874,0,0,4d82ba61523d54b0b51767069dca532e1275bb68d213ee2e4e9e6c63cbce73f1,2023-11-07T02:11:16.387000 CVE-2012-2875,0,0,7194df7280ec85e04ba8f287b121a4705e76a19bd47d1036bdec04a4777446d4,2023-11-07T02:11:16.800000 CVE-2012-2876,0,0,bf04f168c03b8ec16a4a2dd70e76371086f5a9860d935afce46611ee1ac17691,2023-11-07T02:11:17.163000 @@ -54436,87 +54436,87 @@ CVE-2012-2897,0,0,21b65994e06b20c88590f92b09c7099149a20cb93086fd3c788651bdc1c001 CVE-2012-2898,0,0,6a3177d4c336bd98c80eb450d1440bd53a21a7da5faca92b15f261d2b0f63dfc,2023-11-07T02:11:26.740000 CVE-2012-2899,0,0,046062db55139e0ee0dd7736931d6f28b642c3e25b268aceb5544161f3dfb8b7,2023-11-07T02:11:27.137000 CVE-2012-2900,0,0,17d13529f78bd0fc3a742d03c2575cfe5ba441a2331e30b1a3c71861737e53f4,2023-11-07T02:11:27.480000 -CVE-2012-2901,0,0,4493b945860a169a845747ef0fb0444ff7027efd480162276073491f18db6c59,2017-08-29T01:31:44.523000 -CVE-2012-2902,0,0,ce75995270eb6fd12fc85d9fcd08cc88c8c0d8875ba57a66aa4e64036e290390,2017-08-29T01:31:44.587000 -CVE-2012-2903,0,0,06ee3888adc95f921d0b6a49c156ca193d599ef41fe7e698e6c88d67620e02bc,2017-08-29T01:31:44.650000 -CVE-2012-2904,0,0,c0a406254559f3eb00db3aec380fafb258d609f0a6ff0b4e87a55362656214ed,2017-08-29T01:31:44.727000 -CVE-2012-2905,0,0,a91748c15859926cee647051bb80a78611bfa5d94eccbd470162dce24c1bfe22,2017-08-29T01:31:44.773000 -CVE-2012-2906,0,0,5ac47ed4ad19f599a611e38826c60c548f6c91cf0355e6890029c276a0f85dd9,2017-08-29T01:31:44.837000 -CVE-2012-2907,0,0,f9fad33b815b0e8b3e107e075ec930324273a4374ed00ba872eef7f7bf058299,2017-08-29T01:31:44.900000 -CVE-2012-2908,0,0,b93bc159f2b32c7bca772881e106de6d939900a36d439e3f46a02e776bf772e6,2017-08-29T01:31:44.960000 -CVE-2012-2909,0,0,3c1e510c1912316ae32fd755c4bd40ffbce35aa31ce2a7be15e805a138c4afbc,2017-08-29T01:31:45.023000 -CVE-2012-2910,0,0,acc152dd75ab82e2d9e373c09b5035b1d6ef97cb18bfa4ee9de6bcaa63e61ddd,2017-08-29T01:31:45.087000 -CVE-2012-2911,0,0,ac9f41926af2c7e700bb10efdd7190e7abff50c9cebcebf79efd852382d8e22d,2017-08-29T01:31:45.150000 -CVE-2012-2912,0,0,163efbcf8a3d2dd17f281286747322f61fbb336f3b2282a2c314b228dd1939ba,2017-08-29T01:31:45.210000 -CVE-2012-2913,0,0,d4196b055ec17c35544f47e086ab514187e4c332333d7f95d0b1f6fd1bc1030b,2017-08-29T01:31:45.273000 -CVE-2012-2914,0,0,3d4edb6ce0660e6bb1b29401d7dbf3488410a479a7fd9cecb2754b31c09339a0,2017-08-29T01:31:45.337000 -CVE-2012-2915,0,0,c199cb96ffa66439e7e384c9ddd8815f103f285f80cab7d4a20d108678ff3063,2017-08-29T01:31:45.383000 -CVE-2012-2916,0,0,eafbe72165d5e9907a92ed0dc12f1212c532e575cc192c085935d6437de526db,2017-08-29T01:31:45.447000 -CVE-2012-2917,0,0,5617d5965d8fdd5532fbfdaf00f09e21f252190f60af33e97409053427827ea1,2017-08-29T01:31:45.493000 -CVE-2012-2918,0,0,f9454ab7dd6f829a4160cc979d038e1173f83408e12e82cb294a1c68f308136b,2017-08-29T01:31:45.557000 -CVE-2012-2919,0,0,ed32bcc56448735f788cf9170b628551d5e41db0b290cfc9a20b4d7789f9a2cb,2017-08-29T01:31:45.603000 -CVE-2012-2920,0,0,153184f7ed9105e53d490f2ab400663ba9c0b797094bed4a8935a5505fd00891,2017-08-29T01:31:45.680000 -CVE-2012-2921,0,0,3ba61e2c51a0074fd1ca03d817896ca88d2a9cc13cfe4abe58bfe46a06cdbeef,2013-08-22T03:55:30.997000 -CVE-2012-2922,0,0,d62e5868bbab09d2db2a37016208e9160ef856c0c3f2d56b63bf3611b3a0a7c4,2017-08-29T01:31:45.743000 -CVE-2012-2923,0,0,1b0edf3125a323aa6b11e13588df4e327393627e8a3a8a05f503922a1e13be8e,2017-08-29T01:31:45.807000 -CVE-2012-2924,0,0,5401705295dc7be2cee6b6e50c47eb8d6cf55b82f7119ca5a0cc247776ea3e65,2017-08-29T01:31:45.853000 -CVE-2012-2925,0,0,b9a522ea1dc600bbd66d00633af45ef76ccc9afee2f1d3d7d9423566ebc29ea4,2017-08-29T01:31:45.900000 -CVE-2012-2926,0,0,13350da76b9e37413dba3fb5a0b6e80c9d1208daf703776bd6714e2d64e7050a,2021-12-13T16:01:20.207000 -CVE-2012-2927,0,0,529a0f612fba25ebb84dc0ab69ffdd7c66b11090e2b1d7714fb048b0300ea0ae,2017-08-29T01:31:46.150000 -CVE-2012-2928,0,0,e63cc4a88623dd0b55716b2ebece84c3197791f8d7129bbadb4be2d5f6c23482,2022-05-14T03:25:27.250000 +CVE-2012-2901,0,1,55ec09dd684604f8197c40f026adcda6be88f424e3d54fd33d67d13533e31ea7,2024-11-21T01:39:52.030000 +CVE-2012-2902,0,1,c65a8eb57b2d446e44effea952d8c6388f67ecc57c77b331fd45236a3b40e1e3,2024-11-21T01:39:52.177000 +CVE-2012-2903,0,1,7c30d0cf70140ec392dcc8366dd6f2b6e018befaa96732ec746ab9d30b6cee6d,2024-11-21T01:39:52.323000 +CVE-2012-2904,0,1,8ded339221f63a6335a28a559089aa197ff369f41fba36c0ba39481f81161c1e,2024-11-21T01:39:52.507000 +CVE-2012-2905,0,1,ecb33c7d326116a597d5add8aae11dac9a62c5fc6121db8de3ad6a709c6eaa5a,2024-11-21T01:39:52.650000 +CVE-2012-2906,0,1,8c381f4f53f2633f37725c277abd961b2ecd0d292a56e6165b719578249c2d15,2024-11-21T01:39:52.797000 +CVE-2012-2907,0,1,ed14ade01bfc081c193456eae6384441fd00f4c64e8fea4e21bdff0a475795a6,2024-11-21T01:39:52.940000 +CVE-2012-2908,0,1,1823e988b84bd26e0608912d57ecd5587218cc60d20c9e8aa3a1384de619eaed,2024-11-21T01:39:53.083000 +CVE-2012-2909,0,1,1fcf280a6e4701cd02ccf82649126b335fc685efa6d2a686d333d6ad2e66d8d5,2024-11-21T01:39:53.233000 +CVE-2012-2910,0,1,f8a28f0c428bb31d4c763e870b596af7837c3833555c7d10b20d6743c06b1121,2024-11-21T01:39:53.407000 +CVE-2012-2911,0,1,6606d74809d21a6b2bad5f5798294f0369e61a6603d467162751ea3f722a34b0,2024-11-21T01:39:53.530000 +CVE-2012-2912,0,1,2b001d0a9909bbd81eef6f7537fbf1d1925d3c55ffd19b36ecf2e9db61ec953c,2024-11-21T01:39:53.673000 +CVE-2012-2913,0,1,3d2588cf391f75e7c7cf1ffd257da1869e598ed1232b0cc36ae06900ad8019d4,2024-11-21T01:39:53.830000 +CVE-2012-2914,0,1,241be085aa5cac35e41790d67e73c6fa64c0ad14ca5c528a0b34c5206b83d67e,2024-11-21T01:39:53.963000 +CVE-2012-2915,0,1,b1218d56c806fc8045de3145fe7f082c12b86f14968e0917c2902b45accb8ca9,2024-11-21T01:39:54.103000 +CVE-2012-2916,0,1,e7db91d5b632257da85b43fc489932f307c5d3b20eb6e4da35b4bea217310aef,2024-11-21T01:39:54.320000 +CVE-2012-2917,0,1,db61f79090676c8725ac3d1b4aebc3757097ed3b4968213abf05e103815fb926,2024-11-21T01:39:54.623000 +CVE-2012-2918,0,1,1fbf2e41c435ac1e169c0c41e9400fe70a3fbadedee503257ddd257ac1c36f11,2024-11-21T01:39:54.863000 +CVE-2012-2919,0,1,62218a843279fda1a23ad5a2b1e38227d3d1f8c92599bf582e416f88754b1a64,2024-11-21T01:39:55.083000 +CVE-2012-2920,0,1,aa20bbf336562aa461ca8ff778b8927da9e2e5edc551556ea3038a9d8ae5ea2d,2024-11-21T01:39:55.283000 +CVE-2012-2921,0,1,5b0576488ee31190efe2903535c8eccf6b6b30d49ea27ce7936e3c1f2fc97b30,2024-11-21T01:39:55.493000 +CVE-2012-2922,0,1,bbdb63fddb379621228e20703f9e9d3c640e5b72ee58721701af806de531af34,2024-11-21T01:39:55.700000 +CVE-2012-2923,0,1,cee76dbc089e33195c944906bf703bb21d93d63e7f22bdd77f24da2f847d54d9,2024-11-21T01:39:56.520000 +CVE-2012-2924,0,1,16b9d54495e1294654587c8d1e95a0d85957e0b3a7659b13fe96cc326368d80f,2024-11-21T01:39:56.740000 +CVE-2012-2925,0,1,855a99422fb78d829e9f3b5770b68cadb6de0d1a4fbbff072c6b7ec16c2e836c,2024-11-21T01:39:56.943000 +CVE-2012-2926,0,1,67dfc27bb9181d6a256e4b7be922aceed9100b929733a08248537e9a489e1dae,2024-11-21T01:39:57.133000 +CVE-2012-2927,0,1,6f90ecc512f65e3d41c4b396cca22ba64d82235f3a20035f601bb513acf7ce7a,2024-11-21T01:39:57.370000 +CVE-2012-2928,0,1,8205cc38bcbff3e3b3fc1dee74a05470c3f60b5b6cf780526b1bc3483be4a571,2024-11-21T01:39:57.573000 CVE-2012-2930,0,0,d26ea75bf06e4dec652f2a5d3a35398b12c473192c72219b75247539ba869701,2015-04-27T14:30:34.417000 CVE-2012-2931,0,0,296ff5a6dcc70399c5777185f3b49d709e097701f01aecf15a26550a18315a9d,2020-01-22T16:26:38.433000 CVE-2012-2932,0,0,3b9c04076490069a651d74f170fc1e07b191b9c9632bda66ca2dc39b4ac9d034,2015-10-06T02:48:02.300000 CVE-2012-2934,0,0,bb660891cc8936fc0e4f66ae52298f134d100159b498ef9050ed3c65a1ad6e7e,2014-05-05T05:11:30.270000 -CVE-2012-2935,0,0,cc6def9022d09a8cfc5c735f69b7d431472d2a5db0fa7920c51d553246b78fde,2017-08-29T01:31:46.273000 -CVE-2012-2936,0,0,02391de97de7b6dd974541f5f4b1a3c603e932340b955401bfb483c5aee7e445,2017-08-29T01:31:46.320000 -CVE-2012-2937,0,0,c57fa31ac42ba509863883a0ed6cc41ecab8dda15d5876ad157ef56389120018,2017-08-29T01:31:46.383000 -CVE-2012-2938,0,0,f9e935c210d3bf2f9358d574dbddd07c4d2a4d2dc269c4193e89af74f5a27f97,2017-08-29T01:31:46.460000 -CVE-2012-2939,0,0,3f21746039359b47ecd1632a0c17d5e5ef118edc5375a67587ca040d79fc0b95,2017-08-29T01:31:46.523000 -CVE-2012-2940,0,0,d44f56345c0300f789634b585a7c72482c969971693fba2cf71f10dcd065bfae,2017-08-29T01:31:46.570000 -CVE-2012-2941,0,0,2b9a890bab219aef86a17a551f9cca249bb0df0496e5f7610dde6ebba868f5bd,2017-08-29T01:31:46.650000 -CVE-2012-2942,0,0,0eb78623ec9b3834d1b492c343ca39d472232fdbffcc08f9652e84a663c86223,2023-11-07T02:11:28.213000 -CVE-2012-2943,0,0,0767499135c00b9fd412a866c41e5fb1ec2995fb36c21f3d7557320e102fc937,2017-08-29T01:31:46.757000 -CVE-2012-2944,0,0,422e394f62a6c6efcdd756412ae6b3808b7a86f7cdb77d582b3ba7d01c151a21,2018-01-05T02:29:32.837000 +CVE-2012-2935,0,1,22c53c0a2cd5295f758d19949153506aac0e7c41396ec98cfd9c955388f7cccc,2024-11-21T01:39:58.627000 +CVE-2012-2936,0,1,3410fde4c26cbd431ecc96d17e234040dc0cca148bda73d721ebded2bb56576b,2024-11-21T01:39:58.763000 +CVE-2012-2937,0,1,1aba1086daabf66ed7d0b6ff93d0bc7e29b2401ec1a2cfe6cd7c501d6b270608,2024-11-21T01:39:58.903000 +CVE-2012-2938,0,1,b8c21d28c43540ee97ee5dcd95ba2eadc2535e2634737258241e5356b5fc1705,2024-11-21T01:39:59.057000 +CVE-2012-2939,0,1,1a02483f305963069883f37a1d8780a6f01f3f762f9107901bd33178c5778bcc,2024-11-21T01:39:59.203000 +CVE-2012-2940,0,1,e56a191cd4425eb59dd20809c19f678ccd30f3d29face5580ca5e432daee079c,2024-11-21T01:39:59.337000 +CVE-2012-2941,0,1,0f74d464c817b87f32e826cc032cf9fe5e9177fd40e5fca28de55a158013113a,2024-11-21T01:39:59.490000 +CVE-2012-2942,0,1,3c8cba3b74daa848906cb0df6e3593013e6bdde80a10cca34caacbd3f6040906,2024-11-21T01:39:59.627000 +CVE-2012-2943,0,1,4cce97dee6848bd72bca72754ae6357d0b2bf455b8206af9246d7eb9318da0af,2024-11-21T01:39:59.773000 +CVE-2012-2944,0,1,41ed17692c2a4c1d7c4f63a46ad1fda327e87e58a0857cc1dd1f5f1438564448,2024-11-21T01:39:59.910000 CVE-2012-2945,0,0,a0cbeccbe1b74716a39e13cc040f5c6d9e4724c522dfae1e2ca86a5e2d3bbf4c,2019-10-31T01:09:56.767000 -CVE-2012-2947,0,0,589189191f132548c7419c1b1d8f949215801bc7e15542e0f0e1bcd1ac30d997,2017-11-13T16:44:23.247000 -CVE-2012-2948,0,0,8492072bd0443dce647824926aa625e3846f32176f24d3aaac2e7bcbf9979981,2024-08-15T12:44:24.983000 -CVE-2012-2949,0,0,f162bd7a8ce3c5740295d8654ac1648063fb445e9c7cdeae7efe869bae08ed9b,2023-11-07T02:11:28.320000 +CVE-2012-2947,0,1,d73ce5158285fa2c26d8fccd0ac2a65782e899f562f1c23293fd4a5826762f3f,2024-11-21T01:40:00.217000 +CVE-2012-2948,0,1,6963d57b4cd30939a4551714451438feff63788867a810890ee89b1caa5a49b4,2024-11-21T01:40:00.380000 +CVE-2012-2949,0,1,822da61ee20485c223f5a2f3d5976d1bb1aad0a4b5cffa704ac9db7dc5a95f5e,2024-11-21T01:40:00.533000 CVE-2012-2950,0,0,7999b62e856fcaa9952cf2ddd7b772b30aab5f4cb3c2ddd057c3023a6eeb1357,2020-01-22T20:32:54.300000 CVE-2012-2951,0,0,10b13d4c37cc98202bf612867cec5c480c17a7ca662582155b9f66749fd011d1,2023-11-07T02:11:28.380000 -CVE-2012-2952,0,0,882e36017a0d52f922dde237c11e2f0c4cf6ea2caac3875518435217c1c35acb,2017-08-29T01:31:46.977000 -CVE-2012-2953,0,0,892a4a4c580ff99dc5b318feb2d45378d63105ddc5b321116f869129762d910c,2017-12-22T02:29:10.403000 -CVE-2012-2955,0,0,7f8630c2b43869b68e5c1da9dc996a1639f8b24773b8afaf2984de59ec809470,2017-12-22T02:29:10.463000 +CVE-2012-2952,0,1,b75ef3b06c4d91c33d130a632ef262a962d6ffd36f147f265ae6ceb48fa965a4,2024-11-21T01:40:00.837000 +CVE-2012-2953,0,1,0ad32205214f17f70b7615829a82fe3ce5fe2f47eba2990283cfabd37e0b39d2,2024-11-21T01:40:00.977000 +CVE-2012-2955,0,1,6bf1667c8e2b660ea9093c52c41ced52de9ca34940d628b8c62012d030c8acf4,2024-11-21T01:40:01.083000 CVE-2012-2956,0,0,cd2bb34997a7cf8ddd7b88f16f15c4a1cb52162a654b376f6e73706960ee8e27,2017-08-29T01:31:47.133000 -CVE-2012-2957,0,0,8efda4b1eaeef1d266f686f0d1c51388a56b4b255ce784dacf8f661df23e1395,2017-12-22T02:29:10.543000 -CVE-2012-2959,0,0,857cd59cd43753e5b0a9886a06d5ba53964af9db9b863e0df2390021d9fcd6d9,2012-06-12T04:00:00 -CVE-2012-2960,0,0,7f319ec2186c7b19b8ccc202d87492c6f8f5f4aa31ae638dc89322730bf9dc7d,2013-02-20T04:38:55.597000 -CVE-2012-2961,0,0,cf06b7f60bc9c06cf2efe80cc80a9ccbdae366af8aa66e6554e622fa54765ec2,2017-12-22T02:29:10.590000 -CVE-2012-2962,0,0,2a16711826da9093db1dda880e78aa15a7a07e84e86a02ff29c1f275c5a70f0c,2018-03-12T17:21:25.037000 -CVE-2012-2963,0,0,23fc9011cac612411c0660674155e43664710745785ea6430319de0fd5cc615a,2012-08-13T04:00:00 -CVE-2012-2964,0,0,42dcfb8a414dad3c1394c61649335386e5af79568050531329113fd67cec33d0,2012-08-13T04:00:00 -CVE-2012-2965,0,0,bd5cdf6222dd664562b76a704cf0565e1b4050c36adc73333b922365e3e75360,2012-09-04T04:00:00 -CVE-2012-2966,0,0,56d917836598b254c830c4e06b761a54e31c1719e6cfe0249f8b224b96785eab,2012-09-04T04:00:00 -CVE-2012-2967,0,0,e1e95f5b296c379349f4774476b45447d8dc40f35554e1917b21dd75d91f2826,2012-09-04T04:00:00 -CVE-2012-2968,0,0,83abf8305f089d0513de22b1c12d9a4b226ca010412aba1dc79670e062d150bc,2012-09-04T04:00:00 -CVE-2012-2969,0,0,8880a7bd43b3807efcb2ebb3be8f6ec09db2ccb9f85372f2773420ceb4926aab,2012-09-04T04:00:00 -CVE-2012-2970,0,0,99df6a9721dc2884c334b8bc6cf8953f7f64e1a4827316a646bfbdc90b7cda5e,2012-07-10T04:00:00 +CVE-2012-2957,0,1,d6249d209a4cf42fa7886397fc492a3e53c9211f1a8c6650b57a432e18e54e0f,2024-11-21T01:40:01.340000 +CVE-2012-2959,0,1,8680aef9fa384725726f54b12285f6ebcb7ed858091746423240e9813d71f47b,2024-11-21T01:40:01.457000 +CVE-2012-2960,0,1,f3e4031d0df2aaddc9def7e122bb3f18a96d8fec9b1004aa3cd5abeb904b9215,2024-11-21T01:40:01.570000 +CVE-2012-2961,0,1,556af53c85e38fcd6b4713032182781664b4b0ddf1b6d0be43c7d02fb15da024,2024-11-21T01:40:01.683000 +CVE-2012-2962,0,1,4869459dd7332131589acbcfb4c1337797ada1739304ff9cb566d2f0b3b01136,2024-11-21T01:40:01.797000 +CVE-2012-2963,0,1,0af0f7d877b32d7ef27755ad249d62d644453f112464b15bda29fb5939750488,2024-11-21T01:40:01.923000 +CVE-2012-2964,0,1,3e6c1d25b8d7c5bfdd1cb4492f7930a23859b861bfd752919e306d12b4968f64,2024-11-21T01:40:02.033000 +CVE-2012-2965,0,1,0a4d8360d0ff4ae8bf35fe46c44e681d437197c6c31e708ce1f66fd798746e4e,2024-11-21T01:40:02.143000 +CVE-2012-2966,0,1,fd07052c2f4fbd1104ac94ace2326422b65104a31be9de21f11fc49f0844ed3c,2024-11-21T01:40:02.283000 +CVE-2012-2967,0,1,e98a2bee951337af58a378e5d4edb75861aa7e3398ca0df1c0a2c14d4745706e,2024-11-21T01:40:02.413000 +CVE-2012-2968,0,1,969a89b6212c770eff0e5e06243566706188275921f672b3d7a325d5d2b0deb0,2024-11-21T01:40:02.547000 +CVE-2012-2969,0,1,cddce42df49119d0f7f7172e1f48b0d902c98fc35a2ccdc1c27cad2e660cf117,2024-11-21T01:40:02.680000 +CVE-2012-2970,0,1,a7d28cd5ded251053c9cbbc0cbf5f30d3f1712a9e20e273c9604a9a60ac6bce6,2024-11-21T01:40:02.820000 CVE-2012-2971,0,0,d532b227e4238ed781ffc09756560a8e5691a148930ae2eb4e4ffb09a1e7b554,2023-11-07T02:11:28.537000 CVE-2012-2972,0,0,91c496d55ba06a5acefdccf4c79787918f348f868b35a2c82d855ce87a580e22,2023-11-07T02:11:28.607000 -CVE-2012-2974,0,0,09fde3af3af71d5916d030dbc85ba9d844b863de4892165377f9bd89eaf74f92,2017-12-22T02:29:10.653000 -CVE-2012-2975,0,0,bd6472422ead52838e463d1baddf028593f14a44c418d8131819a0e19f37e3f1,2012-09-12T13:53:41.477000 -CVE-2012-2976,0,0,de1dd08380b34b928844d7450cb714ec5d2fedc45592e9ca8b311a39ca94842e,2017-12-22T02:29:10.700000 -CVE-2012-2977,0,0,199be3bc9919caf175a474fc3a61c926d533702d9b6432ceea2f0a300f82049f,2017-12-22T02:29:10.760000 -CVE-2012-2978,0,0,12aa9704cf93f888c8a1b3d1ef9fd8b7fbe642cb21643252ccf41d3562a97efa,2017-12-22T02:29:10.823000 +CVE-2012-2974,0,1,c2f8148336c415d933a632864fee48af648b9d0ed06ca1324d0be0b3e1443bd2,2024-11-21T01:40:03.180000 +CVE-2012-2975,0,1,f69c6abdb1be9e8913aec12c6b6d2a8a6fc78215bd6f9a28e15c8b6cd9bd784e,2024-11-21T01:40:03.313000 +CVE-2012-2976,0,1,09ee4db351ac14b4d2524b9a765450c9d6094876926bfab420836639f1bf74e0,2024-11-21T01:40:03.417000 +CVE-2012-2977,0,1,f46cd6744074bff5e528514dbd723342eea2ba933ab65f1d961253b83dbb970f,2024-11-21T01:40:03.520000 +CVE-2012-2978,0,1,4573757c84970b70813b311113b0bfbae557075ecff1527cc238b76a2b555440,2024-11-21T01:40:03.650000 CVE-2012-2979,0,0,48e43b776ba77c2ec1a9130aef5ebc3ca05670d12b1324a3773cf5d4b85f2fec,2019-11-07T19:07:01.417000 -CVE-2012-2980,0,0,bf3e2dadf474b65493f0029be1b6f25697fb9d09d424f12b4cd30ef8f5adb52a,2012-08-21T10:46:10.513000 -CVE-2012-2981,0,0,417d4b99d709808ea15c7744aaed8d71a1dde50bc7fe5586ae0673a7ff63ab91,2013-05-30T03:16:15.250000 -CVE-2012-2982,0,0,986ea9092b3e76a66baac29252adef2c309681bbb3b3e11f1bb84328ff8051ea,2013-05-30T03:16:15.323000 -CVE-2012-2983,0,0,5d41e9eba0a147c4498780389874eeeb10ef302ff61465dfb85a71aa8ea5c7d6,2013-05-30T03:16:15.400000 -CVE-2012-2984,0,0,d106afbb3c094e82519e972c069d00314e03b1305334729ede8fd105916e315b,2013-03-22T03:11:00.103000 -CVE-2012-2985,0,0,aeeb8a48d424b30a663d01316b780dad47b56410bbe7d45589e1628c24f50f13,2012-08-21T10:46:10.577000 -CVE-2012-2986,0,0,e417e9cf649d78066150e7059357244536ba4ae65c74e347f8346f6bec077d0c,2012-08-21T04:00:00 -CVE-2012-2990,0,0,84c438290e8c5ceeb2761db61ba6a038dc11710600693331f9f954542bed5341,2012-08-29T04:00:00 +CVE-2012-2980,0,1,cc7b284a8ab4ea54fff1ea65616b294edecb45f41de4b18269c00223f407379e,2024-11-21T01:40:03.917000 +CVE-2012-2981,0,1,76c39e3800cae730b19d7b7fe7403e0184b3d03d22b631cce3ea0f64861d43f9,2024-11-21T01:40:04.020000 +CVE-2012-2982,0,1,4db3472508929a27d21d8e8fd94b4405fffc817815aaaba8cd2528a1aeabebcc,2024-11-21T01:40:04.150000 +CVE-2012-2983,0,1,a92bc46e570c72ebb96eb3c5dcbf3267523865f2e03b69f23337fe96c1ea9685,2024-11-21T01:40:04.277000 +CVE-2012-2984,0,1,afee7eeec15118a51c6608656eb23c033c1902a6758cbb7dac1b0b303d54b5c9,2024-11-21T01:40:04.407000 +CVE-2012-2985,0,1,0388f265d2761b2d45166df372e8fe4666da17abae686072717f1d8fdde7f524,2024-11-21T01:40:04.533000 +CVE-2012-2986,0,1,b55d1f69a63e7756705ffebbbca4463dfa8e2a7aef99f0e5ad4ce665f921d5e4,2024-11-21T01:40:04.643000 +CVE-2012-2990,0,1,38b417a2205cf698a103c661ffec0937a968c90ab2a3cbf25191b0f9e4261aca,2024-11-21T01:40:04.750000 CVE-2012-2991,0,0,8b38dd427f562fa175bf7cc7bf536acfe660dbd2f6750a91d04cf7e1993afbf9,2013-03-02T04:42:57.600000 CVE-2012-2993,0,0,882abc6e0bc1fc2534e53b4fdb15f2a90653132989a973231b1bcd80f3ac88b5,2024-02-14T17:22:38.827000 CVE-2012-2994,0,0,643111a27786214b427e4a275698c80d92fd84b2bd1acaf37cf87b406c9718e1,2013-03-02T04:42:57.913000 @@ -54528,27 +54528,27 @@ CVE-2012-2999,0,0,53e18a46c7a83471732f99cd011e2405e814b77cd03b8763bea2ca8432240c CVE-2012-3000,0,0,03958cfbed5bcd79e9fea78a6b1e0718bb243de9402448c380959d540f7acb56,2017-08-29T01:31:47.587000 CVE-2012-3001,0,0,b2e23c71846c09574437fe42dde750954ffcdabb75c2f72ea56ccbb708183025,2013-03-02T04:42:59.277000 CVE-2012-3002,0,0,cb910f87506f2fcfa9aade90e957f5d0691c71890d3b78b67e41697e75c1f46b,2013-03-02T04:42:59.453000 -CVE-2012-3003,0,0,7e16e4000dce4f69a0d241df8fc1215692b481c87585460990ff13c85a48be20,2012-06-12T04:00:00 -CVE-2012-3004,0,0,655e8b328582c5ed4cdd291faaf4d7c76e3261969d19c273c229238359097fba,2012-09-10T04:00:00 -CVE-2012-3005,0,0,963009f5c2a91ffc5ff8e371ae2ffccdee9a9b81cfbed1c2d47c3174b8ae4384,2012-07-30T04:00:00 -CVE-2012-3006,0,0,e73027a0a413abeb23029897fb47a042af804651c3338562bad0ba80b89c2127,2019-08-29T15:42:37.633000 -CVE-2012-3007,0,0,7ce0b619227f7504b0948509683ad8999a7e15347c5019f1c936b7d3d4d1eeb7,2012-08-14T03:38:14.847000 -CVE-2012-3008,0,0,2488b3927201dfa82dc1bdd22786ab901ff2fa02c761bc1a372eda4a37a44cd6,2017-12-22T02:29:10.887000 -CVE-2012-3009,0,0,a80f94ba720ae8fe77ee7a0000da510474bd394d64d32f064b4ba32d9ffd69f5,2012-08-16T10:38:04.407000 +CVE-2012-3003,0,1,ec54d3b26c549e5d7d08d6b5e7eb5b52d5d4489b7791361e8fbe5431fd4cf716,2024-11-21T01:40:06.187000 +CVE-2012-3004,0,1,405921be91e8faebde9e7289c59a6be6b159b0e51c378b56b36849aee784523e,2024-11-21T01:40:06.297000 +CVE-2012-3005,0,1,06ff01766956a4fa7bec5dffd44e71c0d045634cc385775e6cc791b4f9654ea4,2024-11-21T01:40:06.403000 +CVE-2012-3006,0,1,02bf07646bedd31e8893334afee19b04611d6534b5e81a8a28adeb939b06a8af,2024-11-21T01:40:06.517000 +CVE-2012-3007,0,1,d341beed37a4014a04db363af69483833eb865f13f65a2bdc739b235949ccb50,2024-11-21T01:40:06.653000 +CVE-2012-3008,0,1,7d59d1267cac7c18b87d234350650c0f7837a8ba918fe5002fac6b3e977f21fa,2024-11-21T01:40:06.773000 +CVE-2012-3009,0,1,88785d3a6e91a5348e2e3b35d080b8adac32630a80a55c6e91304799d593b318,2024-11-21T01:40:06.887000 CVE-2012-3010,0,0,e4c878892f571575017ae77aa7404bc62f9e0b1ac4df809e539547dc9363e8d8,2013-04-13T02:55:01.983000 CVE-2012-3011,0,0,2369453250138eb55daac02ce9a3e19bd2b1b37a239abc83512f1e8c7ef8c3af,2013-03-02T04:43:00.637000 -CVE-2012-3012,0,0,c46a6e6545f2b23a258613862ff0e43d24854fb4855a5f0535c408fc1385fa5c,2012-09-13T04:00:00 -CVE-2012-3013,0,0,4784f211d46fbd2d632187dcc3388fea1e9d77ef5c958ad43b0336b9b669529a,2013-10-08T17:41:09.520000 -CVE-2012-3014,0,0,64feeff8f75cdb5bfd4e8318102fd513ae372f736df1f5a16de511ef18549f98,2012-09-04T11:04:49.327000 -CVE-2012-3015,0,0,9661a890b3ee146e03bd7e2f2a06007587f5bca819fdf92e00f3c1412c04a49b,2012-07-30T04:00:00 -CVE-2012-3016,0,0,c503841e828c8b32bcf67dc25261799e093b3f919ec9f7953e08b8c1870d7342,2020-04-13T13:15:12.900000 -CVE-2012-3017,0,0,03cac1702dbe9839915d9774a9daaf5dcd880b019dfcbee1dc349b535affa7bb,2020-04-13T13:15:13.307000 -CVE-2012-3018,0,0,ecd37842f4c2be9c437aa473ba7510063d29d591484854ad1644ed3f2996b182,2012-07-31T10:45:42.467000 -CVE-2012-3020,0,0,8c495b9cc5ba6e38690380a90e30b363b24db50a6a128854b7eb6be04685d532,2012-08-07T04:00:00 +CVE-2012-3012,0,1,1a73d81665e6b1d1b0fa0c7af844c7b13833c9e3935f8ebbc8482fa384eacdf5,2024-11-21T01:40:07.247000 +CVE-2012-3013,0,1,b784ceb7f7cb7d0b9c134254fb057be239b7ace31017f4863370bf35b47a56bc,2024-11-21T01:40:07.370000 +CVE-2012-3014,0,1,415c76e24cd00fe50f915781a7d86acb3cd7c2e4deffd83f6e94f4f39db26bfc,2024-11-21T01:40:07.480000 +CVE-2012-3015,0,1,55b334e87a3a1eb4ab8149af4b832db23da72e81285f1477a31a83cb9fa567eb,2024-11-21T01:40:07.597000 +CVE-2012-3016,0,1,786ed78e7fbfcda66d7ee3f233533fceeb150f85d0eb6b54b63411356d69ecec,2024-11-21T01:40:07.717000 +CVE-2012-3017,0,1,93909e0a2879c6a336185eefe9882ea6e68c339bf6baa06da1d8c454f04bbe46,2024-11-21T01:40:07.843000 +CVE-2012-3018,0,1,83f7faa9e6a87216f1e343d44f5697bfb36f433ff948580b5ea67658f12761f1,2024-11-21T01:40:07.967000 +CVE-2012-3020,0,1,e2238d015e14dc08037e58b7ad966ce730d9e908a1eeb48f44022bfa1b727067,2024-11-21T01:40:08.083000 CVE-2012-3021,0,0,3a58ed97aa63f6c304cc776f48b990e0fbd084e36fbdaae70fb17ed3605a0215,2013-04-13T02:55:02.667000 CVE-2012-3022,0,0,e75d677b5af7fe8e9e6eef40a81db7042f04777e68c8fbc2b7b1e7d552cdebab,2013-04-16T15:21:09.667000 -CVE-2012-3024,0,0,9d66e843cc6d97884a130ce0c666ca66d60796158bb441596dc779ae015986bd,2023-03-22T14:08:50.977000 -CVE-2012-3025,0,0,31da8099ec40831c08c40772da88e2b45cd7e3b2f121bd1bc6b1ea1c4761fe48,2023-03-22T14:09:30.673000 +CVE-2012-3024,0,1,55f7826dd49ad34af7fa08831e0f16bb3f0eacead71eb4da19a2c8ae96c35765,2024-11-21T01:40:08.423000 +CVE-2012-3025,0,1,2e536bf2b113e45746cc410a75c572f724bd31af6a394b8a31e61113d82c7748,2024-11-21T01:40:08.533000 CVE-2012-3026,0,0,fcdc92de4a322c7536543a1fc22ef84b205b8844ae3c24e0c4d0df3e46960425,2013-04-13T02:55:02.867000 CVE-2012-3027,0,0,7445485c5aa3e1b773efbc512835f35a84bc22f852afc2974fbdaa2d40262395,2023-11-07T02:11:29.010000 CVE-2012-3028,0,0,d8becf31e27d49a231fdb624978bc4202caf9234de9d7a5ea3c507b10f438169,2012-09-19T04:00:00 @@ -54567,56 +54567,56 @@ CVE-2012-3042,0,0,7e532d4785a69c2bfb567d685a3f13099ad619ec5ff5b23a454e81d8aa01e5 CVE-2012-3047,0,0,d8ba7d9c6e4f6f23b5e981618a1cb349dba568bd1a7db162cdac6e976a2a69a4,2013-12-12T16:56:52.033000 CVE-2012-3051,0,0,27c723e6e385a6eaf6263286acb58eab3fd2df61b5dada10e1aabce891fe00d7,2013-03-22T03:11:05.007000 CVE-2012-3052,0,0,8a652705f045431dc6795f536c4be67be1993c045ee5dbea58d2486a01668e28,2012-09-17T04:00:00 -CVE-2012-3053,0,0,a8634b2029d0a030ab730c78dc66357b90542533bab494b30c710f69561fbb68,2018-12-03T13:42:31.243000 -CVE-2012-3054,0,0,63c501c80cc2590d7f165be1575d291d3cdceb4ddf400800c5f6831d12925b6f,2018-12-03T13:49:50.237000 -CVE-2012-3055,0,0,2c9e3d0c7e7b852bd920a01082ad59cd0eae8663d029f53071e8d30727858319,2018-12-03T13:50:06.720000 -CVE-2012-3056,0,0,3b37760de3726d82fdd383b78727817c38d34f92800aba45a38f41b54477702f,2018-12-03T13:50:28.673000 -CVE-2012-3057,0,0,a24cb68710a7dddc486f6162ed32a443cefb2bc0af7083df65e516dd7f0c624b,2018-12-03T13:50:39.907000 -CVE-2012-3058,0,0,96e529401cf92ab06c43bb8d25004e654cf73fdcc5a95907486c86b6b7fa4543,2023-08-15T14:41:35.310000 +CVE-2012-3053,0,1,b38d065e228700f6d913982612a3fa7a03ea795c27570cd3415002506d4bdc6b,2024-11-21T01:40:10.403000 +CVE-2012-3054,0,1,bb345520281def817479380c5a96046bae0dad78d54aa6e18fb148bf33d66b62,2024-11-21T01:40:10.527000 +CVE-2012-3055,0,1,92c9f96d8aaa9e31c775cdb7552e90049ee795c74bb3ff4b121eff44b8ba0ef0,2024-11-21T01:40:10.643000 +CVE-2012-3056,0,1,325df0f93970351be436808fc3702e461cd2ffdf08d3a4603b33694be4c5c53d,2024-11-21T01:40:10.753000 +CVE-2012-3057,0,1,c3206a25ffb3d338c1dc6bda198039de39c1042148c609a175aa2d4d622193df,2024-11-21T01:40:10.873000 +CVE-2012-3058,0,1,e054fb83f63f1232766f0b9775303471b400fa3b05bf6e10e5bb6fbdd2c20f6f,2024-11-21T01:40:10.983000 CVE-2012-3060,0,0,710eb53480a75ba1ee81fbade3dd6802d1fb1f4cebf58da55427f5a65af8dc51,2017-08-29T01:31:47.680000 CVE-2012-3062,0,0,2a1942907fb6d0943db17e37fe98fa83168174677d56774e35c087513d973a58,2014-04-23T14:35:02.950000 -CVE-2012-3063,0,0,a2db419a8baa743600ce2803d2b3ae068ada1cd6c6612b181448c14603b2c365,2013-03-22T03:11:05.657000 -CVE-2012-3073,0,0,c6d00747ce19329f6b9190f44149b352132e0ee7770af5a62262bf4f31b811f7,2018-10-30T16:26:48.763000 -CVE-2012-3074,0,0,7544eaa09313c4beb5737adc5d4e02f7bf452a03ce3a916dd30d3ffc8ba8c837,2018-10-30T16:26:48.763000 -CVE-2012-3075,0,0,01b93b97761c093f9f1886298d35a71baa1031f5641d7c9f68df84729e9eb81e,2012-07-12T10:34:42.380000 -CVE-2012-3076,0,0,e0dca099ce2ed572195923cd27c855702ce9100055f1cef64d8bf57c07cdd5ff,2012-07-12T10:34:42.427000 +CVE-2012-3063,0,1,ca6c36bbf27fb58fa3057124fcc2cfb819e10986619c8a93a9a40b6d032162d9,2024-11-21T01:40:11.340000 +CVE-2012-3073,0,1,1094e3ad824594b1053dea4813a757753bffe8fa78af5e1a30ce3b9f71073fac,2024-11-21T01:40:11.460000 +CVE-2012-3074,0,1,6258e7ba641170ab74e09963155b25d429c4f1d5e91b4ca974edf9963a252d92,2024-11-21T01:40:11.610000 +CVE-2012-3075,0,1,56d4a312e6d28be854b69057de58229d973663795f9b1112a81d9d4d29d068c9,2024-11-21T01:40:11.740000 +CVE-2012-3076,0,1,e5724145d3b024347c209dbf3f606dd2072d04ded1709297339574955430159b,2024-11-21T01:40:11.880000 CVE-2012-3079,0,0,3c4ef531dcc54f0a4b813bc8ca41ea2f4c7a08ce23a5fe72224d3f81de615c93,2017-08-29T01:31:47.727000 CVE-2012-3088,0,0,98f34e2520111ae27f781bd7a6e6dbde7feb2141b9ebdd404bb00a42e2a8209e,2017-08-29T01:31:47.790000 CVE-2012-3094,0,0,5a8e20ecb4a3eaf1c4a5c0804afb14054e9053017000c1c1bf5b55c142cd4264,2017-08-29T01:31:47.837000 CVE-2012-3096,0,0,40921adf55274f371fd65641bf69c8a8b5713c0bd6a0122f203dca8613d2bf83,2017-08-29T01:31:47.900000 CVE-2012-3104,0,0,563a33e257c8753e4805bbd884a8558e12339b5e201f89353ea70b478543cd87,2023-11-07T02:11:30.563000 -CVE-2012-3105,0,0,7e2247e882baaf14d84990ee45c1db83091edf18216e47de1b269db29bb30718,2024-10-21T13:55:03.510000 -CVE-2012-3106,0,0,a83b8ee714f4835e115d61f59a7c972596bd0ee80f5deebea639e043f23b988a,2018-10-12T22:03:14.267000 -CVE-2012-3107,0,0,529fbf312b0fc36171f037073895ac44ee0b5e22e66f6cb96499cdf30e3b6c98,2018-10-12T22:03:15.420000 -CVE-2012-3108,0,0,c3697f228f8742f81fd37122c06c9b43b24aadda8bd246969fb26985a1ded214,2018-10-12T22:03:16.687000 -CVE-2012-3109,0,0,030bc350fa4d0858403ebb9d84f93869d2b56f3fccc2cc6a3f5b7c2c88c87105,2018-10-12T22:03:17.983000 -CVE-2012-3110,0,0,fa914131f7c7ca8ce3fbdba991569292b6864732cf15c666b294c0198e91f8de,2018-10-12T22:03:19.297000 -CVE-2012-3111,0,0,ab5478582f5f064ab64f5c89db30e045f0e43b8b659524a80b789313a66859d4,2017-08-29T01:31:48.243000 -CVE-2012-3112,0,0,4e6e002af441db2dd223df43fa004b96f89f9ad655185e0aeae93749186684c7,2017-08-29T01:31:48.307000 -CVE-2012-3113,0,0,231224ee9a1bf0f831e89d1e7962ed387ee54f929f543e14ab4114e26f8f74fa,2017-08-29T01:31:48.353000 -CVE-2012-3114,0,0,42c0d533bb772686a30b3a473a062948364dcac63dbeac7eed29d55739499915,2017-08-29T01:31:48.400000 -CVE-2012-3115,0,0,653419fe93c67f68cb9d514383dd6362a33d139a29893edfb8f16ae1f31b7903,2017-08-29T01:31:48.460000 -CVE-2012-3116,0,0,ef5958b0bfb275cacbc932c01338acfdf195a69e18eea0e6a78d238198ec0724,2017-12-22T02:29:11.043000 -CVE-2012-3117,0,0,ae67f06d2fa836fd94361bb77db277390ce2af341f00d1749f938b54ea648d8b,2017-12-22T02:29:11.107000 -CVE-2012-3118,0,0,4530cc628b7772e60a217ed4a8987a7e428395667bbc1eab0e3e62f6547cd136,2017-12-22T02:29:11.167000 -CVE-2012-3119,0,0,a1af0fab7d40b1df98e5540372a983897d9799d532070cd7340fc10671e7d13f,2017-12-22T02:29:11.213000 -CVE-2012-3120,0,0,df0a1007f867ab89f09bd0a84712ebffb7e899dfd9eabc181dfefa87831f2318,2017-08-29T01:31:48.663000 -CVE-2012-3121,0,0,6ac6a3e66a229703a88423575de3a67b196f287f23864d68d31a92d2c7de6b87,2017-08-29T01:31:48.710000 -CVE-2012-3122,0,0,f26e98f61c4a9cdcb7b0fc954e216d9b623d86eceaf050b0f37af3a2209d9368,2017-08-29T01:31:48.773000 -CVE-2012-3123,0,0,9ef927b1002d6112439ddac1e547a6974911b21e30b3d83a6f1a606047291ac9,2017-12-22T02:29:11.260000 -CVE-2012-3124,0,0,bebf26479ac250bbd66fb0695bf778b6786dd1c709e5086ecf4b3cbc1bc96516,2017-08-29T01:31:48.867000 -CVE-2012-3125,0,0,6b45fa7c9e96e7c1e92661cf2cde8d76b043c8b0ad479aa511bb2f75e366888a,2017-08-29T01:31:48.930000 -CVE-2012-3126,0,0,2eddc0b5d4256e76f6a94e7da2da9c9c0801f95b11883af193ac5356a34b292f,2017-08-29T01:31:48.977000 -CVE-2012-3127,0,0,53552b61f8d167b1db231ff84b7fb2298566b84c042cae1b62318b69f9f7381b,2017-08-29T01:31:49.040000 -CVE-2012-3128,0,0,889916aff17797126ce79b2209f20469c07fb88fbc2842c343ee27fe9472c564,2017-08-29T01:31:49.103000 -CVE-2012-3129,0,0,2bf1ea87d1d4f467f63ce8abfd1fb3e9965aa0212ea6b296651f49f7c3c06cbc,2017-08-29T01:31:49.163000 -CVE-2012-3130,0,0,0d5038848ce6ead839a2f0f80142395cdb429f4f9f84c9606a06152f3d7595e6,2017-08-29T01:31:49.227000 -CVE-2012-3131,0,0,a79ea08d7a9af23100201e6b77eb9f890a145c6a98f0cf57a1edfa4e186fddd1,2017-08-29T01:31:49.290000 -CVE-2012-3132,0,0,19fe386d928033303a98dad176e09f0d8c3018413db6f4750aa51aa48a40c828,2013-10-11T03:44:24.600000 +CVE-2012-3105,0,1,4906361628f4b55bdb5d47120a02835c3c17ba8675e2e6212641485a1956877a,2024-11-21T01:40:12.503000 +CVE-2012-3106,0,1,8459ac38a73275930bfc43e28fd43b179e32216880acea33fe55a546aa2b1f68,2024-11-21T01:40:12.690000 +CVE-2012-3107,0,1,4045711631c22dc12a2a362405c688c7f926750dabe2991fad73af9d39e2d580,2024-11-21T01:40:12.827000 +CVE-2012-3108,0,1,17d5748acd1b7975bfeeb1d80a6455c21b9df571bf541192b415b9191159b4bc,2024-11-21T01:40:12.973000 +CVE-2012-3109,0,1,9febadb3ca5c166d490ce0f847d18dd0a92efe125f32f9bbe2bda4bb92503423,2024-11-21T01:40:13.120000 +CVE-2012-3110,0,1,d95a4fcd5796d30edc67ad66dd31fa8178d7dc09133895310ee353c9bd84ac7b,2024-11-21T01:40:13.267000 +CVE-2012-3111,0,1,c11fb69671c11f7d479f509332fe01962f75c17e7defb0d8b253f7b642fdfa14,2024-11-21T01:40:13.413000 +CVE-2012-3112,0,1,6d2daa6e37ab58f134f6ff8c3ab2b1e2756258a58a66ca817191ec25ad79ef02,2024-11-21T01:40:13.537000 +CVE-2012-3113,0,1,dc8ea986652b6f04b91f0d5882e35ccb052f0823aa153d50728428712a988ef1,2024-11-21T01:40:13.657000 +CVE-2012-3114,0,1,afbef722e8b443f782c3adb3a4a451bca0d18feb05606abce1fe755b7a598031,2024-11-21T01:40:13.780000 +CVE-2012-3115,0,1,65c9a27f93a0c2aa4e3d5224f743ce925690ddb2f03a0587b68b85f050a85320,2024-11-21T01:40:13.927000 +CVE-2012-3116,0,1,cd711b6f86ab080bf09a930b9b61f02c66dcb4ce48304d10b604f41fc29b9ea7,2024-11-21T01:40:14.063000 +CVE-2012-3117,0,1,25676ecb15b3738b5a5c875d8b3d4c2700ed6e5a4472b466352a4b9bc7e91970,2024-11-21T01:40:14.187000 +CVE-2012-3118,0,1,ae6535e981eede7435789ac8c85e5525973101d09349a1f059a7b30931efda38,2024-11-21T01:40:14.307000 +CVE-2012-3119,0,1,254afc56949d19d8e5b560f9ea1903dbb282f9de548822b5c2c543ec475d0b5c,2024-11-21T01:40:14.423000 +CVE-2012-3120,0,1,cb1edc50d6080cd1a7f76bcea5f5ee256a78af706304c8e65d1f48c9723c6aa1,2024-11-21T01:40:14.560000 +CVE-2012-3121,0,1,78db0411793330d671caff4717cb9f2c81493b1e97d4948e3e84eb3ae41cace7,2024-11-21T01:40:14.690000 +CVE-2012-3122,0,1,ec4ef8187a6f8fc9479c8a1ebbf4e6034d1249f53125b1200d3eb5866b2e812c,2024-11-21T01:40:14.813000 +CVE-2012-3123,0,1,27d0f39d6b9ad9e69ca2d4398c6d06accbec113bf3a83f51d79cc3575df4c661,2024-11-21T01:40:14.943000 +CVE-2012-3124,0,1,2118db7012a0dd662c6787df8788d1c90f07d590620cb389062a851165b20cd8,2024-11-21T01:40:15.063000 +CVE-2012-3125,0,1,dd438b92c60ccd8e8acf2b82b087523649917fcd47385f0f6dd5d1ffe964e542,2024-11-21T01:40:15.190000 +CVE-2012-3126,0,1,023be9b4cbc25e8805ae60e7771ee0f4b99de346c6b5a0e520d51897162b49fa,2024-11-21T01:40:15.317000 +CVE-2012-3127,0,1,ca5d909ca54f9af7798532de3cd0379ecf8684c2c8a83fc617a5cb8b394ed48c,2024-11-21T01:40:15.437000 +CVE-2012-3128,0,1,784694b1764ce90af5b84820fdd538e491b1374596ebf1539cf4e5067d949561,2024-11-21T01:40:15.553000 +CVE-2012-3129,0,1,b0f15ea265f103065ea4365f2a03e671afbd4f1927ccc974c56ec2b3438b0932,2024-11-21T01:40:15.670000 +CVE-2012-3130,0,1,926be2f502195da42e5183f5df6fec989395cfb4289ee4d5112499b95b91c503,2024-11-21T01:40:15.803000 +CVE-2012-3131,0,1,761325c33524e1019bd0cbce2e438487e660aaf01a6a06b951a7d98d216c9b34,2024-11-21T01:40:15.930000 +CVE-2012-3132,0,1,5e47700e42fcc4442ebe7e69bc0b0df7aa8e1073da617bc545adf71a340355ab,2024-11-21T01:40:16.053000 CVE-2012-3133,0,0,e1fa9e4f44c60ab8e1d78ba17599f6e71f2170ce6d1e770c00105804a693fc12,2013-01-08T05:00:00 -CVE-2012-3134,0,0,3ee9939e2f4114e95daab02deab56e3879357b21b5ffcb63f73875d6e36dea87,2013-10-11T03:44:24.740000 -CVE-2012-3135,0,0,c33eb56ff3840029a438a3ef52e45b9a6bb3fdce7d88a4dad55637bb9f687778,2017-12-01T02:29:00.317000 -CVE-2012-3136,0,0,39ee00b2524d298df0c7bc29347970ed5048d8532a564ae614a5f382e996b1e4,2013-04-19T03:22:57.080000 +CVE-2012-3134,0,1,e1dcc3db6bbb9114749c7fd02e00c0ff818502ff133cf33dec2cdde57e079c70,2024-11-21T01:40:16.303000 +CVE-2012-3135,0,1,1e038c492e913a4765ef38bee6fda9a39dbe5ca7519cb0c87774ebdf6f2c539e,2024-11-21T01:40:16.427000 +CVE-2012-3136,0,1,0338c6fec742dbd1fdd19599b39e2f04365433a929d0a72c9c10cd1fd6f2df1e,2024-11-21T01:40:16.553000 CVE-2012-3137,0,0,cc7001fae27d0facfe506ea2ca34e79b442415287898ebe7041c0a7b4cead20e,2016-11-28T19:08:13.263000 CVE-2012-3138,0,0,2804cefb855a40857a6d2a7639e027a74d92d14de2418312958917ba8fb4e2a9,2013-10-11T03:44:25.227000 CVE-2012-3139,0,0,9b49e1094e04afbf2709c61ac9033e1db230adfb2787fdfa13342953fd2a6bab,2013-10-11T03:44:25.303000 @@ -54711,26 +54711,26 @@ CVE-2012-3227,0,0,297b42f365f33b777c3afa362c8c416091bb7c40c000c8912efdc397a3982f CVE-2012-3228,0,0,5b2181343d807cf9a51f594969da1a4cb2339476a482c57db26ecd8f18034cee,2017-08-29T01:31:51.353000 CVE-2012-3229,0,0,100685a9ee3bf518ff64921bf0617fc245904992227bf01717d81492b561c4af,2013-10-11T03:44:32.507000 CVE-2012-3230,0,0,f4f7dbaa8c1aa8235f57b02f79390bf954c8598765bf51eac62fc5e17ea89101,2013-10-11T03:44:32.587000 -CVE-2012-3231,0,0,5ef32f630939b79781cdf3085d855b7a0a0a9b4b5edeb817ab43c07fb100e69e,2012-06-28T04:00:00 -CVE-2012-3232,0,0,24be27a793c9766cab1030eb0e0a9502201b110dd980aabc1debf05a87300cb0,2012-07-02T12:22:25.990000 +CVE-2012-3231,0,1,4bb0345960f89d97801ae372e2c2383f472510434355bda460b7a5a941712a69,2024-11-21T01:40:29.137000 +CVE-2012-3232,0,1,3d4a0b2c115159df51746ccac20034d221d59ce871934f1c16ae47e724098153,2024-11-21T01:40:29.287000 CVE-2012-3233,0,0,cb81a3686dd487e7e3230b8b7c1ced4a76471fa7252589c800d84271663e782d,2017-08-29T01:31:51.400000 CVE-2012-3234,0,0,2de320be3e23867d9f6a76f3d40f46c70c8feae0bc5482866db7dc6387209c99,2017-08-29T01:31:51.460000 -CVE-2012-3236,0,0,965e2733bec119e6b9a5346c20356779c8ed21a3894fbe659de0cbf0b63a636e,2022-02-07T18:40:29.627000 -CVE-2012-3238,0,0,29fe386b3129e6dae88543210e66ad7b91b7a31782ed1c1e89a9bb8b5578828b,2012-07-10T04:00:00 -CVE-2012-3240,0,0,5e361178c1a315e4b81aef3a9a9ad501d17f75aa6ca0160242a6ac607ba01d0b,2012-07-18T04:00:00 -CVE-2012-3241,0,0,fff5d4e762a4736bc621ec454c31844c780efcad245998a97761ded390e66951,2012-07-18T04:00:00 +CVE-2012-3236,0,1,d6de497de47bbddcc66688d423692c021fb3ac46b9d9d7b4f5760ca665310015,2024-11-21T01:40:29.707000 +CVE-2012-3238,0,1,4e6376d55c73380b9e4d3cf291d8b2bfb2ad24548aa98c71bf589fd1946866dc,2024-11-21T01:40:29.847000 +CVE-2012-3240,0,1,4700a3cafc63e496bd388a459af07c1412d0dfa21c44c33dfbd0e99f24e42457,2024-11-21T01:40:29.987000 +CVE-2012-3241,0,1,dd77fd2eeb7722b19a24c6e0296a1e289dfd8b926b68596408e5da185649d9dc,2024-11-21T01:40:30.120000 CVE-2012-3243,0,0,ce35717a1b579f8c8fc788e6bdf7db4624cee1770db07156a142ae0c038ec15c,2015-05-21T16:55:01.850000 -CVE-2012-3247,0,0,523590a32e7444f2928924d9552f94314e27e52118d69b4ba5dd953737483727,2013-03-22T03:11:17.123000 -CVE-2012-3248,0,0,b7546471557893d408ff533d6d85465a17a195120db9dfc27a32bf9b358247d5,2013-03-22T03:11:17.193000 -CVE-2012-3249,0,0,ac2d199ad595a7a6eae021d5b0e26eeb51930b06ac21dce4d4de3b75587b196f,2019-10-09T23:05:16.840000 -CVE-2012-3250,0,0,101ece8510d842100da9f587e0e1ded4c3e27162ce92deb84a0e8a5b5dd25b45,2019-10-09T23:05:17.013000 -CVE-2012-3251,0,0,4e463ffbff9641b98e41110e690867eeaf24eaa41dc556a24c4701f243607a30,2019-10-09T23:05:18.623000 -CVE-2012-3252,0,0,0a8ffa52d67f552c199eab8815c7bbb90df443439be5f35793fe75de69b487bc,2013-02-02T05:05:12.380000 -CVE-2012-3253,0,0,8f52a2d1cfbda1a8351bc87afbcad0b76d1928296ab1e24eefabd3338c5aa284,2019-10-09T23:05:18.827000 -CVE-2012-3254,0,0,6e54682bb60055efb13e71cb339596f3b43e802a2700737ff53e4b3058b79b0c,2019-10-09T23:05:19.670000 -CVE-2012-3255,0,0,4f4ef81005f1651a00ed05d0e966bc10b7f6ad7a6126bc352ab777f08ed9d5ac,2013-03-22T03:11:17.687000 -CVE-2012-3256,0,0,c93a2e9763830744f4bdf390f0cd7f0b45aa23bcc3d310979c4d17684261b8fd,2013-03-22T03:11:17.757000 -CVE-2012-3257,0,0,315af10ecea9cfb6dc93be777ff0152fd44d8ba332ae157aab45d7e352919ef4,2013-03-22T03:11:17.827000 +CVE-2012-3247,0,1,4e9d2195bc0cb7924e811f18ec0d7386c9ac8643dfbd2afb9c9b6014b204931b,2024-11-21T01:40:30.387000 +CVE-2012-3248,0,1,48b31b3c5c00626744a878372c433c1f9c416ad787459f7580d985e62fa9bf0e,2024-11-21T01:40:30.490000 +CVE-2012-3249,0,1,445d7db8410b61ff018ce97aae661d5a163eb056e2c417d1fbc01783b9604f4d,2024-11-21T01:40:30.593000 +CVE-2012-3250,0,1,030e157530397f303c34d4b8075d2c2ceeb5ca47876eab8bee612b99409cdea1,2024-11-21T01:40:30.697000 +CVE-2012-3251,0,1,b8f2f4f655b773bd599501b03565b7496b202237fecf3720c0d111f5328b3f4b,2024-11-21T01:40:30.800000 +CVE-2012-3252,0,1,de121466e1dbd0a6ed470ad379a78de0d3f97ce94f6c9fa6a878040166dcff98,2024-11-21T01:40:30.917000 +CVE-2012-3253,0,1,424a252b3919e580a4b0ba542166f4f04d684a10482b35779e77649540a99097,2024-11-21T01:40:31.033000 +CVE-2012-3254,0,1,59d611a8a82017eb1b153b869d3f961b6044decae20c100d118f270e759566fe,2024-11-21T01:40:31.150000 +CVE-2012-3255,0,1,065b6a2017c282f8316739f29e36c90bde6149fb22d58ad0e32bf59348be2c13,2024-11-21T01:40:31.280000 +CVE-2012-3256,0,1,9898bc0e726a99df43c3a64ea626264a6bb6d85104bebd41f5ff21a7b1783840,2024-11-21T01:40:31.410000 +CVE-2012-3257,0,1,f2c8a203ff97ca9df33cb1fce67a990900a7a12751efa8f7324f4b165993ea9a,2024-11-21T01:40:31.523000 CVE-2012-3258,0,0,3052ea7466c07b03fc8889b21774b9f1751e2a2c764cbbaeb0dc1983b8d0254d,2017-08-29T01:31:51.617000 CVE-2012-3259,0,0,032e5cd7ca2a4b401b5eaad7c01853e2053a8a73db78fdc5aa04672c784057a1,2017-08-29T01:31:51.680000 CVE-2012-3260,0,0,4acfc81728758b84d7827c54264db5c38a0352e499c82b6088d13f14a27f38d6,2019-10-09T23:05:20.013000 @@ -54760,30 +54760,30 @@ CVE-2012-3283,0,0,8b13f512b31645c643ba2cf23d7f9c3c4255efb326d86caecbe9e6a82d9b07 CVE-2012-3284,0,0,9e758f41693cdff43ccc39d8924721e838f7b0ac18ee35a67e13d84d5c5af6c9,2019-10-09T23:05:23.903000 CVE-2012-3285,0,0,63a7c0b2056ba7dd9959adb293c1a8a31b86fe6cff26c2080e7abbf7f4f33a8b,2019-10-09T23:05:24.013000 CVE-2012-3286,0,0,50354fa4af1a9449916105bf61431f10d95dcb299e6fee686f427d8999d322bb,2019-10-09T23:05:24.107000 -CVE-2012-3287,0,0,721b85bc6b343db111ac386bac661352e8a15726a21530e3dea27d7327340ca2,2023-02-14T07:15:09.677000 -CVE-2012-3288,0,0,2c51f57a3a402cb6e7a250c75c00ffbe54338cdae3f07933d1e35155b262455f,2017-09-19T01:35:06.027000 -CVE-2012-3289,0,0,6f8c0d32c99b7542cefa821167279586197e32741b0d3e7bfe0d9f6a87976d72,2012-06-15T04:00:00 -CVE-2012-3290,0,0,ffea932f133b0032ed4e8e1c82ac372428bae1674a1e6fcf3f756b9400703eb3,2012-06-12T04:00:00 -CVE-2012-3291,0,0,fd89a2ddcd15c2c4616cfc2b38c9e7e2b29d7415466ac5627abc8ac34427c190,2018-01-05T02:29:32.897000 -CVE-2012-3292,0,0,d8cc42fada49ee7c3f08a5ca11d68a18936a286d29345fc0bde2d03207143c6a,2012-09-07T04:30:25.273000 -CVE-2012-3293,0,0,7a489dcbb6aac3918d359a151248d4d8bbe84b1f8150152306da12b754179fc4,2017-08-29T01:31:51.960000 -CVE-2012-3294,0,0,73fda039106f9fe1fd14eceb4e10b0df6b7ce0bf78d25d3c3228305d1e6cf107,2017-08-29T01:31:52.040000 -CVE-2012-3295,0,0,82514fda07fd93a9ee49ee4485a21a0505b8c308cb29bb744430e5309515ea6a,2017-08-29T01:31:52.087000 -CVE-2012-3296,0,0,8ce883564fe0af33a9795bece37d8ae4c259f3a8c14d88046f25754e74707492,2017-08-29T01:31:52.150000 +CVE-2012-3287,0,1,e6792fbfae234a1e7ca60ca46e58136da3be877acbd624c0e46ddc00bfbf69c6,2024-11-21T01:40:35.050000 +CVE-2012-3288,0,1,a596784b431bde1d4e6583d4ed396f64a717d88c69aba57143117212b326571b,2024-11-21T01:40:35.190000 +CVE-2012-3289,0,1,08b5c3bbaf3e0eb3e1e1cd99e7df31c8041d47b963227f44421ae279950ea6ac,2024-11-21T01:40:35.330000 +CVE-2012-3290,0,1,ff6611e34e12d0b3244a7d5da7a153f9d7500f49f4d411e1dfcf9893289465bc,2024-11-21T01:40:35.470000 +CVE-2012-3291,0,1,0989204288a4caa00871262c4b66c730407149b545d234ea14c6105e521b001e,2024-11-21T01:40:35.600000 +CVE-2012-3292,0,1,2e25d203ab44a844bd7280ca5fda34877c16d718fc038af8e182b89257ad072c,2024-11-21T01:40:35.740000 +CVE-2012-3293,0,1,2e5fff5c76d58824aebc337cbc6f6240748daafaaf853eda4df6d2b7d8dac0ed,2024-11-21T01:40:35.890000 +CVE-2012-3294,0,1,235794f55737a5961e2e32ddbf215c9f3706d57d1f800d800f6ed4a13ccd566c,2024-11-21T01:40:36.017000 +CVE-2012-3295,0,1,ece0077fb9346b45d25281374f218ee2e3695cd32277205163116092bfc6dca6,2024-11-21T01:40:36.137000 +CVE-2012-3296,0,1,2d7596d0be5ebdf0483742d8f806cd358f22543ce47e9b2c4abec470b49e94fb,2024-11-21T01:40:36.240000 CVE-2012-3297,0,0,10ac7125423c726a42bc4f20e2d6bbee9ee66d4eda22cf2e3312c039feee1f98,2017-08-29T01:31:52.227000 CVE-2012-3298,0,0,7847e3e968344b7065defad4aff50e3a5cc73444f0ec76082a3e305cec332330,2017-08-29T01:31:52.273000 CVE-2012-3300,0,0,fd55cf15fed5cd10c16d0e5a381af4459e0fbe28b85078ca8a36c90840d5f6cd,2017-08-29T01:31:52.337000 -CVE-2012-3301,0,0,ae7c8f3944e4709877cd2d065185648432cff3bc347620b2c7ea5f97e25e21a9,2017-08-29T01:31:52.400000 -CVE-2012-3302,0,0,139259c79de4bcf0c36073f9010a0acafb58972741b061b3e9ce4b22dedfca2d,2017-08-29T01:31:52.477000 +CVE-2012-3301,0,1,c3661eb26ba51e592c92dd26275b8c232c24a73aff419c4c112b71759d26da16,2024-11-21T01:40:36.653000 +CVE-2012-3302,0,1,3153076d5828a2dce25f9001b57015a3cece88b618f7252b7598993fb49f3eed,2024-11-21T01:40:36.750000 CVE-2012-3304,0,0,0eba28545212b9c08af895917aafe3ea9af8213b599f6dfa5559decb8f9d8915,2017-08-29T01:31:52.557000 CVE-2012-3305,0,0,8eed710026920d1da8c4aa27367b0577cc34a5ef2ddc0e7699b911393cb5cd01,2017-08-29T01:31:52.617000 CVE-2012-3306,0,0,4dcb9782354baee7210f4ff36638db3878a5f1d4144b113f1dd9ab4914fdc6f3,2017-08-29T01:31:52.680000 -CVE-2012-3308,0,0,dfae3d8dc9dac6137e9c2a114601c7c529150f47bda4e6dffa71acfe4c49d588,2017-08-29T01:31:52.743000 -CVE-2012-3309,0,0,cd621b25af7dbc559584cf04d659efff7df0e4ccecb171fdd6ed76fcc1965ef4,2017-08-29T01:31:52.790000 +CVE-2012-3308,0,1,9edb5995e3ea0dfb3a76f21edff9151e285071a7b1962268192959af19f0602a,2024-11-21T01:40:37.203000 +CVE-2012-3309,0,1,ac10a714e398a7b43bca7aa6d7fbd69b0a3644a70b4222b8eec59a9fe322949a,2024-11-21T01:40:37.310000 CVE-2012-3310,0,0,32a61c8f57b45dad3569173dfba5b1bd7c59f90df6f7d85cf2b8cea8732a0ce3,2017-08-29T01:31:52.870000 CVE-2012-3311,0,0,96c2b727f379c6061f71fac9db3f8aa21ae7b39653b1762cb900e869138e8cb6,2017-08-29T01:31:52.930000 -CVE-2012-3312,0,0,644ed47667ca6dea7c925273d20c429de1d6c84ce1b5e0ea52a47fc45bcffec1,2017-08-29T01:31:52.977000 -CVE-2012-3313,0,0,713d56a6b757038a71cdf5365f4e4e6dadf6dc6c658ba71eb6ef38f97926e638,2017-08-29T01:31:53.023000 +CVE-2012-3312,0,1,7a436909461ae4fb46747d10011990e11e6ab5f0f4e9b82d5749a0b9334c223e,2024-11-21T01:40:37.643000 +CVE-2012-3313,0,1,cb5e8871b904a8ca8ccea89ba9c1a596d81874b1a9cf7988d2045a5a52f47998,2024-11-21T01:40:37.750000 CVE-2012-3314,0,0,e25549c8c9df17a0f4b60fd831642b5e94e8f5348b581403102ec5f9305266e6,2013-02-01T04:49:16.600000 CVE-2012-3315,0,0,c99bfc9da0d0fd140e033e9bb9c76b5baab5d4b9d2b16574fb3a46136e596830,2017-08-29T01:31:53.087000 CVE-2012-3316,0,0,3ddd6b5479ac4b20e2c258b7668e5ad1d288298ca6c9ca997ae8d3bbb072d833,2017-08-29T01:31:53.180000 @@ -54793,8 +54793,8 @@ CVE-2012-3321,0,0,bd537d353ca23bdc221918259f34ae8a8d414859e88eb93f49648b0f44b654 CVE-2012-3322,0,0,be798ec8d7349d5fa29e29c339c32ebaac267782a10e66a42a07579484f8a71e,2017-08-29T01:31:53.417000 CVE-2012-3323,0,0,84e9eb08692ac9f826d873a6b7eeab43beba6bd9deca7bdf25af2988d4136681,2017-08-29T01:31:53.493000 CVE-2012-3324,0,0,cddf53b58226ad947782fa87318c0ad3255259a00e143bdfeb3fe64078c817c5,2017-08-29T01:31:53.557000 -CVE-2012-3325,0,0,7c470604f7fe55dfacaac70d011b28154117cdabbc9a3b85dd8848944aa4c09e,2017-08-29T01:31:53.633000 -CVE-2012-3326,0,0,5067a0af21dc62bf0032f277967354a9169027cd62f4c8c949c29b28ff304de4,2017-08-29T01:31:53.697000 +CVE-2012-3325,0,1,ccd48c6b7b41cfb912e781d2826b350f22d03f3b3a953e7bcf8762d1207b5cc6,2024-11-21T01:40:38.813000 +CVE-2012-3326,0,1,7fb276718853742c53c82801725c985e4abf4cc1c6b8a8f70f413b3343f44108,2024-11-21T01:40:38.933000 CVE-2012-3327,0,0,81cd7d7582d3becf53d77e833f5491aafa48a62b44aadda150061a552b043fc9,2017-08-29T01:31:53.773000 CVE-2012-3328,0,0,abc00c829bc89d9d292d92a9e6e5580e21cff3fc6076fb4e5dbbcf41a3c72690,2017-08-29T01:31:53.837000 CVE-2012-3329,0,0,d12812c2b5a68d19d58c75d017312ecd59fee324fc67a1b88fc7ea200925bed5,2017-08-29T01:31:53.900000 @@ -54808,146 +54808,146 @@ CVE-2012-3338,0,0,e9352b73e7ac6dbf080b7b51bc05abb939c65e7b244dd66a127a55447a460e CVE-2012-3340,0,0,5a6aed4b750ef2ca2bca877af3670984942bfdaedbb02332f91d1bb915e2e92b,2020-09-03T19:42:32.287000 CVE-2012-3341,0,0,41dfa6e5023de38237f054913bb9cb8a5b571e72972fc2f1c4874500634e664a,2020-09-03T19:36:03.180000 CVE-2012-3342,0,0,140fcd91810d35fbb13ec8bdfa781e3b75c17206161a5d483d5a7390d0089ea9,2022-05-13T14:52:54.587000 -CVE-2012-3343,0,0,ae3e890a350e7a9641b487529442477db6e74b7463309f22631fac1452d576bc,2012-06-11T04:00:00 -CVE-2012-3345,0,0,90fca5d776433abba8a6ca11e98d6a2d710b71ff9e08fdd1f27c33ab4680052e,2017-07-01T01:29:01.763000 -CVE-2012-3347,0,0,5d6fc66545ef8daa3b9d5bf51055afeb6fd2ad44227a76188164844ef2c002b5,2012-09-29T03:19:08.393000 -CVE-2012-3350,0,0,22f61852bf40406b462fd291c3258c863de6d7aa53451021ee87a6fabf90f830,2018-05-29T14:16:14.340000 +CVE-2012-3343,0,1,e01d0d080509ad331cc26c4fac9f26f61901f2889eb00e893ed660ba33e436c0,2024-11-21T01:40:40.647000 +CVE-2012-3345,0,1,07f873b6d231b38465f3b6913c0aa9733e6a9a49e677e6f7777a6225f0644009,2024-11-21T01:40:40.787000 +CVE-2012-3347,0,1,47395c2a65e4e687d87930a1efea04efd6eef8ab1f74451589600cfdcca8422c,2024-11-21T01:40:40.923000 +CVE-2012-3350,0,1,cf9c833af24a41811cd02ef236f594fc44b8f6a1e264737c7b571f5a63d7dd65,2024-11-21T01:40:41.067000 CVE-2012-3351,0,0,b294a23f007535701ea75ca55356fbc2efe7be48252391bd60a0fb6877207d2d,2020-02-24T22:45:09.610000 CVE-2012-3353,0,0,e3271df903dfd68c9341073c6a8a38a79c35471bb52b6c57de45e06f43dde24e,2023-11-07T02:11:32.967000 CVE-2012-3354,0,0,587a0133f9493fa9c16d0298994ac71eac574d24150324774746d0387e62e394,2013-12-13T05:02:31.950000 -CVE-2012-3355,0,0,d7207521f0fabed848fffa496c39b688596fd1908d6192f01701f2afef5e8b31,2017-08-29T01:31:54.227000 -CVE-2012-3356,0,0,8c0413c35a578ffab4a1ff3c9603ffe74903d4d818ae5dfb34ceb45b24ec1380,2023-02-13T04:33:48.863000 -CVE-2012-3357,0,0,b01749e7c2c95fddcdc22cec0b2b10a559df794791824dd613db682d6331c566,2017-08-29T01:31:54.383000 -CVE-2012-3358,0,0,212052b461c08c6b44b539937a693f3f3ea2b6ab3dedd63ff2ae3408d43f0b34,2023-02-13T04:33:50.803000 +CVE-2012-3355,0,1,b4bf83d8e5b2e6611c49e54dafe33486caf80c36c458c8b8b755f8b5d607154d,2024-11-21T01:40:41.633000 +CVE-2012-3356,0,1,a6a09c54cc2c51f6df6e483c7741649170068d2a39d4e42412e3b122e3fa18ed,2024-11-21T01:40:41.770000 +CVE-2012-3357,0,1,6a708631bd583b56d61377149a8430c80028a6083c66e023bac29987a131fde8,2024-11-21T01:40:41.910000 +CVE-2012-3358,0,1,36bb1c20603b046a6c3de9229ff443457a1a8912c7d6d7ac3aaf081f4fb1d470,2024-11-21T01:40:42.040000 CVE-2012-3359,0,0,d8f1125c1ad5a30034c44dfcbdc2edc959668b8e6794ca9bdad6b3c727ecc9b2,2023-11-07T02:11:33.080000 -CVE-2012-3360,0,0,5d97c41879b415d1b03263f8f9690675d1395243831bc69457b4a6d596a82df8,2012-08-17T03:53:53.473000 -CVE-2012-3361,0,0,94e4068b8ece8da5b9a76fb1bcb686d33e46ba90163de7bbc05556e7878f8733,2012-08-17T03:53:53.677000 -CVE-2012-3362,0,0,d910e01e74b1b3ae1b6ec2ed610cad1a3143c4f3d1384a4e3733da7e28fdd72b,2012-07-27T03:40:39.460000 +CVE-2012-3360,0,1,4cac133dd1a77e2f311a7f41bededc25e597350c432b32f481c109aa86751f4c,2024-11-21T01:40:42.273000 +CVE-2012-3361,0,1,c6c1cc31a57e7708301b6da3fea74d16cef64e35d046f6f3cf9f6cc9e5ead71b,2024-11-21T01:40:42.420000 +CVE-2012-3362,0,1,73edb4e7d5074ffca0940e794cd47fbb30413959284908ea0dd88b398509099e,2024-11-21T01:40:42.547000 CVE-2012-3363,0,0,1e0000e3915d176d03a9196df64a78ac8ea675bc0ad39576c3db7960ac79fadc,2024-02-15T03:20:09.587000 CVE-2012-3364,0,0,afbf84dd8007930fed84e9f680674b74b220d5ba5b40fbdc3a2c6c321a68eed6,2023-02-13T04:33:51.147000 -CVE-2012-3365,0,0,7ba2bd6f7c0d5fa693748588c03dd1862f840bc925be71b452fddb794f9bafb2,2017-12-01T02:29:00.397000 -CVE-2012-3366,0,0,1b8b596322e59b818c8060d79036cf2778808d85b1aa6fd422315499b7278e59,2017-08-29T01:31:54.507000 -CVE-2012-3367,0,0,03a2dbda4ed50e82bc27b4c5ab353f14cb1b2b9876659b1dd1d139c313937870,2017-08-29T01:31:54.587000 -CVE-2012-3368,0,0,37970cf8f1abd85113f6e8c3dacd38b41ebb3ac9a1902edec819b4602b037549,2012-07-04T04:00:00 +CVE-2012-3365,0,1,3082cd1f1e08fefb5826f9bab2d870bdf4020d4dbb38ec458887f7c44bdf8c2c,2024-11-21T01:40:42.950000 +CVE-2012-3366,0,1,82512261cdd403573b92cd373741efdbf84096c906d5062946fda0644b8d4945,2024-11-21T01:40:43.083000 +CVE-2012-3367,0,1,cedaf2bb72555eded5c49c546faec8c589d7654323a3c3bdee25e5a80376eb5a,2024-11-21T01:40:43.213000 +CVE-2012-3368,0,1,275e796f691a074f27744679fdce08d4aebff869c8e9187828d0db200c555aeb,2024-11-21T01:40:43.347000 CVE-2012-3369,0,0,ba9b2d11fd31788dad7b6e9c251d695b076ef347eab4fb797e16f3dac770d70a,2017-08-29T01:31:54.667000 CVE-2012-3370,0,0,07d5dcab2711dfd40a95b16ea28ce9c4b27abefe61721cf5dce7fa48e3c84e82,2017-08-29T01:31:54.757000 -CVE-2012-3371,0,0,f4005c25143587aa16e378cf20fa39827077c99742ac350fe95de6ab360a31e3,2012-08-24T04:00:00 -CVE-2012-3372,0,0,8c112a50d98313d4fa18d6ae1317e1fa78e8c76d97cceca067050afcdf421d15,2024-08-06T20:15:35.837000 +CVE-2012-3371,0,1,b7cffccda4c8a697a50bca0497d898321af2f61b09dd15a22002639d5f62f126,2024-11-21T01:40:43.773000 +CVE-2012-3372,0,1,47290dfea52a184a3bf8e6d7a2d137b9ce085c2a2a62e074747aa2d65b652c90,2024-11-21T01:40:43.900000 CVE-2012-3373,0,0,f9d67617343679e70421a9ddcaaebe2ce08daae77671de5b05d1d86d8e5dd5ae,2017-08-29T01:31:54.837000 -CVE-2012-3374,0,0,62198125674605a12ab490411e434f6b61dca51d46748a377bf6aeac9e4aae76,2017-12-01T02:29:00.473000 +CVE-2012-3374,0,1,325241eed750f706302e0adf77ddc4a6f3c88d168c2070fa9803efe5b555ae93,2024-11-21T01:40:44.163000 CVE-2012-3375,0,0,f5e4cdda6f2175feef7f85e7c0d83e4bce457d49e4214366a421d937916929ed,2023-11-07T02:11:33.317000 -CVE-2012-3376,0,0,6c229c0b42bd0a911cbd7c856723f4b9e25a9a31f27842c4e7af21986a2e21c5,2017-03-24T01:59:00.390000 -CVE-2012-3377,0,0,25cac3db13f9c47a27c3c6171cb3a355aa9ce438b70bb130c036f698e1532cd4,2023-11-07T02:11:33.393000 -CVE-2012-3378,0,0,c9db6b2a82703949da2ef70ad02d2d2e915b26976782004fad1ecf069f7005d9,2012-09-05T04:00:00 +CVE-2012-3376,0,1,7a614d52b66588e5d3527ff6f0aa2e7b97ee25652d7f5b5e6f927461c1760b7a,2024-11-21T01:40:44.443000 +CVE-2012-3377,0,1,34eecd8cc2e4bb29cd1184775166bfa8cef0f690897f01541c5f2d612e484373,2024-11-21T01:40:44.580000 +CVE-2012-3378,0,1,1134c07c0b84657cb12914c3c509c3bbaa9977f094aca34848c30bb5075c2a36,2024-11-21T01:40:44.733000 CVE-2012-3379,0,0,6bd33f10e6421261304c8e33aeffe4550f4a301b5a3359a7cf31b1385ecd5511,2023-11-07T02:11:33.580000 -CVE-2012-3380,0,0,3e6b3fc08adeec57219a02e8d395db3c79e4995012045d01f06c5cf697a3bd7e,2023-10-17T17:00:32.600000 -CVE-2012-3381,0,0,3640c6a9281b874b3aa8ed9b940e47bef460f35ff71acefc224cea240b479fc6,2012-08-17T14:20:17.543000 -CVE-2012-3382,0,0,e6be4dd775dd3bf096a011f77ef1459f4c5e988ec6c030fad678083c497e54b3,2013-04-05T03:11:57.297000 -CVE-2012-3383,0,0,65e369126b2919dd2e1c503ca548eae1dc093b1cae11727cb41c0e42ae3455a3,2012-09-18T03:35:06.537000 -CVE-2012-3384,0,0,1ae70b914221162788c0d42c3a9bfc6792285816b462d74796df123fe4827d0f,2012-08-09T04:00:00 -CVE-2012-3385,0,0,3114a2023f47912e35541469b4130f52eed09eb2f589c7686780c9b99142c79e,2012-07-23T19:03:10.717000 -CVE-2012-3386,0,0,d5bb8612aa84875726796932ec3bd9a4e23cc42fc48f759ec1a319957ab8f710,2023-02-13T04:33:53.380000 -CVE-2012-3387,0,0,5d1e0412108cb6ee73c5cfb92c32b61de8f6a014ee199c1cb0a20e94206904c9,2020-12-01T14:52:17.767000 -CVE-2012-3388,0,0,cb39dde3ccc266ebaa9c5297f387c446d866e2b90b98597a1d0c1049058f5532,2020-12-01T14:52:17.767000 -CVE-2012-3389,0,0,ec84103d077c06f437ab21e47f6e3f58d43a68567015ca9a9ed31c7d59c9c300,2020-12-01T14:52:17.767000 -CVE-2012-3390,0,0,093d8de63eb9d7e18414c53667c6df815824c31501cc48f6689ca6ea49543077,2023-02-13T04:33:53.810000 -CVE-2012-3391,0,0,302a963df64712602d52b1c83ec1694e0481b74e5e39a75215f7c763528818ff,2020-12-01T14:43:58.053000 -CVE-2012-3392,0,0,e2f96ff4618a5fd24c85b076a81d59f08c38cb5b2a66f14ddb3164e4cf7c13ff,2020-12-01T14:43:58.053000 -CVE-2012-3393,0,0,50159c5787dfbee2ba0844406b3fcdca3ff3052ee5842d545534f1a91538feff,2020-12-01T14:43:58.053000 -CVE-2012-3394,0,0,e017db2b946b1e86238f0f2bba1c4e7a24e4402d8cdd886a34251db62ff55af5,2023-02-13T04:34:19.847000 -CVE-2012-3395,0,0,7d0c0c10a9eae5024ed0aed7a6e72d984d024f4b6d9816223fe8509bc552406d,2020-12-01T14:43:58.053000 -CVE-2012-3396,0,0,02b7613f7d2a1c08e038a324ed5217d74f55b54b54b35b6ca2757231f0ecaee3,2023-11-07T02:11:33.920000 -CVE-2012-3397,0,0,e49650fbce7940338dcfc5f07a5c7ac85b67df922eb671f57e666e87ed507775,2020-12-01T14:52:17.767000 -CVE-2012-3398,0,0,521feb5ecd618954e9ef50d8efa9681a271126175934feed40fd106d0fc73f67,2020-12-01T14:43:58.053000 -CVE-2012-3399,0,0,e86c13758b3121f951d1b1bc9f35b09d3ece82891dc4448a73f01a68f24480fe,2017-08-29T01:31:54.917000 +CVE-2012-3380,0,1,cd8ee4b4523e3301d680d9bb39efd343edf45f487971463c1589a1d3b7f97193,2024-11-21T01:40:44.870000 +CVE-2012-3381,0,1,cf4ccf9386c9dce4513730b889c9a164d53b3b72dd8da8debb64caa304a0b655,2024-11-21T01:40:44.987000 +CVE-2012-3382,0,1,b06d18f069bbb2decc4b22c384d9072b8e1cf439891e4f7baf2da706b9673ed0,2024-11-21T01:40:45.110000 +CVE-2012-3383,0,1,8f07a2ddf6b7e1716b785657a16aa1a3c70787ceb8b137f19efff2af6d630bc0,2024-11-21T01:40:45.250000 +CVE-2012-3384,0,1,7ec2be2a76dd794da7f9d07cb72a37d1f6f05689c65eae75e90235cba1e54549,2024-11-21T01:40:45.393000 +CVE-2012-3385,0,1,3eb25c21afdb5f732723455cca9a879bcac39541ae25eb561c4416176d0e2c49,2024-11-21T01:40:45.533000 +CVE-2012-3386,0,1,ad5051813190a0a00af842d94d3c7c990848c7adac7cae578b257ac6cb7351e9,2024-11-21T01:40:45.690000 +CVE-2012-3387,0,1,348c5751916bb36a3572a06e9318c97a8397755ac1e97941f4b7863028d5f6b5,2024-11-21T01:40:45.840000 +CVE-2012-3388,0,1,9b9f32ee86cce5880e5e8efb9670e69ca1417439b278be6b46d3e7dc85d662f6,2024-11-21T01:40:45.967000 +CVE-2012-3389,0,1,0f46c86ab0a239bfe4faff061eb68d87a26ac07dc08b92c27000c94de0ed4f74,2024-11-21T01:40:46.087000 +CVE-2012-3390,0,1,73cf8014f1948ebed78211b2f76b6f72e78501628e1105ec7f28049fbaf0ebf2,2024-11-21T01:40:46.210000 +CVE-2012-3391,0,1,e2b9a04ee7cb14573a4b1ee20f9cc40fd8e8f5bc554de8941fc0ff48f6e9c32c,2024-11-21T01:40:46.333000 +CVE-2012-3392,0,1,6bc694daf3446b6a9621183bc6271f49d1c68966a8b80c243f159861573342d2,2024-11-21T01:40:46.453000 +CVE-2012-3393,0,1,24b98843d4e54b1e284cd6c7537c963a740e05dbb7212c9468c3630db1553c4b,2024-11-21T01:40:46.580000 +CVE-2012-3394,0,1,4b81af41f934eb5e68a2ebefbad0df860cea68c84348bd180bb0b2bd02070a5a,2024-11-21T01:40:46.703000 +CVE-2012-3395,0,1,22d6033322fec46d6dd63fab9ce2d72dd9da69215269e598fb2b84db0ad7c2ad,2024-11-21T01:40:46.830000 +CVE-2012-3396,0,1,79e418f282b63ecf466a4a828edd0956a816118fd8320f9edf0f058f5fd95911,2024-11-21T01:40:46.957000 +CVE-2012-3397,0,1,6e198a136fb1e56b18dece3e2cc131e2c58d580a443ef22adaa55bc9eadedfa6,2024-11-21T01:40:47.083000 +CVE-2012-3398,0,1,29f8f447b78ab805b6aa2f1899e787cb53ca5da22b716c9aa5acfa541fc18c79,2024-11-21T01:40:47.217000 +CVE-2012-3399,0,1,caedd1db862e1abd051bc769639468736636b810bd67aa4deb0df3c947ac41eb,2024-11-21T01:40:47.343000 CVE-2012-3400,0,0,c476ab4fb0b28bfdd761dfd25fe98542c3cd3615a8d2830fa53e021f5a0e0780,2023-02-13T04:34:20.577000 -CVE-2012-3401,0,0,dbb001d4e25e286cfc0cd778471cd81729cea8b0e2d36e5e753aaa13658bca61,2023-02-13T00:25:23.867000 -CVE-2012-3402,0,0,e026046a10272f1ec22600951c21cb04871c6084401f1c3a8f02c1e04118c8e3,2023-02-13T00:25:24.437000 -CVE-2012-3403,0,0,106326c6fb54cf1fef7310edd07411938f8017c7e6634806a8279fcb46a00429,2023-02-13T00:25:24.933000 +CVE-2012-3401,0,1,031ee12f7ca40395643c7c9ff9e4e8a76c15b9c625ad1f76ffa4c1a87907c6d9,2024-11-21T01:40:47.657000 +CVE-2012-3402,0,1,9f067a23ffd516da1ebf4a271c6f92b08bbf0a3f8fed96c72f751b53c5a88bd3,2024-11-21T01:40:47.820000 +CVE-2012-3403,0,1,d7cd0797821be9e829eeef1f924505e6c77fb34eafa1effabb781eead6434363,2024-11-21T01:40:47.957000 CVE-2012-3404,0,0,ab552e432c9f2354b54385d775807ac8da55668cec0e156de08296be9096bdd8,2019-04-22T17:48:00.643000 CVE-2012-3405,0,0,e0f304edb13b5e57beab153d0d6d6081c610f8e97e53e5dd1a32ee31fbfb1769,2019-04-22T17:48:00.643000 CVE-2012-3406,0,0,6f75d892f3fd1678b77e173d1151b1e74f3d23982382935fbca314936eb84dfe,2019-04-22T17:48:00.643000 CVE-2012-3407,0,0,0010297b4375979240ccbb155f074534e5c69b1ba00a13b483b3cfbf2210f3a4,2019-11-25T19:32:34.213000 -CVE-2012-3408,0,0,92614bc92eb70ae8bb5858ff4c33179f1c6d16bccd41bfa1dd347986799660a2,2022-01-24T16:46:02.250000 +CVE-2012-3408,0,1,469cf03b148363abf0906a4c10a323fc55f365dad2516621081f34c988b26cf3,2024-11-21T01:40:48.643000 CVE-2012-3409,0,0,46b6fbee599dab65191fbcb6de8cc2511eb7ad5c4bd2be83f942973a2f02f265,2020-01-03T15:36:49.520000 -CVE-2012-3410,0,0,e3d10e77a12b46b54f8226c8944e54398a621c6a63147455f5e99947facf50ae,2017-08-29T01:31:55.070000 +CVE-2012-3410,0,1,f35a81208a06640f6c801924cc9f2a9d242b0d9e9b0ae6fec14a4fe23be9187b,2024-11-21T01:40:48.923000 CVE-2012-3411,0,0,1fed0bd986d7cb36b45fa3350517604b9c4c8ce70ab391d77d6aea8b315b2879,2023-02-13T00:25:25.297000 CVE-2012-3412,0,0,ad463c7afc97f3ce2ff8884d949a02a133a3d239710ecdb788606fe4ce121c05,2023-02-13T00:25:26.767000 -CVE-2012-3413,0,0,b4b859ef8ea3a0449759683d0d4b95177c5ae97ef23612d1574570ffd635386a,2012-08-08T04:00:00 +CVE-2012-3413,0,1,73dd31f91e8673fdf7bc5d8c746f4fc6391e58508b4d86d077a090da4577c1d9,2024-11-21T01:40:49.390000 CVE-2012-3414,0,0,2bed861b4c6d225cdcc63896b7fe0442c8dbc753f99b9ae33218bcd2ac4396f9,2016-12-08T03:02:33.670000 CVE-2012-3415,0,0,afce9a5e6104539e98658972b06f7ea297044658913a712824c03571fde879fe,2023-11-07T02:11:34.210000 -CVE-2012-3416,0,0,53dadaf6d1d0a4a014fb67f4eb1ca2a4618dc1eed314e35998b339582fcdcd8e,2023-02-13T04:34:21.780000 -CVE-2012-3417,0,0,87506094daa76ad4d992ce0dda70f088462a480882fdaecaa3e17a6fa2542f2b,2023-02-13T04:34:21.973000 -CVE-2012-3418,0,0,0e43c0901f65f7cd11d360b771b2c4390c49c2d77a138df279fbc3b49a62a728,2023-11-07T02:11:34.437000 -CVE-2012-3419,0,0,c416affc0bcb39e1aa9e413f6a8f5f80d8ad9fdf7edb46a78d5025eb839cb229,2023-11-07T02:11:34.540000 -CVE-2012-3420,0,0,2c600bb52b3dbf364622e03c35d07944d40b7e2b18796a2e99e9fa38734c976d,2023-11-07T02:11:34.603000 -CVE-2012-3421,0,0,2d6cb57297d1a299efacdd9911ce33eec97ea7d5211aaad2ff32874d654139a0,2023-11-07T02:11:34.667000 -CVE-2012-3422,0,0,88bcd86362a587051e24d2ec0890c08ab7860939d296e2dd4f89e7ed4c90a440,2014-10-04T04:53:51.270000 -CVE-2012-3423,0,0,5c6b584f44f8b7dbe0de82e22d374ea6dc8ec094aac982a96f48aa9144b82568,2014-10-04T04:53:51.457000 -CVE-2012-3424,0,0,6101c70561291dd983b189fe9a2724dbaea214a9aaa1047751c0b8ce9d762c3f,2019-08-08T15:42:45.623000 -CVE-2012-3425,0,0,03bc07c7a7f6c1741e88899584d4bd9c9a56cba268ec60c435287ac7e5519da5,2023-11-07T02:11:34.770000 -CVE-2012-3426,0,0,8b6a7c6bb80e3a7794e923b0aa142df9c8f274602596675d013327edc9e87b52,2012-09-07T04:30:35.663000 +CVE-2012-3416,0,1,158a26fddce6a4993a1e2586b23e478e559ed0775eae3157a36b85b0d478aa73,2024-11-21T01:40:49.707000 +CVE-2012-3417,0,1,86821e021d5114d7cd6b521d96260fbb28711f12c6026c30cb50f0055c201c66,2024-11-21T01:40:49.877000 +CVE-2012-3418,0,1,970872f8cc01387bb7e80f1776a011a3b33d1feed7ea70cdd548c9304800077c,2024-11-21T01:40:50.027000 +CVE-2012-3419,0,1,1d48b4b54391d7d9235d67c0c10ecd5c3d321d90902e402e9562be9897d04004,2024-11-21T01:40:50.190000 +CVE-2012-3420,0,1,e38e9ef3de9729b281369553c6d037ecc51d5be1bffc2ca7ae07c201f26c10be,2024-11-21T01:40:50.327000 +CVE-2012-3421,0,1,2067dff9af2831112307e4113cf2827a1f4d8df06324aafe1e871587da9b6cb4,2024-11-21T01:40:50.463000 +CVE-2012-3422,0,1,57ff2cfb1db6000a0bb61180d5389db9ba2f5ac370fb3f230ff63c1cb85e9e30,2024-11-21T01:40:50.590000 +CVE-2012-3423,0,1,f3b60e0a0580afc9b7a847b4c4ede28f2ac15276c053a0d64d4fa0afa55c3278,2024-11-21T01:40:50.753000 +CVE-2012-3424,0,1,57dc5ba55b8441b6d9fc9ab38839cad63ca9849222736d7ff73f5a4c28866b6f,2024-11-21T01:40:50.900000 +CVE-2012-3425,0,1,ab2a18256d8938d728a69094fac5328c887c929a5f5887d677fa3070b27f4355,2024-11-21T01:40:51.033000 +CVE-2012-3426,0,1,b2c9824433c0b4a4aa5cd769179906d5dfd6be7b8d6548b6d482e4abb309a695,2024-11-21T01:40:51.183000 CVE-2012-3427,0,0,c1290594a90074f91ca4185b379dd8120f093327c3685d7516d893b0a3f49725,2017-08-29T01:31:55.227000 CVE-2012-3428,0,0,ad513265a193ded52940c412b48ebdaf3894f73e027a9842dbc04d026f4012c6,2013-01-08T05:04:05.243000 -CVE-2012-3429,0,0,2bf68530979b3366f5327914baaf6ea228e00ff3f085aca85ac55920ddb8797a,2017-08-29T01:31:55.290000 +CVE-2012-3429,0,1,d73a7855a95e015c2d996791f92dd74e55d57737d033b93457f2ad666f4bfffc,2024-11-21T01:40:51.580000 CVE-2012-3430,0,0,f037d3afe416d197454ca151f5985d239b5b7565c946e3aef32b9dcc98479d3e,2023-02-13T04:34:22.477000 CVE-2012-3431,0,0,81724737879430d355b3898c15e5e33831857f1e17be761b703c3073cc28ff6b,2017-08-29T01:31:55.337000 CVE-2012-3432,0,0,b17924d83d35930ea47c55c7a334019bbc793eb2ab50654d1970db4e71737c4a,2013-10-11T03:44:48.773000 CVE-2012-3433,0,0,89530cdc0a9a639fb3be6bbd6038a2d7a099eac6469d629668e1b5106f561b8b,2013-10-11T03:44:48.850000 -CVE-2012-3434,0,0,aed0fca448af5fedfe0951661761f0ea2d57768bca6d8de99f543267694beb22,2020-07-13T10:51:06.210000 -CVE-2012-3435,0,0,b970f589a6427fd77f3e721737889f1da5cf2841eb7ad1a83e88f23ba66703bc,2017-08-29T01:31:55.417000 +CVE-2012-3434,0,1,fd44fb1eb4e494871a05eac45594922f7b1dd8b04182f86027458ca076b9fb31,2024-11-21T01:40:52.223000 +CVE-2012-3435,0,1,ce80b3c6f960c71fe6e2e2561c17432518c84c3c8f980eb04d3c7ace2c989a7d,2024-11-21T01:40:52.363000 CVE-2012-3436,0,0,80e2a719b7e515e515e7af0a7de59edc1bfcec360238735587360fb2bd2e4157,2017-08-29T01:31:55.477000 -CVE-2012-3437,0,0,df460209f7f6fa1150a984377a9aa30615b12834404ee296afc673cb232a6ab4,2017-08-29T01:31:55.540000 -CVE-2012-3438,0,0,b7c3241bf0e6cb804371032907177b262ac2aec152a4c6df4dd5635fc13ebc24,2017-08-29T01:31:55.587000 +CVE-2012-3437,0,1,a2234f54e95c8c74fc3f1281ea89a8c42a7c61c05d75f98455c351ac0fafe536,2024-11-21T01:40:52.637000 +CVE-2012-3438,0,1,ef822de0b8753e2de25f8d84318e08bc314ce19b73c626b84b2e45c0f2f679f9,2024-11-21T01:40:52.770000 CVE-2012-3439,0,0,85311e51180f8ea58b9805b4ec184307df4984c2887e4f17bfeaeb6d155c6d40,2023-11-07T02:11:34.987000 -CVE-2012-3440,0,0,1318110ccd879b1c0a825ba5f045f5f97121c42ccf5f3a810318b65804163fe4,2023-02-13T04:34:22.927000 -CVE-2012-3441,0,0,c76bf35bb593769686f23076761cf7958021771bf1d1a614b43b71701e10fa76,2023-11-07T02:11:35.237000 -CVE-2012-3442,0,0,9b83d61df64db2e90fb652781d81e3d928c0dd0901fa110f4d64468970fbabc6,2013-04-11T03:29:59.033000 -CVE-2012-3443,0,0,1a67f5ba13f3c2e1e8edd3e769817d57daf4fc5a294d64853307a678b5172ba9,2013-04-11T03:29:59.107000 -CVE-2012-3444,0,0,4fd958aba3176143dae7da0a08e96b6129964653df10ae21430827fcf9d9f5ed,2013-04-11T03:29:59.177000 -CVE-2012-3445,0,0,f0ba963af3cae30274c5e7c250fab7a612cba64c9a550160e9a1040bd28bea2f,2013-03-22T03:11:32.787000 +CVE-2012-3440,0,1,a0c158199a10e1d6a8839f65df86585222fc3278f96bdbee0cce51a2f32b762f,2024-11-21T01:40:52.910000 +CVE-2012-3441,0,1,920c6e8718d3744006e7f6f8cee7ca4630107c834ca2319624ab9847b74bb293,2024-11-21T01:40:53.023000 +CVE-2012-3442,0,1,75a90d5057db6385a183f85ce43a8e6e953d83e48c9d3f6414bfb6d566d9fac8,2024-11-21T01:40:53.147000 +CVE-2012-3443,0,1,0c10746e44418c8ed39e38349e12dcf24ee07b9812da05fc1e771f2cf5b3d331,2024-11-21T01:40:53.263000 +CVE-2012-3444,0,1,af24d1994d8a5a8308ad2a8b7dafdf6a1f7c2184b012d846c14899aa48773405,2024-11-21T01:40:53.403000 +CVE-2012-3445,0,1,12bf61da610680ecaa267226a8ecb2dab2ce81393309d2bb568b915863d0ae29,2024-11-21T01:40:53.517000 CVE-2012-3446,0,0,ac7333ec78c0a11872dfd10f53e2923a3ab57631551807f77d9af5881ae09cd4,2024-02-14T17:22:51.063000 -CVE-2012-3447,0,0,2a6ea916eb534382cba897dfd25612f871fab7eb573aab4463701512a134a385,2023-11-07T02:11:35.343000 -CVE-2012-3448,0,0,86c9247842b6bfa33e6a86e3682454ba472abd3e803be2a8da4dd6f07b7cc909,2018-08-04T01:29:00.297000 -CVE-2012-3449,0,0,461466d61d10d4ef96f2491a47f5db23f4f0ecaa557eaf18b59d757c4e03d473,2017-08-29T01:31:55.807000 -CVE-2012-3450,0,0,9d7b581e0718538df810c23d88886354d1493d0fda4c5d51a065745c6b795203,2013-04-19T03:23:28.883000 +CVE-2012-3447,0,1,0d1c457dae7b6cc55b1c8920c1728934c9ef4b8bc1b066a74e8aa1ee66129d92,2024-11-21T01:40:53.753000 +CVE-2012-3448,0,1,d182786532c49cb6ad5153584d7e40abe192ae17792021a3dfc3f105f71ce8c4,2024-11-21T01:40:53.873000 +CVE-2012-3449,0,1,2e448b4ec1137dd5bcb1281bd22de2fec11bda983810d5d1966dea4e8efbe7e7,2024-11-21T01:40:54.010000 +CVE-2012-3450,0,1,834cbb850ea3a2cea3b681a0443885320986c3009e2caaafb28f71cd0b42c400,2024-11-21T01:40:54.120000 CVE-2012-3451,0,0,8db14037c9669c4d81e62d3894d2880e27cfc79db99ca75ccee0b10846de7578,2023-02-13T00:25:27.460000 -CVE-2012-3452,0,0,93024b6377d8dcba9f48e44d9a3f2146879b8b3556950c0a006af79805bebb69,2012-08-08T04:00:00 -CVE-2012-3453,0,0,48a620bdaaeef1254cb0f8e8130bc11739508aff54a21fbb729e52337dd5977d,2012-08-08T04:00:00 -CVE-2012-3454,0,0,356d60e4efa5c3ea251ed9dd151c0779769480b9667f5b72e69f3236d1bc771a,2012-08-08T15:21:09.703000 -CVE-2012-3455,0,0,ed40f3b34df968983efcdc14ba9ef638ae7f75acd11717af09de514164199af9,2023-11-07T02:11:35.467000 -CVE-2012-3456,0,0,b7ab0ad3b566ae10bbac97ab6c41dbefa1495a64c2bef1adf31e85d2d8e672c9,2023-11-07T02:11:35.523000 -CVE-2012-3457,0,0,76ac5dac40f73d961abc1bc6dbd4af48afdc309ee8c32fed053b8a0921b5890d,2013-04-05T03:12:05.163000 +CVE-2012-3452,0,1,3c04d7d18e35be6e65618abb2a8cd4ad145a19c058a957ac77371ab12fb20116,2024-11-21T01:40:54.390000 +CVE-2012-3453,0,1,f97412a81e5badedf6211fc9a2b270d7f63801257910bf46b1ff26db4e5909b2,2024-11-21T01:40:54.500000 +CVE-2012-3454,0,1,c19c0f3cbcf5f220ea6625e6c0714328a88fa4eb76947c42fe2e74e8fba106c0,2024-11-21T01:40:54.607000 +CVE-2012-3455,0,1,1f09d6d5ee9f68fbe8e2d776229d24589f2d38c8a7859524fdf2ac401cfc37cf,2024-11-21T01:40:54.710000 +CVE-2012-3456,0,1,5bf1d7b665b6603e7f2c3de6bd8424c5449dbbcfffa6f5546481cbabc3afa02f,2024-11-21T01:40:54.833000 +CVE-2012-3457,0,1,15adef1bda0eee76bb7380f9659a79724ad9141fc2300785759cacab1742def9,2024-11-21T01:40:54.987000 CVE-2012-3458,0,0,5b913dd7c082e13c028fda8480bb4318ea1992732234c6a49d411e7aef7dbb00,2012-09-17T17:43:18.843000 CVE-2012-3459,0,0,5e5466c1c91e4609df5208330d117a496af2eb596274c8ba973bf8f3d7d48bd2,2021-07-15T19:16:09.750000 CVE-2012-3460,0,0,7cc5693e676a16f64b7a05437d4ba7d37a03227ccbb1a6c7a3d1fb5120f8a863,2021-07-15T19:16:09.750000 -CVE-2012-3461,0,0,c0316bf1bba6fa0950bcf99f065d811a645239fbe020b07ac1961e89fd2c8342,2023-02-13T00:25:34.703000 +CVE-2012-3461,0,1,8e6ff4a6da15009a8ebfa8efa275589bcd3b929e01e87f036f42a169fbcfe3ce,2024-11-21T01:40:55.463000 CVE-2012-3462,0,0,6768719ae7f0abe8952f971efece79b0e3107ef25f0792bb311196bb6df80772,2020-01-03T20:05:20.813000 -CVE-2012-3463,0,0,174407174a2bf68e3ed4fb18ddfe9d9e060bf022692949d5da25994d245d81bd,2019-08-08T15:42:45.623000 -CVE-2012-3464,0,0,ef34416891457ebbe8c104299745d920c002975811e88eb23a79b2243201a5d4,2019-08-08T15:42:45.623000 -CVE-2012-3465,0,0,9777ef0cdf53688a830498ffe9d3a1a0e6dd4d23e05e8bd971835a4c8ec83399,2019-08-08T15:42:45.623000 +CVE-2012-3463,0,1,8a33376e8c9a785e5ee5297dac1f40e8f3160f9a3c63a2f79f950254714f7b2d,2024-11-21T01:40:55.700000 +CVE-2012-3464,0,1,5d4642410d4562122e95d208de838c5be5e28167ae91ad69ac0586354c978415,2024-11-21T01:40:55.840000 +CVE-2012-3465,0,1,839b0ed57dee14d3c7dbb71243b1a6e29faa9cc771160e5a5c1cfcc97a553fb6,2024-11-21T01:40:55.987000 CVE-2012-3466,0,0,c9b50bb7a628b4a126894301bdd2491d2d258bab4da915ba05de0cb52b9d00a2,2013-12-05T05:15:46.690000 -CVE-2012-3467,0,0,9f950ca368c254cbb68bbedb599a297959d69e4796b9ac38e37440fab6451e99,2017-08-29T01:31:56.167000 -CVE-2012-3468,0,0,829c283a7094f7bdbd3afe6aa66b458ece43e2a4805122d59ce5e1919af29074,2012-08-13T04:00:00 -CVE-2012-3469,0,0,10bdca6aad1507b9b316b73413da5dc78ddf8e1fd0b09606912e84d0535158c0,2012-08-13T17:47:44.457000 -CVE-2012-3470,0,0,452cf322de2049cdd441ccce5f90341dcd9d847dfb476ce116b3e1d33dc487a8,2012-08-13T04:00:00 -CVE-2012-3471,0,0,ffae736921d45a0219817799c68e5a172c35b1e6601abf998e791d60db9ab342,2012-08-13T17:52:03.507000 -CVE-2012-3472,0,0,076fe60f382754e1dadfad2a3d0aa00c4bf2568496ff856e557e2d1d3fbdbbd8,2012-08-13T17:53:09.147000 -CVE-2012-3473,0,0,ea38f8fdf2dbd1c6b0360eff6dba33acfd1c4cda12dd6174ab7747ac065426f0,2012-08-13T17:54:29.490000 -CVE-2012-3474,0,0,bc490ec36546ca5f7436936199ed0cd25b0f24317876f3347a88940ef6f0e068,2012-08-13T17:55:16.443000 -CVE-2012-3475,0,0,0e1d5e6741de2e8f129381832301fb6e74b388a0fe33b75f2b54ff2a17ee50db,2012-08-13T04:00:00 -CVE-2012-3476,0,0,20c95169d61a436d2cfa4c6741732593fdb7af898c5100eaa97926cf178e3e0d,2012-08-13T17:58:43.553000 -CVE-2012-3477,0,0,eda5f7d7583c144e126063e72a2fe7a38398b44a1a4fc62b76bdf5c66f6c2476,2012-08-27T04:00:00 -CVE-2012-3478,0,0,0441912ce5c22bc7a9e847cdbcf467dcea444e85abe4aa8fffffa7e85f41f332,2013-03-02T04:44:07.983000 -CVE-2012-3479,0,0,2d21a31fc10b948c1b2d0d9a06febbfd73686c13d90c6c7d6b7c06bee0ff9057,2013-12-13T05:03:02.563000 -CVE-2012-3480,0,0,ee5bf6f714ab0befb15e14719506616ca58d8e8fd352738a60d120eada444cff,2023-02-13T03:28:28.790000 -CVE-2012-3481,0,0,7fa273590c0a124939f200729456c5d04342c9e4b8b716ebc8c19850d91340bb,2023-11-07T02:11:35.770000 +CVE-2012-3467,0,1,f221e01ec413cedbc05b9c695b1e748b1106e59cc8a264b7a0104969bbefaa66,2024-11-21T01:40:56.260000 +CVE-2012-3468,0,1,a66ab8396550ccb6cd3d55c73761ba62f13eb04e065333e45eb4491896cb8de2,2024-11-21T01:40:56.373000 +CVE-2012-3469,0,1,cabe22c2a97140156c444f2320ddf32fe4315e4adf78a736251c2541bbdd5793,2024-11-21T01:40:56.500000 +CVE-2012-3470,0,1,33d360b170c8f1b534ff0b8e7d18cd909fac50785732a06fd8f8661c33c5d44e,2024-11-21T01:40:56.620000 +CVE-2012-3471,0,1,ff37cb12a651ab77d432f495fb3449dc97c20745978cc095c27c7d967768776d,2024-11-21T01:40:56.743000 +CVE-2012-3472,0,1,bf0334c6410a78dbc3de4dd657b8bf0b63a548828e1b72ac175a1a421d5922d7,2024-11-21T01:40:56.863000 +CVE-2012-3473,0,1,e493bdca0caf84c9d7c25e4844d2a5fc936cb3a42c60784e7553eddafd68bd43,2024-11-21T01:40:56.977000 +CVE-2012-3474,0,1,b9aec33092b4748ddd76bffb51e9dfc4e2c14b246af2768d40f4516e8bcfb34e,2024-11-21T01:40:57.090000 +CVE-2012-3475,0,1,9d8eade9573f85cd6ab6fad828fe2ee4a9e534d0db351fc2b8e4985e87b8d4d0,2024-11-21T01:40:57.207000 +CVE-2012-3476,0,1,bc74061fc13a9bced0273422b19fd5e6ac5c7bc4bf4d02124c6636e81ef307ec,2024-11-21T01:40:57.320000 +CVE-2012-3477,0,1,b244a4b47e7ccacf3e513413a0258b25e894caf81299ba32bab2447608f3f61f,2024-11-21T01:40:57.427000 +CVE-2012-3478,0,1,657a9749202236efd96f773a74784d00e4748a5be0758caf984c80c7eb5a6ca1,2024-11-21T01:40:57.527000 +CVE-2012-3479,0,1,1b84ce09f1faee57427e9c182aae54ba39d4137836ff111676eed00a203e6e5b,2024-11-21T01:40:57.657000 +CVE-2012-3480,0,1,bb9f43af588d924d903312d6ce99545a0d89b6347b51052ce0709311c944319c,2024-11-21T01:40:57.813000 +CVE-2012-3481,0,1,07cbea4e0a3aeba06ff35da561d0a8c94cf8d1c3402f4cdcb66082daea4520e5,2024-11-21T01:40:57.950000 CVE-2012-3482,0,0,6e7c68c212624fb5251213c54a6831c42728b70207a544f1137a30b4cb0bcdb8,2013-04-05T03:12:15.993000 -CVE-2012-3483,0,0,ed66565724b4e12272bc7d68ba8dbf84ae72826639fa1907f4a4621319178125,2012-08-27T04:00:00 -CVE-2012-3484,0,0,f471e541530d11caa72d4fbcab40a8a3ab3e3a0020755ee15683f0beda023480,2012-08-27T04:00:00 -CVE-2012-3485,0,0,56c379549aee7c59dd6ab715b3fbe00dae294e35a6dbbd3dd9dfb3339235cc44,2013-12-13T05:03:03.297000 -CVE-2012-3486,0,0,8ef4abdb0d2ec381d799755ece2b66d69b7bb4d53049982d770a63b7f05e384b,2012-08-27T04:00:00 -CVE-2012-3487,0,0,c47c69b47491741be44a750132a33265f021c7eee13d58d6e08a5e51b8dd6246,2012-08-27T04:00:00 +CVE-2012-3483,0,1,bc910d9d700a70e9856ce0858ddf88b8b70db76ba40daeed89bf7533106ae889,2024-11-21T01:40:58.230000 +CVE-2012-3484,0,1,e4cacb54917cc6fb106c2ab2469818627a60231adc25eb65c2c2c0653e7d5c2f,2024-11-21T01:40:58.340000 +CVE-2012-3485,0,1,74d78eec37fb61ec325d1ddf2e4b9fcac454814ee01cb27cce4687f372b45a45,2024-11-21T01:40:58.447000 +CVE-2012-3486,0,1,6cced699391372bf27813c244dcb85112cf2a68a19086c715ba9b2cacc933ddc,2024-11-21T01:40:58.560000 +CVE-2012-3487,0,1,fcd6f8ec3b320e95010b6cda1b6652d4a60d0032b8891513f359a7ebdadd193f,2024-11-21T01:40:58.660000 CVE-2012-3488,0,0,d2f6828890b5789ab865077cec804c642726c760579698103588228fca15dc6e,2016-12-08T03:02:35.860000 CVE-2012-3489,0,0,ba0630063dcf1654cc90f1d616391d0110385e77bfec98f1664c9a8c2e5b6b3d,2024-02-15T03:22:42.770000 CVE-2012-3490,0,0,77e84f8406f6402066bf803e81a715e690b2cbff80c5fedc7bbe50bb07431c89,2023-11-07T02:11:35.900000 @@ -54961,202 +54961,202 @@ CVE-2012-3497,0,0,b5e3376ef576d15dbdd143fe3b9a91f76654c7f2b1e86d079a4fe0fac7a1e6 CVE-2012-3498,0,0,3120cdb34ec8860953843877ff3e63b656ce4763ff816e36448160ef21fed0db,2017-08-29T01:31:56.477000 CVE-2012-3499,0,0,38d93131fd0104fab2fd932c45596434726f95011d9a38e025fc3b83b338deac,2023-11-07T02:11:36.247000 CVE-2012-3500,0,0,98b9b5ff4fc0ed37f65b343d92c13f8a3addd200b735ec21638720e98cfa5174,2023-02-13T04:34:23.080000 -CVE-2012-3501,0,0,fe167739a06a134c2ecd1dde361ca33606be87bb346b954d06b98fcbc5f8b9c4,2012-08-27T04:00:00 -CVE-2012-3502,0,0,3efd29085b23237ace26d697b0b07376c5015d8a5159bf938db7768259bf1768,2023-11-07T02:11:36.420000 -CVE-2012-3503,0,0,e3f26436003a104acb25caf0d688ae6adf336f63f0d877a17d54f8f8a7fc18c5,2024-02-13T16:44:47.863000 +CVE-2012-3501,0,1,0b6e7e9642066a25841da61ac49ff52a1759cd042f707e2a2c150703689a501a,2024-11-21T01:41:00.513000 +CVE-2012-3502,0,1,9e3c214fa441eb1f8e981e91304818e9477a8387ab71a8cf172567d5e861bbfb,2024-11-21T01:41:00.630000 +CVE-2012-3503,0,1,4e7089007a2f75cc80ff3a227dc941435ba6597e535cdeea7f423299c13085d1,2024-11-21T01:41:00.773000 CVE-2012-3504,0,0,9536059e8ff3336d79fb2903b030e9bd2b09f53d3a9c289f90bab30272c01e10,2017-08-29T01:31:56.667000 CVE-2012-3505,0,0,0af2f72ca3b75246c95d16fdea2a3455b038452b89cbdd1ddb13926f7f8d24b0,2023-11-07T02:11:36.513000 CVE-2012-3506,0,0,8b74765a19c5f0c579d7c5ce7bb072300668959b2921231b6ec904ec05e93beb,2018-05-18T12:04:27.033000 -CVE-2012-3507,0,0,048a53292838fa1ce75e0d3975e8dc85e6a6ee6934a4953b36cab9464cd88bea,2015-08-24T16:48:35.827000 -CVE-2012-3508,0,0,ce72bbcc47c041668cf47ae294edc8ce1259bfee0254094b3ced1863ac2ea412,2012-08-29T04:00:00 -CVE-2012-3509,0,0,800746747d0f8efd3c15c9cde3591417fb943ee511f5360f2b4f570966649616,2017-08-29T01:31:56.883000 +CVE-2012-3507,0,1,50d824eaf5e2b25e523a3349033db600df271c9bee98be30ed68060c78efa5ed,2024-11-21T01:41:01.267000 +CVE-2012-3508,0,1,ab121793d88701e50bce04483a91d0ac0ca39535501f45e956efb18130bda00b,2024-11-21T01:41:01.397000 +CVE-2012-3509,0,1,ad9934e8af8e8af2e2c2682338f72a88a2e2562afd073ceacb4ff992a8d5fc07,2024-11-21T01:41:01.513000 CVE-2012-3510,0,0,27324aa6703da58707c3b3a035ef2369f2112a06df078d72ed09a4febbc7b2b0,2023-02-13T04:34:24.437000 CVE-2012-3511,0,0,1acf5381d6b675ae49abb92fa5e417b77d054f852c167ef9ad7353d8726de0f8,2023-02-13T00:25:50.163000 CVE-2012-3512,0,0,04b374c806aa5b420ee975d073a18198d294757b5212d215b20096f777f86139,2013-04-05T03:12:18.730000 CVE-2012-3513,0,0,c8aebc230d22fd9c25c1e6f085caf2560237ebbf91d160efdc2ab7f902a6753e,2012-11-23T11:24:09.383000 -CVE-2012-3514,0,0,76ccebebaca1d35057017a8422d37b450790c7f240ea808051afeae5398e084e,2014-02-12T04:38:04.580000 +CVE-2012-3514,0,1,66a322cb34e147c0ce34aa01d7a74b754ad3d159ff68aed8251bbd75b3636580,2024-11-21T01:41:02.157000 CVE-2012-3515,0,0,9d400c200d0d38d497712c8fe95344cf13aadb5b85decf7971fd6ba475a0c9bc,2023-02-13T04:34:24.947000 CVE-2012-3516,0,0,813194d428cb1cf0163a996425b01a039d007a09dcba40e0644b7985049dc6d9,2013-02-01T04:49:39.520000 -CVE-2012-3517,0,0,0ac0bf79cfae878461dfdd94cb880b61ac9dd5e8431d797ddef204b57bc7557b,2013-08-22T03:56:41.617000 -CVE-2012-3518,0,0,40e1d2da874d4f8b99f7d56798ff090ad00603aa511659e786275f2795b1e49d,2013-08-22T03:56:41.690000 -CVE-2012-3519,0,0,4117951627d6ed67b4d91840ddbbfef00a2783cf0657fe9a60af416926ed6172,2013-08-22T03:56:41.763000 +CVE-2012-3517,0,1,ceade4f4ed71bb2fcf6231d720c21cbf0d918aa6ec7d61326d65cfa93ff34cac,2024-11-21T01:41:02.587000 +CVE-2012-3518,0,1,95ebc9fa0303e6d0af44b3bd3491c1c2c8add0a45041cd28dbe7fd36a4f378da,2024-11-21T01:41:02.720000 +CVE-2012-3519,0,1,d3e619a1b246e5fb7ddf236b9cb3f30f8c3ba180b688d51d296a71e84f12df22,2024-11-21T01:41:02.840000 CVE-2012-3520,0,0,ae22cc06cc1f04aaeea976524b569f15e8183919521f2da79874b23e40ccd23a,2023-02-13T04:34:25.303000 CVE-2012-3521,0,0,594d03949aecb6624461ed2057c8306555f850313e274232a1c854d7f8852fa9,2014-06-13T15:31:50.610000 CVE-2012-3522,0,0,80d183cfc0672fe239af53e207298828d0568fdf795b5a500cb955407a5a6d60,2014-06-13T15:48:20.787000 CVE-2012-3523,0,0,2095f929f8573cf9520682f05ab1ceaa95a48dd33cec5c7b4499c29edae91594,2013-02-22T04:39:11.723000 CVE-2012-3524,0,0,7bc9d11a81d58247ebd0bcbbd078c408ee8bd90db190a743fcf3b479812140b8,2023-11-07T02:11:36.743000 -CVE-2012-3525,0,0,8b17409a4ec118d6521924e1f89b4f1feab11f222d0986e68ae401ea47e088d9,2023-02-13T04:34:26.153000 -CVE-2012-3526,0,0,abd074a486b74ce996a5f2773219c9fe6b016e014f86ca5c5a75b90c747b458c,2017-08-29T01:31:56.947000 -CVE-2012-3527,0,0,156afe41312da29e9919b06a902911561951106e80773d90f0b6fa3d3a0bb3e2,2024-01-21T02:47:51.273000 -CVE-2012-3528,0,0,21f92bcf7dc31132fd2ac39a0957748e2cb61105efbd92dd8d102894966f57d8,2017-08-29T01:31:57.070000 -CVE-2012-3529,0,0,218f90473ad46c7da4011d6e50c771a428745dabd3224aa2f2e7105a696eafb1,2017-08-29T01:31:57.133000 -CVE-2012-3530,0,0,8c751f3361ec022c8bedab8ee75c29a1e2216a16104ccb58a6abd416c42c3886,2017-08-29T01:31:57.197000 -CVE-2012-3531,0,0,f2b0786b691c2f49136c9cf0718c51d604bebb777e43224d0f52d93cdc4f589b,2017-08-29T01:31:57.260000 +CVE-2012-3525,0,1,c17ca1c907f395ba1712b170533b4a1df63f19c8a30cefded5389b46acc46885,2024-11-21T01:41:03.657000 +CVE-2012-3526,0,1,6b14b9ef0d757894dd2b95cb44005eb2dbaa450ad918c1e30bd1faab72cd56f0,2024-11-21T01:41:03.790000 +CVE-2012-3527,0,1,1d6d8a1f1bc7b793d061d92b60ca94b72a82245abccc27c805c572aaef04f503,2024-11-21T01:41:03.913000 +CVE-2012-3528,0,1,8ec31d5eb9169179f2b743819495da00e3346517bc429d03fc0a2affb34c2c10,2024-11-21T01:41:04.040000 +CVE-2012-3529,0,1,18751fa168e8ec6dd8d22f917a0f353c03e4cab05c2acdd8349662f080e460d2,2024-11-21T01:41:04.167000 +CVE-2012-3530,0,1,aac5c9f9178465b74e8c9684d186121276588acd5b8654e378868383e4793578,2024-11-21T01:41:04.300000 +CVE-2012-3531,0,1,d3544c6ce954c6a221b7cf61b3cc434dc43f363964e3ec8e188cf465ca096743,2024-11-21T01:41:04.457000 CVE-2012-3532,0,0,f33fc62b400a79086be84c6cc84b6fafbd42d77ca2a8faf2bab32c45b3c38ebf,2013-04-15T04:00:00 -CVE-2012-3533,0,0,2caef70df0f029bc3cacfd58b8862c42d082b120fe1f157c855ab16242659cce,2017-08-29T01:31:57.320000 -CVE-2012-3534,0,0,b73511fbef95382bf0e2b98264e9b7c56be4168e7114c4b153db95565a7fd22d,2018-10-30T16:27:35.843000 -CVE-2012-3535,0,0,5165c8189512417a559515692b405b1a95d10abcf98119be83350c2251462782,2023-02-13T04:34:27.247000 +CVE-2012-3533,0,1,98e4f09fb388a30061b63f5d627f552ad74f7a5a7bb6dfab4e0c335e4b0aa55e,2024-11-21T01:41:04.747000 +CVE-2012-3534,0,1,9ec49d6c9ed75cb6ac017a347b1b31b2e83027db7375f236314efcaaae82f1b0,2024-11-21T01:41:04.900000 +CVE-2012-3535,0,1,902f836c2d8151b2df7bbef91f3dc5de7c7612b06e4b00996d43fd84e8550c44,2024-11-21T01:41:05.060000 CVE-2012-3536,0,0,053d8bd95baf57c2a1c3bcf0ffcbf7e28f28c8b1eada988558afe520e49ebd83,2018-03-16T17:39:29.620000 -CVE-2012-3537,0,0,dacf3f029360cf7552b91a92bcc8e8b62c1a6bc327afeccd2f056b9eb45b0fc9,2017-08-29T01:31:57.570000 +CVE-2012-3537,0,1,e51545f2eff0e56f95a952b1147448bfdc09d03bdb2057992c89d6913459bf6f,2024-11-21T01:41:05.367000 CVE-2012-3538,0,0,f6ec277d39efcdf5ae9390359661f5df9d3c8e922a149bdf4d72d5c3d1b1bdc6,2017-08-29T01:31:57.633000 CVE-2012-3539,0,0,d1a9c1ffc625d17dd849d9a2425881065fcff1714838bd1ebe208fe7adbaa104,2023-11-07T02:11:36.917000 -CVE-2012-3540,0,0,4a4f2794f4caaa107ff49adbb16bc0d519867cc84e27684ba03d94c29f0a98fa,2023-11-07T02:11:37.127000 +CVE-2012-3540,0,1,0d906b7e92acf40290e4815c41cacce8ec698ecbf6ff646ddb424376944b96df,2024-11-21T01:41:05.647000 CVE-2012-3541,0,0,a07e8ee91ee7940bf861fe2f5ea43abc7b0904dbf19c61713893db6c2d3c6c9e,2023-11-07T02:11:37.177000 -CVE-2012-3542,0,0,4416fc0e0cb1313f5cc38c264f2278df88f6062704545ab8c64bb1ba558b4aa9,2023-11-07T02:11:37.400000 +CVE-2012-3542,0,1,48a72f899193c5f3104386a942795a866a8f0eef879841be32891b02dcf8f56d,2024-11-21T01:41:05.780000 CVE-2012-3543,0,0,7d9487b2751bc50e7503d41d9e45216195b3aadbe28a28746c479cb41d199170,2020-08-18T15:05:58.063000 CVE-2012-3544,0,0,866acd7d62384d98741dd93940223a159ec793a6a7d6a55b1e9049c6e1456731,2023-11-07T02:11:37.457000 CVE-2012-3545,0,0,a6f3aeadf2a0876ffef9d740d6615409649cc9d42a2cd3684d93eaac54cdf3e8,2023-11-07T02:11:37.563000 CVE-2012-3546,0,0,d3c1f9564c376bd75cd81a3d076c19a5f266fbc0dc7c613da42021f5421eee06,2017-09-19T01:35:06.497000 CVE-2012-3547,0,0,efd2640f3fe1c1e8fc979eb32fc895ea530930b9ef2a292bac1ac38d416e1412,2017-08-29T01:31:57.760000 -CVE-2012-3548,0,0,42bcb088c0d0eb8a0ec1bf5a3d79a49bbb5c9dc56fb5cfd1aede245f7a290b3b,2017-09-19T01:35:06.557000 +CVE-2012-3548,0,1,7df54ef172e48b0d39611839032c781f6a22b20b4a289699d7980143f6be6d25,2024-11-21T01:41:06.507000 CVE-2012-3549,0,0,0fc130934d9855627659a9921ebadf76d35f52f179addf3dcc83a838cae34bd7,2013-01-30T05:00:00 CVE-2012-3550,0,0,ad7fb04f932c607eb57d91addd89bcaa6ca81b3e982c7e27366956b7c21b1404,2023-11-07T02:11:37.853000 -CVE-2012-3551,0,0,8b9ae2432a1256079097d192a265ef42317cbba05ec68ba0db517bef1c3fd093,2012-09-06T04:00:00 +CVE-2012-3551,0,1,f790fdad59b692a777aaa7de6da51d0f1379e291084ea5a1d7af9752be743c49,2024-11-21T01:41:06.763000 CVE-2012-3552,0,0,2ccfc07d58fdf9291fc902a334cc0da000cbea7f67badc9a1c089c2241e5d46e,2023-02-13T00:25:52.087000 -CVE-2012-3553,0,0,9ba555cb6fb450c5a7e6f233f12a27c9105a01ca9c624036fbb90883784c9d31,2012-06-26T04:00:00 -CVE-2012-3554,0,0,b13d1925a5c8d48fee4bd97ee929ce7292fac6e8642876ec7176f0a29ad289a2,2012-08-10T13:59:17.327000 -CVE-2012-3555,0,0,5be4e428684a16c2aa95f78a5f565f957d766bb0c82f88c61374e1cdaf5be45b,2012-06-20T04:00:00 -CVE-2012-3556,0,0,261601d487e9d439190826b87248a119c5568af175581e27af1b90a1c96f69ad,2012-06-15T13:39:03.187000 -CVE-2012-3557,0,0,c649a970a8fce64cbffcc8d6926f627128e3096e9ed49f26aac2a64ee5f46c7d,2012-06-15T13:45:17.047000 -CVE-2012-3558,0,0,9d30a53237e194961c74ff2ea81d5300666975ce5adafd1cc7f85ee3361d64ed,2012-06-15T04:00:00 -CVE-2012-3559,0,0,bacbfcdfed5f8e91f6d71b3d1b8e469c9d7ecd3f37f9fb1c9ee17cb6beca484c,2012-08-09T04:00:00 -CVE-2012-3560,0,0,fe0af3ef3475496e9cc97ec8f65be183afa3b1f2b4697c391ca2ae97f88b2e07,2012-06-15T04:00:00 -CVE-2012-3561,0,0,d89a9ab685e9a62203016f4ccfff6dcf28f55553ae95122cdc5d94439e793288,2012-08-14T03:38:36.567000 -CVE-2012-3562,0,0,093c68d96330cca833c6654434425dd3df94fb5997e6de1e50783c4d0190c374,2017-08-29T01:31:57.837000 -CVE-2012-3563,0,0,0e9fd31518872a7809a9225a7df389f290894905ebfdc7e669b1ead1bcfcdcb5,2017-08-29T01:31:57.917000 -CVE-2012-3564,0,0,376b90940827a8b0ac42dfb18ff163be1d863fcf1a46f617b8aa8570a21ebd76,2017-08-29T01:31:57.993000 -CVE-2012-3565,0,0,4099f9ea3100463ece5a7aa5f0f4c611aa015308e2285c829678ea2ec9ae0852,2017-08-29T01:31:58.070000 -CVE-2012-3566,0,0,237545c7fe755d3dbfa5d6bd844fb67e1995c35d7ecde9c3d18e174882554ebd,2017-08-29T01:31:58.150000 -CVE-2012-3567,0,0,a90b84dce93c46450f3ee0ef03b321ab35ddb4942a4cc6fa17605ccedc8feafe,2017-08-29T01:31:58.213000 -CVE-2012-3568,0,0,cd59cdc627ca24f888764e6cdc395b6db350f83dab19c796cd0160090ea6ed19,2017-08-29T01:31:58.290000 +CVE-2012-3553,0,1,f64697e21e58a768a4960c64bcff634826167e0ca6190cad09d01491fdf116ec,2024-11-21T01:41:07.003000 +CVE-2012-3554,0,1,648114c5d97ae1899caac6913980f6eedd10f0f64c0f7a16e82d7bf3053ce22c,2024-11-21T01:41:07.160000 +CVE-2012-3555,0,1,d98d879e0a0c5be85867c306e484d24549c091d473cfc8786d82e5f5051fcf7b,2024-11-21T01:41:07.333000 +CVE-2012-3556,0,1,65acc46a8af50c0cf2fc3db1ef175baa3ff41f536d5432e4fe19160182be854c,2024-11-21T01:41:07.510000 +CVE-2012-3557,0,1,0b7701a3539439c496f2d77b740c72277b3c1cfd4997530a823b84b2dce8101e,2024-11-21T01:41:07.680000 +CVE-2012-3558,0,1,afb0b290c9cda8f94202b624c844a1e5ba668b8d60cba2fbb2df271f312cfa02,2024-11-21T01:41:07.897000 +CVE-2012-3559,0,1,bfc1d25dfb725faf997234e09e1bd2ab7a495f4574afcc4d37a8c788a9ba2611,2024-11-21T01:41:08.083000 +CVE-2012-3560,0,1,fcde4490c5f87436d69547891e38f3e2b9bfa2313e11788acc54383fe7054727,2024-11-21T01:41:08.230000 +CVE-2012-3561,0,1,82b63b1f058f39d0e2a94bcd12295b28c23982d82e6d2d8d84dbf2a19c401579,2024-11-21T01:41:08.407000 +CVE-2012-3562,0,1,0463f953f64844e63d6e29a7dee6ff0a9a67d10d779f5efa0876cf81f32543e7,2024-11-21T01:41:08.573000 +CVE-2012-3563,0,1,d9fb15adefcd5856ede34318259ef93a29817b8069e43287fe89964f8f3b83f1,2024-11-21T01:41:08.710000 +CVE-2012-3564,0,1,2e4891afa8820544a0c5bface43faddc63977c4da914f70e61bd32f7478a6e89,2024-11-21T01:41:08.867000 +CVE-2012-3565,0,1,77baf40703651d68502da53cf4038565802ea622b55f16dac1350677ca72d568,2024-11-21T01:41:09.020000 +CVE-2012-3566,0,1,1f1a130fd7c04b07f9cf4588355b35ebac106e2ce72ec5ce848d5152d371823b,2024-11-21T01:41:09.173000 +CVE-2012-3567,0,1,a88aa6282c3a3b0f68d7ebd44820761e174a3acb805baf30631d61c0de7007aa,2024-11-21T01:41:09.327000 +CVE-2012-3568,0,1,dca2768c4c7ba4c288d556cfe80e2a9a6be95adaee01a8ca026f50e3697585f4,2024-11-21T01:41:09.480000 CVE-2012-3569,0,0,43d88a0f807435ab25e8bbcf105f433499ec5522285a9fd142bbca1fceb3f1cb,2017-08-29T01:31:58.353000 -CVE-2012-3570,0,0,0cd76e0fa23ee16267d323734dfc7c80d75fa244ccae07866a86a71d7b1b5b65,2016-11-28T19:08:17.610000 -CVE-2012-3571,0,0,a3410fd03829046fe7a907ef22def5fd516f95c73e6380cd302bfcbc7c04e7ab,2020-04-01T13:58:10.143000 -CVE-2012-3572,0,0,ac9e30ea8d583d3ad39dfbd72e2d1de2a146e2ef1b18e5ba2f43846c2c0d237b,2012-09-12T14:53:26.353000 +CVE-2012-3570,0,1,b843a06cff4cf2a19ba19d60f813e395a5c3a2116618805971cbde00a2f3203f,2024-11-21T01:41:09.767000 +CVE-2012-3571,0,1,775e6dd4c94799336aeda70c82987e9499d98ed4e9e4fba27ecae77b40a65c0e,2024-11-21T01:41:09.910000 +CVE-2012-3572,0,1,3da6b847b7bc4ff1fdb94a6bdae903a87eabb5fda7d6a940b22deb545e416a42,2024-11-21T01:41:10.070000 CVE-2012-3573,0,0,ae643693ced5a1f14b194be6fa910bc87bc7836465754c5ddd6fd00a69679b97,2023-11-07T02:11:38.247000 -CVE-2012-3574,0,0,bf70dab2da29b6694291e8704ecb2fe23db5ae954892c756273904139340d547,2017-08-29T01:31:58.417000 -CVE-2012-3575,0,0,775409572f954e85aa18a34b72d4c279bde215246828869b7dbf10283977a7a7,2017-08-29T01:31:58.463000 -CVE-2012-3576,0,0,0c67016bfab7c2105ee040ca2365ab1635a3d0356fca142da987459ae970d2cc,2017-08-29T01:31:58.540000 -CVE-2012-3577,0,0,f26ca16d3a7a4ac00d56bd5fc5ded0536043fade6c0cbd5c98a5c80ac813783e,2017-08-29T01:31:58.603000 -CVE-2012-3578,0,0,a681cd2030aad1351c1f7dc0e0538439e0a9381f7d23b1cda49b0cf63a7ed34c,2017-08-29T01:31:58.650000 -CVE-2012-3579,0,0,d021a465f98f8c22454c21f1b3d6d12e6b6b26e88da1d6ad13efb043c7a474e1,2017-08-29T01:31:58.713000 -CVE-2012-3580,0,0,fb60d2c469f58fa23b8842702f33987403fd7e5ed7401037f14ac891b372238b,2017-08-29T01:31:58.773000 -CVE-2012-3581,0,0,e19c19af4fcf580a37b3cfd5e395fdf977f1f79afb05e31c8a3b18cb1035c2fe,2013-10-10T20:48:53.180000 -CVE-2012-3582,0,0,e3b122152104eccfb112e3dbf3a6dd28abf2611bbd831eb0a1453ed807f4dedf,2013-02-14T04:55:01.510000 +CVE-2012-3574,0,1,e82eda4ee965e04b77a6bf58352a33dc930b10cac5110463204cffe2c2bd2d59,2024-11-21T01:41:10.213000 +CVE-2012-3575,0,1,16cddf3270f2aac360bd6962c756ebe0d871b036c53974c4696affa7097bcc91,2024-11-21T01:41:10.367000 +CVE-2012-3576,0,1,0cb2166a939801d9c0a3e205729cac3ab2ef90c40006b815fd2c486aeb667527,2024-11-21T01:41:10.517000 +CVE-2012-3577,0,1,71aae6b1161b103f37f30b8d233f3d28b28bae4a233e8b247426a7937f000143,2024-11-21T01:41:10.687000 +CVE-2012-3578,0,1,833169e5282178f6daf9854b45c3d5300c17a6e088e5e99381ada2f06bfffc0a,2024-11-21T01:41:10.820000 +CVE-2012-3579,0,1,9ab5ffd03e98018e408b2fe2d38fca7abb922facfae74b6080ce94eab0385884,2024-11-21T01:41:10.963000 +CVE-2012-3580,0,1,073f4e6b107f47d162ded66ec8466a1b61dccd0fc4f25807681a6cee94d76771,2024-11-21T01:41:11.100000 +CVE-2012-3581,0,1,b4fd14d1388e127b24eeddaeae96286c7938efbb80eca043695e93f1ff88c7f1,2024-11-21T01:41:11.233000 +CVE-2012-3582,0,1,ece1c047e87a796d3867bacf0e72363a6ca470487f1b3291664cf1c62b4339a8,2024-11-21T01:41:11.370000 CVE-2012-3583,0,0,cd5601b2617be7d8b5179c446f21b65157e8448d693dc0059c9a464bec648153,2023-11-07T02:11:38.340000 -CVE-2012-3585,0,0,338032363fe92eae0f7d4fb2a30a8140d733c49e2e7ddc0738e34c39c331aad1,2012-07-17T04:00:00 -CVE-2012-3587,0,0,0b1db10e7560c9ca1dac90e87c6a227742881df64aae9910a37d3ba7b6717c40,2020-01-08T15:13:02.757000 -CVE-2012-3588,0,0,6455af8097a8afcedd73c9882f6e756ed6a0ba40070799b15ccf3d7602a35540,2017-08-29T01:31:58.837000 -CVE-2012-3589,0,0,26814191d6795c1c30dcb7ccd7bfff58e05f4ea15f6e87f697c8ce0459179f52,2012-09-22T03:34:42.680000 -CVE-2012-3590,0,0,58de1a4abf30f6666ea02e7ab2dd8902b20c9ee57c70a14e9fecc0386dd23dd6,2012-09-22T03:34:42.930000 -CVE-2012-3591,0,0,80f4fe3f86f792e1440a52be7aa25ddac6a77dc4ce9a8c41571d89506e8a3f06,2012-09-22T03:34:43.167000 -CVE-2012-3592,0,0,9d9a886c5f3ecd87c56e47e7167b3c9c1798acb55125683a09593fdd1680185d,2012-09-22T03:34:43.353000 -CVE-2012-3593,0,0,e1397920c6399b3dfd5b5024dd4861990b8b5b7bb8850f330b69f77d923a1bb1,2012-09-22T03:34:43.523000 -CVE-2012-3594,0,0,b2cc1886be00ec063e0a897de7e8b76d8638d68dacc1acef5066c6d8178770a0,2012-09-22T03:34:43.710000 -CVE-2012-3595,0,0,69b09a73e94d61f5f769e47cf540c10fe93cfeaf05d92e04daabd8e4c191fbff,2012-09-22T03:34:43.900000 -CVE-2012-3596,0,0,22ad793825660113a81e644c8d92250338f654c160527bab9e067590e0f66c0d,2012-09-22T03:34:44.070000 -CVE-2012-3597,0,0,fbea492f83491547f2ba26ba2047e39ddecf6421d51a31e2452af42195b18067,2012-09-22T03:34:44.243000 +CVE-2012-3585,0,1,4942b32edec4c50a4edde56c0ea4080f7ff424490994a892122c76786ba7456c,2024-11-21T01:41:11.510000 +CVE-2012-3587,0,1,f30d2a5b45a08375b956a9d815fbd8e04f35fc11a66c26f339429b67ec886024,2024-11-21T01:41:11.630000 +CVE-2012-3588,0,1,d13838f73c30bc8b9cb07196055bd90d69801c5b332ff1af5cf08c1b71242e18,2024-11-21T01:41:11.783000 +CVE-2012-3589,0,1,f13d6a86ed66eb448d9c76a151219dfc8079b4b820044a47e38c3c3753ecaddc,2024-11-21T01:41:11.917000 +CVE-2012-3590,0,1,06709c53f9d8346637cfbf5a7b93c4a197369f161daf5c9c8d27de2580b9756c,2024-11-21T01:41:12.047000 +CVE-2012-3591,0,1,ffafcde4f0c04da11f2459551b3b55f5e67a344cae2335efb497d5375a6597c4,2024-11-21T01:41:12.170000 +CVE-2012-3592,0,1,1af385d5090159abd468eb1f1cacdfcc8df5b7be9f10adeca5106a0c5751fbfc,2024-11-21T01:41:12.297000 +CVE-2012-3593,0,1,07af13b58f2e8069bb40e8b8ea2f8c09b017b14e5c5552b259575b7ddbb7e801,2024-11-21T01:41:12.437000 +CVE-2012-3594,0,1,61548cd44da7449fbb8464a16d6f7a62037442dccc4b4af4b485bb56a6f532b6,2024-11-21T01:41:12.560000 +CVE-2012-3595,0,1,33bcea8afefdd2af4fee7c06aae0e90b4ea5d6c4490f2fb44b53e0217c0e7d05,2024-11-21T01:41:12.690000 +CVE-2012-3596,0,1,360bcaf8b936fbc5df21cfe59010e0b0f5c33008160eb4b614508f3da46b970d,2024-11-21T01:41:12.833000 +CVE-2012-3597,0,1,917ef9e892f023f57cb457ca7f21e5a2de7a56d4e1bcc264a957c9f8e7c3ac3d,2024-11-21T01:41:12.967000 CVE-2012-3598,0,0,593cae7b213167215791b22dda4f1fe4fbb9f39a4154a57df7e61ee42f39d481,2017-09-19T01:35:06.620000 -CVE-2012-3599,0,0,65350e6319869919bc969b42c44d44c738e246ddc4725f9f9400cf2143f04f6f,2012-09-22T03:34:44.570000 -CVE-2012-3600,0,0,f0b6d1b0b76dae540a0527fa5eae5b9d014fcbede2da8d7172fc9ef56f950809,2012-09-22T03:34:44.743000 +CVE-2012-3599,0,1,3a9f8475311f26f742bc5a4cc62c5e6525f9bd66000feefa381cc9b3952e9ce5,2024-11-21T01:41:13.253000 +CVE-2012-3600,0,1,27448ce457118805e422878ca5a9b4ee353856ac34be1840b2340354bdab1abd,2024-11-21T01:41:13.400000 CVE-2012-3601,0,0,1f391f4e167fd77697e13d8047df0e039183f30c7d9711ed5c2ab04cb5c363f4,2017-09-19T01:35:06.713000 CVE-2012-3602,0,0,b15edcc3c92bc90eb5a1bc0e5eb3bf3f12fe86f76aae4c84b3adecbe2fb74f35,2017-09-19T01:35:06.793000 -CVE-2012-3603,0,0,1cecb0f12383e0b04b088786a738f34f31583d366e4912bd75fea78547c6bacc,2012-09-22T03:34:45.260000 -CVE-2012-3604,0,0,1f15c76fd581f0edb169374031a7fbe747e7bab3ee8cd0ab2ae33758d5eb7c52,2012-09-22T03:34:45.417000 -CVE-2012-3605,0,0,7f5cf63217c2c83def2554611194dde6f8c769df10233ac11d84df499a72c671,2012-09-22T03:34:45.587000 +CVE-2012-3603,0,1,52e2c5720e9d07fadb037c83f11a890f7385ddebe1202cba0948575464b0e2c6,2024-11-21T01:41:13.830000 +CVE-2012-3604,0,1,a996d321f1f00841fa301d6e0ae9807a5bbd3d5177d193184477a19cac08a464,2024-11-21T01:41:13.953000 +CVE-2012-3605,0,1,57d948a333682f6ba0977c169db645c5db9208ea46d29cbe3559210a63f86623,2024-11-21T01:41:14.080000 CVE-2012-3606,0,0,c618da5903284a8b7118183ab3e5a837ad2e81fec8a4019211f69222c52da715,2017-09-19T01:35:06.870000 CVE-2012-3607,0,0,bb9b69d6be89fe70a3973f379e5187d14452649644cb432826f6e29f3441327e,2017-09-19T01:35:06.963000 -CVE-2012-3608,0,0,763fb3a6e7dc5eb26e8e291cf081647cb9dce8308f3e9bf0127a9967f6472410,2012-09-22T03:34:46.103000 -CVE-2012-3609,0,0,567edc125ee03c8974251609db292aa8fcacdc81990a811d4eebf5bff97de340,2012-09-22T03:34:46.273000 -CVE-2012-3610,0,0,ccd62b4a8c1df9d0779f0fd21f78016966c74eb917edc4a8da2a2888cc273988,2012-09-22T03:34:46.447000 -CVE-2012-3611,0,0,a3d277c5053852f02c64b20fd576d8e867e2710f7363c5e6992567666c2e138d,2012-09-22T03:34:46.617000 +CVE-2012-3608,0,1,54cf937f67863e8b83979bf266ae1029b820ee5d51b25f35f08c87c8efa566f8,2024-11-21T01:41:14.480000 +CVE-2012-3609,0,1,4236084821c6765d63d46b7a2de6c5114ebeedee783482afd84f55d6f63d47e0,2024-11-21T01:41:14.620000 +CVE-2012-3610,0,1,dc0df8f55f0e9fa3240da8a0c2bed1e68e2302d23d50f66b3c7773919677af92,2024-11-21T01:41:14.743000 +CVE-2012-3611,0,1,b1429591fe32caccd21be7b3ad5c7665417cbf616f2b21585907a9d31ef2a1b6,2024-11-21T01:41:14.867000 CVE-2012-3612,0,0,bafed76f9f45412f91f8977f0db579020fa02af83a3cccb3ebe7acd147572ebf,2017-09-19T01:35:07.043000 CVE-2012-3613,0,0,d43596c3ab87dc3ec9967caabcacf823b7d96e87c7ed4356d047c9992eb16fc3,2017-09-19T01:35:07.120000 CVE-2012-3614,0,0,32f63badd41ae867140a3a6ae1ae7de5fe1c2bb05b2825493aa6b27a3a8f79a4,2017-09-19T01:35:07.197000 -CVE-2012-3615,0,0,fa46b7162f7ae9b25bb1de40e500459a31fc9385d6a3f03a730504abd72b1bd9,2012-09-22T03:34:47.320000 +CVE-2012-3615,0,1,f3e124607f5f4d5978d9ef194c39228aed94874cf722918a6e3307b241aae2af,2024-11-21T01:41:15.397000 CVE-2012-3616,0,0,7cec90ac8bf057860dae50ccc5d1b303b5c9d0bdeb2af376f10bc410ed9946c5,2017-09-19T01:35:07.277000 CVE-2012-3617,0,0,14359a3db7e16aba58407ffac5541f957484d661dbe7c2a19424b027e5a88d41,2017-09-19T01:35:07.370000 -CVE-2012-3618,0,0,39b095bed6a125eccca879e7a534387f9a02feb07d69f5259ac45841b3afe2dc,2012-09-22T03:34:47.900000 +CVE-2012-3618,0,1,e2c80f66a09ef36e54ae18e9f8c4c9441f0a18d58293d37a29b506632096e052,2024-11-21T01:41:15.850000 CVE-2012-3619,0,0,9dbe3f7aab9ccf50e9a8537c370381ced67e458c7903821a3e59f49ef8eeb75e,2023-11-07T02:11:38.830000 -CVE-2012-3620,0,0,99e02e1ad11f37de2f2bb91348313cb44ce911a77e2c76808b77571557e55705,2012-09-22T03:34:48.087000 +CVE-2012-3620,0,1,e4d1ca0f378428d5f1926bae5a3d59a2fe6ccf71054ceb6c77a786bd051223e9,2024-11-21T01:41:15.993000 CVE-2012-3621,0,0,f35479296b2d23086e512515cc975f046c85351a8521c9b35ad0dacf13fb6609,2017-09-19T01:35:07.450000 CVE-2012-3622,0,0,12bf0bb128b4e68e2d9a21d48fbc20c0762cfe1b1029bfd19905dbbbebabd04f,2017-09-19T01:35:07.527000 CVE-2012-3623,0,0,0d6222a416005511f5055789f9144d757b501ed84d7b294818fbbd128ad8384a,2017-09-19T01:35:07.607000 CVE-2012-3624,0,0,63629902c3a158df811e5062b081f78665770806829dd8ae5d18aab9719dbe52,2017-09-19T01:35:07.683000 -CVE-2012-3625,0,0,e328877407b9cf761bda1bad4c780a4439c679493f5d99e77a48f0d1838fd581,2012-09-22T03:34:48.947000 -CVE-2012-3626,0,0,d481d4cf9fdd66b2b3f5710a9535282c0bc58859b3091a26ece0e92d7ef7573f,2012-09-22T03:34:49.117000 -CVE-2012-3627,0,0,fb9c9e1247ede82c0aad250aae30dca5a78aa568ca1305913791c26a5198898a,2012-09-22T03:34:49.290000 -CVE-2012-3628,0,0,48bac061eec01610595978795e9e263581bdfc93641540c2c38d10aa275471b7,2012-09-22T03:34:49.447000 -CVE-2012-3629,0,0,4b93cdfdb559c1b7395f096b40120244ca6ada6d655c9d9edc9d2a49bd27d3d1,2012-09-22T03:34:49.633000 -CVE-2012-3630,0,0,f319c65391c728647f68621440dc3e28b06fc8e30f4966bbb5bc5583b6e02136,2012-09-22T03:34:49.807000 -CVE-2012-3631,0,0,421c04f07220fe492c47a09f842870516437f2d80c0d3e1280f31b3e80ec313f,2012-09-22T03:34:50.133000 +CVE-2012-3625,0,1,2b09413cc7d8d08d96e05cb2fcac2ee5f3d1df6d9c2bb86b5f14a724d40743c9,2024-11-21T01:41:16.663000 +CVE-2012-3626,0,1,e9095be3f965762b6cc66726ce46912fd2ac46248732fcc088e64e52a8040d5f,2024-11-21T01:41:16.793000 +CVE-2012-3627,0,1,8f315974b49562464687210211dfc4171825ef4cd38ce9e8ae9bc8b723240137,2024-11-21T01:41:16.923000 +CVE-2012-3628,0,1,6bfb41bfcd5a18660747d00de439ec58d5ce1472a79508175fef8c1a743d5350,2024-11-21T01:41:17.060000 +CVE-2012-3629,0,1,d94d5d63f515ae808b833c083f8eae5abba9ca381768797e46ab3b93d733ea66,2024-11-21T01:41:17.197000 +CVE-2012-3630,0,1,2bab71fd234a62292c4ae170b9d516397efe791ecb0e8a5cd2f14203e2dbb996,2024-11-21T01:41:17.327000 +CVE-2012-3631,0,1,50ef998369c194cd9ee8f40cc9ac8d300bc8747fdc9cf916ccdaa29bf5401ee8,2024-11-21T01:41:17.457000 CVE-2012-3632,0,0,0f820cbfc8740246ede5a44f3c95d144a7003446d275c4e475231ad5e9b90734,2017-09-19T01:35:07.760000 -CVE-2012-3633,0,0,0d6317739e3a93989df69067d4c2ae68c4f60bd8a275c85d09b1e4fcb13feac1,2012-09-22T03:34:50.823000 -CVE-2012-3634,0,0,b0b4af8f00288756bd17fda05a56ef4e645ef2d35d4a591b334c43f275ed1fad,2012-09-22T03:34:51.133000 -CVE-2012-3635,0,0,05e0bb0ce45d1c454d3e20d795ce3330107365ad352ea61e85172a5f02a5ecdf,2012-09-22T03:34:51.400000 -CVE-2012-3636,0,0,38d7de15162a8abbdf5bf7b98caee62429cf68759c4954b131164ee8d6f491ff,2012-09-22T03:34:51.573000 -CVE-2012-3637,0,0,d883ea0def49d85c6a41ce0d94dedfd09239c5796c41ce3255ac28060d4192db,2012-09-22T03:34:51.743000 -CVE-2012-3638,0,0,e71616ecd50db34099a2a4c765d32afb13fc30682171db825edfd18b71a3b93e,2012-09-22T03:34:51.917000 -CVE-2012-3639,0,0,3ad24ac656fb7fef90527f125ad57e4c2a1caa56dc40f93d998633678fe6acc9,2012-09-22T03:34:52.260000 -CVE-2012-3640,0,0,73f23cc0937d5eb083bc88b3d5206c14c41ae81751b98af7ae24f1598ae98814,2012-09-22T03:34:52.760000 -CVE-2012-3641,0,0,d1ccb1ebdfce74bd78fcb5db9843cf029b823e8656f1aaaba637e6edce4cb888,2012-09-22T03:34:53.040000 -CVE-2012-3642,0,0,df78bd96a3211a3a653c88c2f899a257926bdce59f5a5ffd4eae3dfaed365432,2012-09-22T03:34:53.260000 +CVE-2012-3633,0,1,aff6f0eed591fb5bc6663e2c277d39c899a14208ef105baac2e7f2408af53e58,2024-11-21T01:41:17.750000 +CVE-2012-3634,0,1,8168b24cd06ff70ba5bf52dc8a3ac195926d3e6e80ee268de633352abd495e6c,2024-11-21T01:41:17.890000 +CVE-2012-3635,0,1,ce92ba1b9b2b13885abee59d08d14bb8e1b1151ae4ec5741a0bb9bd42392293a,2024-11-21T01:41:18.027000 +CVE-2012-3636,0,1,ee2f7bb3da78633cb04ef181af49fe8959fc237fa2eb0e19cf48a6a5e0f2bb24,2024-11-21T01:41:18.157000 +CVE-2012-3637,0,1,0e41cf40ef7245511db0403e10ddf7dbe680d960db59b758c66f7e115d3c8c98,2024-11-21T01:41:18.290000 +CVE-2012-3638,0,1,724a058c678daa11fff0ca316a67fe743a815edfe050ce9ca3cc06f5a1e6057a,2024-11-21T01:41:18.420000 +CVE-2012-3639,0,1,a9e6c4a7cd4b62c48dee036051e5993ea81b1c36c8c33575e48eab99e3287632,2024-11-21T01:41:18.550000 +CVE-2012-3640,0,1,9bbdf07271b43efd0f0a4d534d6c4e4889861ae7677d3b24915a9d3967f03526,2024-11-21T01:41:18.693000 +CVE-2012-3641,0,1,d0aecaf649a974a88e39fefdf4500b97168949e03221239c208364356c22705f,2024-11-21T01:41:18.830000 +CVE-2012-3642,0,1,6bcebe9f45669c161cf5bcac9c6a7cdcf5b8966199907c8a92f1eb710b076257,2024-11-21T01:41:18.967000 CVE-2012-3643,0,0,5ef9c3608743e6364c3a42d5ef5a6ddb3e8bc793c9dfce466533f029a722606e,2017-09-19T01:35:07.840000 -CVE-2012-3644,0,0,69faa21232c2f7ca30686cae71d8608815c722f2381b213b0f6b312131174575,2012-09-22T03:34:53.637000 -CVE-2012-3645,0,0,66d05b4306c36812eece3024755e207a482940ed1be326887a570fb4d19c4f29,2012-09-22T03:34:53.870000 -CVE-2012-3646,0,0,0ac8c6ea034ec2b2e020c4532563b23eaf0d13135b1ad484e37002e83c38e505,2012-09-22T03:34:54.057000 +CVE-2012-3644,0,1,8d06fcb14af5785c85dbc8408f335573094735a8fa918806aadb9aeec7145aa4,2024-11-21T01:41:19.240000 +CVE-2012-3645,0,1,9492c492ab84bc768462dcc4316fdee7f5e53147cfe7aea86efd28712f6f8ed3,2024-11-21T01:41:19.363000 +CVE-2012-3646,0,1,2296f04e923daf96a2dce58545cc115a8d45ca5b0140e29ad502b6c04008cb8a,2024-11-21T01:41:20.250000 CVE-2012-3647,0,0,443fbbc4940635e565ff01330c7959fbeb23681ee5df4984c180870f4204824f,2017-09-19T01:35:07.947000 CVE-2012-3648,0,0,11f6e071240ca7959294516d9b491d54fbbfc54d647f3cd1411f11246e376238,2017-09-19T01:35:08.010000 CVE-2012-3649,0,0,a6a630f759738943bc8a0b6f900ef544c0e158e5adf98ef9ff727a8e62b37cdd,2017-09-19T01:35:08.090000 -CVE-2012-3650,0,0,3f3ce119bcda05eeadd94d411bf73053dcc20767c1669ee86bb0221b2135195f,2013-03-22T03:11:49.887000 +CVE-2012-3650,0,1,03137fa8aa42a4e50e175a560f17b807bc177667c30ae801fe42fcc7b2579c37,2024-11-21T01:41:20.913000 CVE-2012-3651,0,0,d2e533a5c57c9b058c9275f3432c1d326d7951b844bbd4b1e1acc8aaa6ebc891,2017-09-19T01:35:08.167000 CVE-2012-3652,0,0,a6768f99a331b808ace3249b57b96302a6e0af30a4324cff3df14b564977f23e,2017-09-19T01:35:08.247000 -CVE-2012-3653,0,0,9adadba0f719e3953dd5cf5a3bc2a4b6d6aa5d16be2b7ff9e80c1db418387b96,2012-09-22T03:34:55.400000 +CVE-2012-3653,0,1,02b584a2b589ea6697855a07b73cf6002aafdf44123c482e76109a38adb78b47,2024-11-21T01:41:21.387000 CVE-2012-3654,0,0,4d7520a347e9245e0218db69139379b952680c9f087a5541395b34129a5ba614,2017-09-19T01:35:08.323000 -CVE-2012-3655,0,0,b1f6fb5a749b762c4440d3f17a5760150f998da7c6325787d6726dd0995356ce,2012-09-22T03:34:55.760000 -CVE-2012-3656,0,0,c964e9f3e6a60e892a8008ea4a5ae46a502453b2953b1f4b04ab58ce0d5d089f,2012-09-22T03:34:55.963000 +CVE-2012-3655,0,1,d979a3c21a36c258a27e60b91dff1a778d6d3fec194b47e45660642848804717,2024-11-21T01:41:21.697000 +CVE-2012-3656,0,1,459056d0da2733a138cc291a547f03d556920a0f1f6cfba969e9a8078fa2aaa0,2024-11-21T01:41:21.840000 CVE-2012-3657,0,0,5b80d2679c608532dc84477203cb39a44e5c1e41369e14f317975ff005e8760e,2017-09-19T01:35:08.403000 CVE-2012-3658,0,0,d3976a4835e552fdf3a0bf02fb8d368669f4a287199fe175810ecd1d9ef61689,2017-09-19T01:35:08.480000 CVE-2012-3659,0,0,c636136c4072ce8ee62f62e9b63b94779b48035d42fa2eba862c5d5465afa497,2017-09-19T01:35:08.573000 CVE-2012-3660,0,0,5a085dc34958d09caf0d12ce681f1ab8096f3f298557deeb3426b6ec43798b95,2017-09-19T01:35:08.667000 -CVE-2012-3661,0,0,a89f750ba8625aa5ebdf34ef35ec4cd4459fa2c043a8ac6463a4cae0437c2bda,2012-09-22T03:34:56.917000 +CVE-2012-3661,0,1,c97d8ca7f8bb190d8519abf766253f0cfc494caa35815f842aaa8f29fcd2ebfe,2024-11-21T01:41:22.617000 CVE-2012-3662,0,0,01f3ac8428dfb68c26ff3af035845b640d736539c1f78e9a5a97f88129a46101,2023-11-07T02:11:39.297000 -CVE-2012-3663,0,0,61c9a83e850a31426d78aa3923ec229c97c263a5ad4a3801bfb755add596d2da,2012-09-22T03:34:57.120000 -CVE-2012-3664,0,0,a633d2747c3680af88a1fcffc67c7fbb9ccae90a5ffe79994c0c798100a0c292,2012-09-22T03:34:57.337000 -CVE-2012-3665,0,0,2f27ebe6febcf797ff5da21a3ea86bee6d248ddfbf6ae4b27a4649d72c770aa9,2012-09-22T03:34:57.587000 -CVE-2012-3666,0,0,20e9fb5c989762ddad144ba03c8c4f3240b236347591549f4a9823d73513d6ad,2012-09-22T03:34:57.793000 -CVE-2012-3667,0,0,9a1c850bb315de657a0621994f430253b895db87fabd63dc0903d1b1542a9bf6,2012-09-22T03:34:57.963000 -CVE-2012-3668,0,0,b35143b7d1836d9e92b3aad13ccecae344504c907cc7deb1827f2f7a6019231b,2012-09-22T03:34:58.150000 -CVE-2012-3669,0,0,25b3045ad67b542ba17be4536e10fca63dd81938fa8ef5010ce303b4a469f987,2012-09-22T03:34:58.340000 -CVE-2012-3670,0,0,e2cf8271293e63293ec65537ace6a576306151c1ca02e93858056ab1970d86ef,2012-09-22T03:34:58.543000 +CVE-2012-3663,0,1,2ed7b5ab3e6f91ac8cc11bbcdbf1e6787c682ba0db596f99402fd1258402bcb8,2024-11-21T01:41:22.783000 +CVE-2012-3664,0,1,6800aef856adc2051b55ef1a680ba71591c4141986cd37547d0f8994adf707d8,2024-11-21T01:41:22.923000 +CVE-2012-3665,0,1,cd0dfd2aaf943036b4c49dead7b4515ce67ec3d0ae9782b37aaa9c723be8b01e,2024-11-21T01:41:23.063000 +CVE-2012-3666,0,1,6e740abf09016f2459b8b4561bfeebd16253ee44a659ec9c6a174bf45c2fc9b1,2024-11-21T01:41:23.207000 +CVE-2012-3667,0,1,aef49e86c9bfa3317296d2efe8cf5c28024e81d694c7816081bb5b0e92fe9e08,2024-11-21T01:41:23.353000 +CVE-2012-3668,0,1,31849f4610f97cf04128ebe39d321d373c6ac1600308901f7a9d14a4662ca357,2024-11-21T01:41:23.493000 +CVE-2012-3669,0,1,d4e10ae32697832ed137d84add7fa118d1042c4174fe8b2d73a7a4757c9d17c6,2024-11-21T01:41:23.630000 +CVE-2012-3670,0,1,c59001e5a7d760027c8ab60d2a38234f1f82ec6778a6738cff35a2d1a56e2835,2024-11-21T01:41:23.777000 CVE-2012-3671,0,0,0aade38d17e77399a32b3cc8766957a0cb7f510e88582b9c258054e4eebe018d,2017-09-19T01:35:08.747000 CVE-2012-3672,0,0,c8ccd787cbf3267df7526b73e8c4f299cd015d05b01151b04824e764913d5445,2017-09-19T01:35:08.823000 CVE-2012-3673,0,0,aa2e623a1f52b208f5692ba1848a2ee825d48e3eac93d4d3a5f07c880f7299ed,2017-09-19T01:35:08.903000 -CVE-2012-3674,0,0,1210aad7eb3a0393a7ca6f037430f946058891ed839b79a99786d493a3a69c74,2012-09-22T03:34:59.590000 +CVE-2012-3674,0,1,b1b2522ea0b6677316eaf7936f05d616de362ea4d0bfbd3d370ee407cfd925e6,2024-11-21T01:41:24.343000 CVE-2012-3675,0,0,2e2057aa3d1c3dc7e97a68b26c6306c3a1a4940a54e4bf73c4d799ff8c64faeb,2017-09-19T01:35:08.983000 CVE-2012-3676,0,0,af8cc6cc72e48cde4a569f4ac9548a05b3ed85be1c52fc9c2db75e451b89c2a3,2017-09-19T01:35:09.057000 CVE-2012-3677,0,0,e3443ee3de5432d92b7f2a594c1835799e6033ac65e14fd08a5c823eca46117e,2017-09-19T01:35:09.137000 -CVE-2012-3678,0,0,475a55b50d1a99ca9d9e251714b9971c00cb2eb7eadbc7de1ad119a111751f6b,2012-09-22T03:35:00.370000 -CVE-2012-3679,0,0,cfe2ed910863a388e6596275062b143e3f5ed63e62e86ff9d6d812d9d0fa19c6,2012-09-22T03:35:00.573000 -CVE-2012-3680,0,0,9dfeba3ad1d646dd0c9ef75144360630322d057000a150a21a31a42562640c31,2012-09-22T03:35:00.777000 -CVE-2012-3681,0,0,d867f17e530c84cf1c5755680d0450cf47ce41f4c31f044e70fa3211dfb8705e,2012-09-22T03:35:00.980000 -CVE-2012-3682,0,0,1f4db7057da66f7c253542046dc696a8fb608b7a4fd7b914d4acc6d67d6c3ab9,2012-09-22T03:35:01.167000 -CVE-2012-3683,0,0,78888a797d0d55f9053b70324d55ea51b2057b05beff85ffe4a59a80aad4a0dc,2012-09-22T03:35:01.370000 +CVE-2012-3678,0,1,81b3f7b988671a79e18f193648501da3272ba9a6b3c6760983ef18ae318ea80f,2024-11-21T01:41:24.923000 +CVE-2012-3679,0,1,ebeead8c76f638bf3b81f957fa3c304df50fc35e9a47259ad780c3a8d5b97a5b,2024-11-21T01:41:25.070000 +CVE-2012-3680,0,1,e8191d8f6b9e1dcf1b17c9edece0908f21d130f22e043c277665d37bf9922c66,2024-11-21T01:41:25.630000 +CVE-2012-3681,0,1,41f8de17c98a2f5de2760b8fcf2662a0b8d63e01e9dd73e582b2daa8e8024730,2024-11-21T01:41:26.360000 +CVE-2012-3682,0,1,0956eb5e13151c79fda89497cd3270ae0bc3739d1905a3d9a994ed9d4c1210b4,2024-11-21T01:41:26.523000 +CVE-2012-3683,0,1,2c6db14f53d9e8abccf678e3c82d5520eb6b4b4d8faac940bac2ab1975cd3c72,2024-11-21T01:41:26.700000 CVE-2012-3684,0,0,a6f7fb91de1ce7e58e965ec08bce6b7ecece35c5206b1b4cc2eb864a0f00e8ad,2017-09-19T01:35:09.213000 CVE-2012-3685,0,0,4a660e573d3b1bd940cb622521176b6e913d9c0565e6169c0edaad8cf3faf443,2017-09-19T01:35:09.293000 -CVE-2012-3686,0,0,3fc4550b91f01bc89f1fc9be4597ce7ab65b536e52fa969d6ead87e042d34556,2012-09-22T03:35:01.947000 +CVE-2012-3686,0,1,776efc48a2de01b5f2fba502dc696d7c052ebe406e248e8d60d336bc2ff00c8e,2024-11-21T01:41:27.120000 CVE-2012-3687,0,0,686b6c698e6ac2350063707fe9b481074381086f1d0cbc2bfd23e50b165040b7,2017-09-19T01:35:09.370000 CVE-2012-3688,0,0,5698ad2d87023f4304dec909074295ef3f35f07f6a1149e765e1ad814d188dea,2017-09-19T01:35:09.450000 -CVE-2012-3689,0,0,5d16cd2f4038152614e923ce2e034b1da125a6b03f9f360659867b2d8a42b0b1,2012-07-30T04:00:00 -CVE-2012-3690,0,0,0b82dc471ebb184f4f8cfeec47769c5356abf4eaeda722e7dbdfdae006dafa5b,2012-07-26T14:23:26.077000 -CVE-2012-3691,0,0,fe305a7b01ebdcdcf155d276e52dd09b0984d3cf1b3bb9ea4f9edb506322d81e,2012-09-22T03:35:02.713000 +CVE-2012-3689,0,1,9874d6c48aa665c30066467e6157d1bfcb5d24ca233969e9a3a73d265f54ad79,2024-11-21T01:41:27.533000 +CVE-2012-3690,0,1,317459931bcb0ef22361520bf5adaae772736f116d6e7e16ca6c3c1d282773d8,2024-11-21T01:41:27.660000 +CVE-2012-3691,0,1,b2c5b97d6f73ca4547df30157b9190bd1e13d9735d744d2a05b535fc37d2f6bd,2024-11-21T01:41:27.790000 CVE-2012-3692,0,0,9aefe0c5f38c40e8e694119d7dbd8de4a263b4c556bc4730887e86d0f21ce785,2017-09-19T01:35:09.527000 -CVE-2012-3693,0,0,329e7111efdfd1fb997f4de13a0fe317cd9b57bc7755203d367c1e4bf5818bf6,2012-09-22T03:35:03.043000 -CVE-2012-3694,0,0,973585ef04c505e72481f78f95efd83d973f008560ebb34429bb317ab2eebd8d,2012-11-30T05:00:00 -CVE-2012-3695,0,0,8976a878fe7d1c2520ddb44a0d3373d9c4f7611bcb70ee6279155627c6ffec14,2013-03-22T03:11:53.400000 -CVE-2012-3696,0,0,01b4f19fcfae53832b88f1258f4ec6947c7544877754d56ee26435759a61a566,2013-03-22T03:11:53.467000 -CVE-2012-3697,0,0,e9047b0ea3b0c675d78a8012a022d77f1561b213b4111b9d99928b955e1a93b8,2012-07-30T04:00:00 -CVE-2012-3698,0,0,4b847dc755c5fc660e6909bf08b7f19d5409b3f760d646f7a467952890cea6f9,2012-07-31T04:00:00 +CVE-2012-3693,0,1,cda7054d1fdc08ab653f2eeaf73ed01e9a8e66597199438bac0de080d7d753bb,2024-11-21T01:41:28.063000 +CVE-2012-3694,0,1,395ffa3e8c44f243b611e5b9f3683b099e6b1063ae927bd0f944dc034c3e6c75,2024-11-21T01:41:28.200000 +CVE-2012-3695,0,1,c29619f0802730d34aae23795b22719417a7a18a73d9e5f89488391a5c94aa79,2024-11-21T01:41:28.343000 +CVE-2012-3696,0,1,f0f11e759cbc7af22d9ecd6a93b48a9ade8da4eddbad749b90305d37c76284d1,2024-11-21T01:41:28.480000 +CVE-2012-3697,0,1,16d58a45e35ab315080fa5b9145dcff66c26ea6368bf5a51aa35a58a7890d42e,2024-11-21T01:41:28.617000 +CVE-2012-3698,0,1,cda5c1853cbcefbc52c9ed8ec907a280a5cfbe04cb5715b6ef23919b3521476b,2024-11-21T01:41:28.757000 CVE-2012-3699,0,0,199044bafb5253aa7cbba7aced567c56ea65bd3cc72d254b88eef0bdfa07ddbc,2017-09-19T01:35:09.607000 CVE-2012-3700,0,0,66a298bf5525b21b8754d1f7bab662d6a05f6f4047ea389895cb1e814fd87b8c,2017-09-19T01:35:09.683000 CVE-2012-3701,0,0,8d0ee4abcba16f2eeb5957bddde873976af4d816195012179dd26d4232f12559,2017-09-19T01:35:09.760000 @@ -55247,83 +55247,83 @@ CVE-2012-3785,0,0,a4ca4e5c4a584d58aa4ab78a151e416102fd30705cba8d639bca7d07016db8 CVE-2012-3786,0,0,5db831f5f3fabb84a42de206ee78bf5aa64b1d8f2c8067db623e7647e07568b1,2023-11-07T02:11:40.877000 CVE-2012-3787,0,0,90872d021d4757aac253e2c1e46ea568055480a2d5c6a593e5db57f92faa692a,2023-11-07T02:11:40.910000 CVE-2012-3788,0,0,fdcfc4792af8b3a03ad4a87f1b835394562d4e0521e9257f9af5252c66ef38d9,2023-11-07T02:11:40.940000 -CVE-2012-3789,0,0,439bb0f8a50d8d4e77f7b8e29d80be36c3b9c247d5fb958048ef07803dedadac,2020-03-18T17:38:21.580000 -CVE-2012-3790,0,0,3ef03499f44366b87d5c91c4fde5d57f401a546764fd51360f1c37680cdc6ac4,2012-06-21T04:00:00 -CVE-2012-3791,0,0,690eed7f5a7bd5b27adfcb7720804386c884c2f3de43e5b921ea9cb7a05368c1,2017-08-29T01:32:05.273000 -CVE-2012-3792,0,0,f94c7681dfb63f18b8915d30fd5771615092eadf0bf942b671c785130c8d3343,2013-05-21T03:19:19.620000 -CVE-2012-3793,0,0,fc5997ccd787ef8aeb4bc2bfba29af37e98009e32eb81f8aec432ef47a9e5b8f,2017-08-29T01:32:05.337000 -CVE-2012-3794,0,0,ab8358abdc6c5fa4e062bf937872e69427b037ca74088ff27170ca859040da8a,2017-08-29T01:32:05.400000 -CVE-2012-3795,0,0,c1c78646c5cf1d2a51da167756a45334be33025e261d9c630f70608c80cbd625,2013-05-21T03:19:25.783000 -CVE-2012-3796,0,0,95394a70146049aa1321519cfca6157ebd447d4a0c8cccbf94f2e5f03006d3a4,2013-05-21T03:19:25.970000 -CVE-2012-3797,0,0,3a178be554c1806903d336f965cf8ef28ea928699668e08999e2bfccddbe9015,2013-05-21T03:19:26.073000 -CVE-2012-3798,0,0,02aa176ff9d7ba00acfbd380883a4249e05bacd6e9d0f38ef0d039545d38d23e,2012-06-27T04:00:00 -CVE-2012-3799,0,0,1d1fe629b6673d99e8b99f0cdb98c89dd593f91348cb202429060c704b667d0b,2017-08-29T01:32:05.477000 -CVE-2012-3800,0,0,69a41d115aa86c90ebfb293dc1f836560fdfc92c79da9163a98d51c3e891b695,2017-08-29T01:32:05.557000 +CVE-2012-3789,0,1,d5430bf719f69cf6bb0354add79a53832d18be549ae0fd22ffc0a4bb856dcd46,2024-11-21T01:41:37.343000 +CVE-2012-3790,0,1,ff43118ca3b325415e52e76a500ee6372a586c4c76abf3eeb6b82058fba66a5d,2024-11-21T01:41:37.500000 +CVE-2012-3791,0,1,6a4398f95b0c6867582c15f4e9eed1bed5b5bd15f3d505ca19a95e27a2b95da6,2024-11-21T01:41:37.640000 +CVE-2012-3792,0,1,40b89459d3df5e8c10b66a6fe4903e73ed9568c50a8bf6271713f98f761ef7e7,2024-11-21T01:41:37.773000 +CVE-2012-3793,0,1,d683594b17c6ca65aee00186196a816f6de8eb0ec0ff4f321814538d655c13f9,2024-11-21T01:41:37.910000 +CVE-2012-3794,0,1,c3aaa2c36025ac313ddd2b4dff750fce0723ffd3ac03313f8b4b075873e73d6f,2024-11-21T01:41:38.050000 +CVE-2012-3795,0,1,09bc453883f5bcf269a17b8914e8d7f5dccba0b01b05a136502f6a5753fc4c70,2024-11-21T01:41:38.190000 +CVE-2012-3796,0,1,c2ec1e7e6b8da1ba260f239f3c0a057d64899ec6a704916c89330cdd1519ff5f,2024-11-21T01:41:38.337000 +CVE-2012-3797,0,1,810a6400a7565bc63e957b4e0e2356725bc5060d7a9be8e4f47671c843ed6fee,2024-11-21T01:41:38.477000 +CVE-2012-3798,0,1,d5033bd17b69f6026d07120d0837cc2755f500ede3db3874fc2b8a7803d2c7d5,2024-11-21T01:41:38.623000 +CVE-2012-3799,0,1,773273ee234395c83620c3dc53d1ae7d13054f1e4c62df9e35cb8f9616c82503,2024-11-21T01:41:38.760000 +CVE-2012-3800,0,1,0f6d3ddadde531ce9a87d4efa319b25ff76cfa1ffea867b352b3e250f7c2671b,2024-11-21T01:41:38.903000 CVE-2012-3801,0,0,2b199f87046bd93c62758a1ede31097aabb4b53ffdacfd4caa08e2717d250531,2023-11-07T02:11:41.080000 -CVE-2012-3802,0,0,adcce4585c47253811fdae24d7fae300ff98a780cb278a232f2653bf2f38f113,2017-08-29T01:32:05.617000 -CVE-2012-3805,0,0,e026868ada0700364117744b21a3c94852f8a79ab4146dab841c41e664bb311e,2012-07-26T04:00:00 +CVE-2012-3802,0,1,d99b4ee926b391c9bd86ab98f5429d8de7b5c03dab81e9423ee2707602c35df3,2024-11-21T01:41:39.063000 +CVE-2012-3805,0,1,60dd0945a6b200276009cf96f4f467a41036b9ce5ba4d3f113d63456f843dbb7,2024-11-21T01:41:39.207000 CVE-2012-3806,0,0,43ebec887f2cbe9b9a0049047051ad69374b397158958b5fae463f5bed91865b,2020-01-11T01:09:13.153000 CVE-2012-3807,0,0,9081564b3a8e5f87bc4c627de3556b08883da7d9877a10dbc4e647b537565815,2020-01-13T19:57:58.250000 CVE-2012-3808,0,0,efb4e3dbb6a773d6e45e8b1e60ab083084557774ee26457dc93ea28348aab610,2020-01-11T01:01:26.523000 CVE-2012-3809,0,0,8e39118201fc882c9b55a7b0c680e850a0f5db571c1f6d4bc2adb886042c6b9d,2020-01-11T00:51:54.557000 CVE-2012-3810,0,0,e4360dfe12ae7b0b260d5e067fe0dac7cdc6501f53d351c0a0c68ea437cea53f,2020-01-11T00:49:01.410000 -CVE-2012-3811,0,0,fdf60c2247667f98a38ad41ed52864e1e7923af492d343e5792c126a376ae9df,2012-07-17T04:00:00 -CVE-2012-3812,0,0,c1267d989be694bceee351fa22420df483a3003e5b27829a84eb192c1be7b4d0,2013-04-19T03:24:11.410000 -CVE-2012-3814,0,0,5f210542624c0e3f5d82315f50e70a8eae04d9ce2d055b7da71d99f764524bcd,2012-06-28T04:00:00 -CVE-2012-3815,0,0,306a59bda559489e149b4343233003f365d1743172f3525fe49393944a6c387c,2017-08-29T01:32:05.697000 -CVE-2012-3816,0,0,b930200f0b56cc827b5caa0a508056db75d825b80d0eda357e25b6d5900ac08d,2017-08-29T01:32:05.760000 -CVE-2012-3817,0,0,b17abb0a284a03b44ff9a8eb9aa9e5b86799b85d7db23bb5141bc26c1857456b,2018-10-30T16:27:02.467000 -CVE-2012-3818,0,0,40e6a772f512ee87da9bab55afed38dcec6781b20f9266412508f17a29cd7182,2012-07-02T12:36:42.037000 +CVE-2012-3811,0,1,e8557c07f155b71d294ef5ba0c7ba1ed3253c1b295ec15feb3a323d8f61c3e2b,2024-11-21T01:41:40.060000 +CVE-2012-3812,0,1,9d4175b2cae8d01f6ee047d5a0de648927cd4632ebf343d1e52f18cf6004fa01,2024-11-21T01:41:40.210000 +CVE-2012-3814,0,1,ce84b4a27e87812c46412a655673ad6775d6614f4e9da6d970d7d5f8193079e6,2024-11-21T01:41:40.377000 +CVE-2012-3815,0,1,78046e8161aa4e90ffa86c288dfa75fc8c824626477ee20c75cad507be1370f6,2024-11-21T01:41:40.520000 +CVE-2012-3816,0,1,92aa58043fba7b6fae205c7146bd1ec82be3dad3b2741fd7435fb9005519c05b,2024-11-21T01:41:40.680000 +CVE-2012-3817,0,1,36ea006c3e0892b8f545351d854034553febc6f34f927c8243d3a3b84d7b695a,2024-11-21T01:41:40.823000 +CVE-2012-3818,0,1,41253110a8d2a74faeb390e2fa26780729086c29906c770f63df852b2136523c,2024-11-21T01:41:40.987000 CVE-2012-3819,0,0,fe1ff2516779dbdc0f0231f9f91c2a150194072edc117b25457888812bfdd27d,2015-12-04T16:16:02.307000 CVE-2012-3820,0,0,3ab8c102d467cdc9e90224b19e3d8b301f8134446969b15d97edf801f482a509,2017-08-29T01:32:05.807000 CVE-2012-3821,0,0,86063b2d0312774c586f06f1b2d6f68a47829535ede2b58cb0ba8ed39d6e621e,2020-01-22T18:56:10.753000 CVE-2012-3822,0,0,4b21253bbe9cbf2783ae128949144d5a057bcf988cd92c7cc8350c1f75318211,2020-01-15T19:31:02.513000 CVE-2012-3823,0,0,26d87a521fec3cb2f9442939b0ba3d002cbf317d0e35e42bf371de71f4b0371f,2020-01-15T19:45:41.570000 CVE-2012-3824,0,0,dfb0b6dfa2099d3ffba16c2c736f30525005d83939f67d3d2292f92800688422,2020-01-15T20:16:25.217000 -CVE-2012-3825,0,0,964fb9e16324883affcd1aae5999e819f2949015fa9cd0e044c64d0608e2c7e0,2017-09-19T01:35:11.230000 -CVE-2012-3826,0,0,2440cb6c767875c5b90983bc86430a269a60e891fbd1b08d8f6c678072627355,2017-09-19T01:35:11.293000 -CVE-2012-3828,0,0,103e5a5eb5bd2502808f2204938b8517b0bceac2fe979d0e7b9281910f2e5dfd,2017-08-29T01:32:05.930000 -CVE-2012-3829,0,0,499c2d3b9396911bca2cb4ca85c931450fedf8b2923019e40fc087db7cd38441,2012-07-17T04:00:00 -CVE-2012-3830,0,0,def8a5479beb89f9f30c38e47ee8cd3d50abf1fdaa7db72ca0107492ebdabab6,2017-08-29T01:32:05.993000 -CVE-2012-3831,0,0,c850bb190b8f1758f5a96b6dd3ec5e98fd9691ec06cc11c9aa437e3f9f5860e3,2012-08-14T03:38:51.877000 -CVE-2012-3832,0,0,a98f8e33b5d01f1a9f0e07df2b85a85eee7d82b6939d8e66a1cb36aa94678d5f,2012-07-17T04:00:00 -CVE-2012-3833,0,0,029c539156c898b5067430e53debead0c19a61c74f8b63ae3f63d7c9399968ca,2017-08-29T01:32:06.040000 -CVE-2012-3834,0,0,edda9daaa571946a8bb7273e7ddcf46a5014931c02e47b26508b17538aee65fc,2017-08-29T01:32:06.133000 -CVE-2012-3835,0,0,9b955c27d5aed35e2500bc54a479db210c2cfb14348ea9a3951e6e1829b9860f,2017-08-29T01:32:06.197000 -CVE-2012-3836,0,0,fc991d32e934e80a7d8a586d33b60c482cbabdb29e0e5b434fbf8e3b45664183,2012-07-17T04:00:00 -CVE-2012-3837,0,0,8f898c871abf139e473a110ca70c5e1bab165e360f12557657af8e5725cd90ca,2012-07-17T04:00:00 -CVE-2012-3838,0,0,a5e885a1b19574434451ed3a8a870442c40ed36264ece127222e3b5d67a71d54,2012-07-17T04:00:00 -CVE-2012-3839,0,0,935529ea8cc5ae2f7d82aabef08377f8d0f5e11d62718a01407bed8fb98a7e1e,2017-08-29T01:32:06.260000 -CVE-2012-3840,0,0,f8601b2d23dcec864a28346b409b3c2a83772bb9374c0ffe0deca5ac087907f8,2017-08-29T01:32:06.307000 -CVE-2012-3841,0,0,ee0858f8bc80026235820f80855d5cb6431bef5c0dea41441a9c7419c05e839b,2017-08-29T01:32:06.367000 -CVE-2012-3842,0,0,555b996e2d9959298f5344970997d799c8e7c9939a68b56cf0bd5b6fc8f9b9cf,2012-07-17T04:00:00 -CVE-2012-3843,0,0,7295ef527cab1840b5da9f770a88a980e4f6a1bc0fb26e6c5c05df4509fc3153,2017-08-29T01:32:06.417000 -CVE-2012-3844,0,0,61f289da5838a48e6d56cbef0c2c8f0654aea6153fdb5309556dc4a932f426ec,2017-08-29T01:32:06.463000 -CVE-2012-3845,0,0,33d042a61f52b6df6e8acf18f13da32d7e6f076585d6abe2ebcd5b1c042dcb95,2017-08-29T01:32:06.523000 -CVE-2012-3846,0,0,eddaa82c01b80830b05c52067f3d4519f9a624ce4065359006913dc2dca73cc1,2017-08-29T01:32:06.570000 -CVE-2012-3847,0,0,e80404e58f462f03715c7608de63369c442945b9e1060549130edb1c1d58a40d,2012-08-14T03:38:54.987000 -CVE-2012-3848,0,0,d4616d1dd31a75b2b876114d2dfdb13951763c0324acd1f758f4a829403ccbfc,2018-03-08T18:30:40.520000 -CVE-2012-3859,0,0,07816de3f35a993ddb3ec3c91cd07e2a49f34a74a1b04a9e47b28b1759ed358f,2012-07-10T14:29:29.247000 -CVE-2012-3863,0,0,fc9328af3458f3f8d4cbd524ca05b5f6cf344349aa9eb956185226004bc77c21,2013-10-10T18:24:06.903000 -CVE-2012-3864,0,0,26ed54cca4183229a6afa003ad921d988f47928dd20b0fbad2a0d84f3a554ac9,2019-07-10T18:02:28.767000 -CVE-2012-3865,0,0,a9e0cf0987c4bb7c595ad3b292443f9ba4f815dd166af65cc3bc9746dcbf48c2,2019-07-10T18:02:28.767000 -CVE-2012-3866,0,0,54e66e485074ed64bbe79ef315b72412b3f6773843f416cc4b3dfc5554901692,2019-07-10T18:02:28.767000 -CVE-2012-3867,0,0,af51ab2a2c831357809d8bec4eb5fbf177bee29ca15993dab80a40f39cad5ae5,2019-07-10T18:02:28.767000 -CVE-2012-3868,0,0,19ac989b8a61fc40a2a8bb91263f95cde26dd48e69c1bbcf030e8499520a9dd5,2013-11-25T04:27:14.883000 -CVE-2012-3869,0,0,7fa141569a69a7260fac8558ff1d800ef499799c06442dfc6f18aa61faae6112,2012-08-14T04:00:00 +CVE-2012-3825,0,1,5ddc864fde899cdb143cf78639530e8105208d52007237fa06645a73a1ec0d86,2024-11-21T01:41:41.973000 +CVE-2012-3826,0,1,6b6cf68aa74cb7f85a3c50b8f65cd26c37df4ff4d65e25d3bc37964af14682cf,2024-11-21T01:41:42.120000 +CVE-2012-3828,0,1,9dd482933f70373b0aaba47642e8f3077a83653f1ea6132b63ca4852e60c9e49,2024-11-21T01:41:42.263000 +CVE-2012-3829,0,1,a793e1a93de1e5206b802814ece55ac78ae0066817fbf4c318cdfd109dfad94c,2024-11-21T01:41:42.400000 +CVE-2012-3830,0,1,297cf1bfb9260eb24daac06a3e7dbf4179287bf898d57263b51b83183d81ddb6,2024-11-21T01:41:42.540000 +CVE-2012-3831,0,1,8149d8ff87a4892a53d25270db9c3682035915b67846705108973f70819fa0fa,2024-11-21T01:41:42.683000 +CVE-2012-3832,0,1,a4098333c210ea969e344b027c6d6b1bd562e8c47b9570b31659fcd88889345d,2024-11-21T01:41:42.843000 +CVE-2012-3833,0,1,5a0e3eb20418eff7ca540228d46e4f66a4e74ea23ebe56ff4dc14c4571b12062,2024-11-21T01:41:42.980000 +CVE-2012-3834,0,1,245eb304b5232d0a63a26507d2ac00b93e5cced45c31de068be2d16314972204,2024-11-21T01:41:43.123000 +CVE-2012-3835,0,1,e873314cd2932f66768001ab8acdd13ba80eee20b0a1e8289f77eeef7a28d81e,2024-11-21T01:41:43.277000 +CVE-2012-3836,0,1,df639f418ca9b6daac77ddd13782718007f1939ab69f38a75da3bd6ac8369a7e,2024-11-21T01:41:43.437000 +CVE-2012-3837,0,1,506334a9e117bb6f7898f70f879abcc162c77741c4641af20423cbe31b9e79ff,2024-11-21T01:41:43.590000 +CVE-2012-3838,0,1,ea24f2fe6fdfbc2e168017da957d0c2e1c44c369fd79cd7ffa5e5b85e68edad7,2024-11-21T01:41:43.770000 +CVE-2012-3839,0,1,e4c4b8e27a1aad2053256f277061c986a7652c89e87cee60fb70458ba9d28f4a,2024-11-21T01:41:43.920000 +CVE-2012-3840,0,1,f05072afd960a278179ada3312e098c155412f08bcd5e9a8ff5588bd3a38ab78,2024-11-21T01:41:44.073000 +CVE-2012-3841,0,1,8365cd441d35a25df7c9d15c4152eeeab377720c14944b24392fb32bed8328e9,2024-11-21T01:41:44.217000 +CVE-2012-3842,0,1,e8229eec91fea2a313a578a355287af547d901b70758724e6cb6c26dcc4e90ec,2024-11-21T01:41:44.360000 +CVE-2012-3843,0,1,69d3fcc8e8757e6b2a68454ae25ef6f32856c9bd4e5423c3aa13987d2ad0f7c8,2024-11-21T01:41:44.497000 +CVE-2012-3844,0,1,24df579a7c699865ba16fe8fdc502b7881b31749b0bdfa5091c173c924fa11ab,2024-11-21T01:41:44.627000 +CVE-2012-3845,0,1,16800fb553826c2610103b27f7d37f12a257336362e463e318a87b2341e19dc9,2024-11-21T01:41:44.760000 +CVE-2012-3846,0,1,b9b8f9f921d95ba3467bd3ea44aa07d411c914b0d4cc064dcd23337f9672ccf4,2024-11-21T01:41:44.900000 +CVE-2012-3847,0,1,8200e9192bc8114f38dc8fa6ffbaf8fdce99a1563a03565d298b2e93164b8957,2024-11-21T01:41:45.030000 +CVE-2012-3848,0,1,3e0ec479f0132d507ccf4d79c76ad006826ec2df3372f4c49eb166279fc0cf8d,2024-11-21T01:41:45.163000 +CVE-2012-3859,0,1,d83a91238ee563c622c7f6cb64a63b3ad1cd45af9e8e4995571f85fe9fbab90a,2024-11-21T01:41:45.300000 +CVE-2012-3863,0,1,3441c82cfd71f54a71686b1cfde64e203890b141fa9b96eb5749ca33c428c2df,2024-11-21T01:41:45.430000 +CVE-2012-3864,0,1,fa30bc310dde38853686d2666c3499c4e1d37e00d7f526327a95ab4ce71790c2,2024-11-21T01:41:45.597000 +CVE-2012-3865,0,1,f2926caef89464d69a8ab87214c31edc852f8e32ca7547c2121c314a55929a6d,2024-11-21T01:41:45.757000 +CVE-2012-3866,0,1,38db5c28412409c8bf00a640766a7b1617762da0b9ea491ce4dd32ae341fadfc,2024-11-21T01:41:45.917000 +CVE-2012-3867,0,1,c490b9873edda8e65efa40305534625a5c57bf577fde20d61d0206020fbd1e28,2024-11-21T01:41:46.083000 +CVE-2012-3868,0,1,c6fd282144c63fb5e646bff55afd302cba8951c76a4860c972ea7f4fbed4c937,2024-11-21T01:41:46.270000 +CVE-2012-3869,0,1,ffc62bd2679f7d7134e76549c4cc6bccbbc272c70e6dade42ba5f70f6c8a964b,2024-11-21T01:41:46.417000 CVE-2012-3870,0,0,361cab09a1903714e1bc186f15862217d4aa9e7304046d211616f011a2ad661b,2012-12-28T11:48:44.377000 CVE-2012-3871,0,0,62c17e0d401b021c1c40d69db32b50cde95806b92908d5e6155cd86b24b502a2,2012-12-28T11:48:44.407000 CVE-2012-3872,0,0,054115f1fc088b5789f1cc04e6ec0604cfd7a27431a3546c2c54ae85d2f99b4c,2012-12-28T15:06:44.097000 CVE-2012-3873,0,0,da7f97978160240260cc919edf986cd4d391e050c537b9fdacea554e4e57c1e8,2012-12-28T15:09:50.003000 CVE-2012-3878,0,0,7ab2976395da854918911b7ca6937c0ff58e398190deb9f95f08b36ce0abdce7,2023-11-07T02:11:41.510000 -CVE-2012-3881,0,0,d7e029fdf9bd462ccf7e87f355bf5a6e7732c0df87aa648380c1e4b0555615fa,2012-07-16T04:00:00 -CVE-2012-3884,0,0,f983f02b4b08d4d284cf348d7b3abb0f6168ce914428f70a0ed4e2984d6093d1,2012-07-27T04:00:00 -CVE-2012-3885,0,0,c416bb1015dd67fc1f833de7c177f3fb0ad68f413b1b215112056a8bcac8aff0,2012-07-27T13:45:49.840000 -CVE-2012-3886,0,0,acada640e5887343beda7121473f2eb7b5a6c3edf09f6eed5786b9aafd131bb5,2012-07-27T13:48:13.463000 -CVE-2012-3887,0,0,a01291107833f502158578dba96d41620481c200abb94f77f7fe46204746c54c,2012-07-27T04:00:00 -CVE-2012-3888,0,0,e57de1bcdf91364867ccb58ab71ad5d8ba24c4d9f1ac8faaf6a958bbafca8bb8,2012-07-27T13:58:19.637000 -CVE-2012-3889,0,0,9920deebefc3fcc21ae2ca3687fcb70368f39c07e4d61a918a226a727e50514d,2017-09-19T01:35:11.357000 -CVE-2012-3890,0,0,f3bfba9bf9aadbd4b8c22f761ec5ac5c09c1122cfa3330c94c22eec53abc25af,2017-09-19T01:35:11.417000 +CVE-2012-3881,0,1,2d3224f97ccebfe2f5061510ac3f6a85c24654c7ffc57dbe7ce430243f12b370,2024-11-21T01:41:47.150000 +CVE-2012-3884,0,1,22d37e6dbc6a40fc3b563832964b6b62a3cccd9baa8383ef98ef1e0e43aad69d,2024-11-21T01:41:47.290000 +CVE-2012-3885,0,1,c8aaa868b321b1625a4cb979ec770bc73f232e4bdea3ae801f2916393b9372c3,2024-11-21T01:41:47.427000 +CVE-2012-3886,0,1,bf16deeab0a54a07318ce114d20b4448303c2ada4af06d6044df22521d386809,2024-11-21T01:41:47.580000 +CVE-2012-3887,0,1,ae5ed86b345b044edfd9d1006a1c7d853166ed560117ec986c2a49b0a82052f4,2024-11-21T01:41:47.713000 +CVE-2012-3888,0,1,b9515db0262ac88c3849697556d41d688dd5001527fe6f2f6f06a1d27c7e285f,2024-11-21T01:41:47.873000 +CVE-2012-3889,0,1,bdac972370502cb27c34a73368d1c94633efce01de498d85b2a08c69b1c08562,2024-11-21T01:41:48.017000 +CVE-2012-3890,0,1,b323703264563e109e539f699a60f25dc002f38c5be79545cfff6d22b04f0b04,2024-11-21T01:41:48.180000 CVE-2012-3893,0,0,79d17fb7df0f52924d5ffa65e16375866d4b71d2a381658ebbdde57bdb8a4d4c,2012-09-17T04:00:00 CVE-2012-3895,0,0,cfd612afc50d7c9608f24c7230cbcb930ddb88742e41dc23ad4321a983c5c155,2017-08-29T01:32:06.633000 CVE-2012-3899,0,0,22c71a7a1ca0e77af843e2bcbe0b8ed1223e9ae91e8e31bae8e542c3baae7c10,2012-09-17T04:00:00 @@ -55345,37 +55345,37 @@ CVE-2012-3941,0,0,74267e2bbf208a46706ee38e8ae3730b08bf7d78abe12172c172d091cd27db CVE-2012-3946,0,0,7f0d5d2bc5d83c85b4adbba7edb148d7f2cb8da27cd7a9ed4a86b6ea8e70b8ac,2014-04-24T18:38:17.737000 CVE-2012-3949,0,0,a21bac054e71cb5197b882cd014a999f6d75068d50da34305d61616f8ac22440,2017-08-29T15:29:40.550000 CVE-2012-3950,0,0,7ac683b4bfe46f561368e7f7ca27f537834bc5477547179e4f463d37689b0f1a,2017-08-29T01:32:07.117000 -CVE-2012-3951,0,0,9305a6a06282a480514358b0136c56c9c512bd52ae6818dab8fc8a526928875f,2018-03-12T17:21:34.897000 -CVE-2012-3952,0,0,02550acc77feaaf330c48c89f7b4d6aceda3c12a924d7daf9757616934360a21,2017-08-29T01:32:07.197000 -CVE-2012-3953,0,0,532767e61eed2fcfdbc3e69afef361554b57b75036f3c2a00a1613398403376d,2017-08-29T01:32:07.260000 -CVE-2012-3954,0,0,34e351e7f97e57f1328fe3c821d57d9a8b965c10ecc4e82a7a94460faa1d0c06,2020-04-01T13:59:57.067000 +CVE-2012-3951,0,1,16b4019394c88eb72e5d8bbd95ce472b637ee70a8004f492f85ea4379953c2fb,2024-11-21T01:41:50.787000 +CVE-2012-3952,0,1,187ddde72138378a77d4afdfd88284610d5600048379ae2b28adc5b37d14e92e,2024-11-21T01:41:50.923000 +CVE-2012-3953,0,1,7cf8e3e49514592f37d7731a99179db42681b43481724580cf9acdcccc55ae47,2024-11-21T01:41:51.067000 +CVE-2012-3954,0,1,d5758da07cb0af77828646046c00a47d3059d2f1d49ce85207d285a47f709186,2024-11-21T01:41:51.227000 CVE-2012-3955,0,0,2be6b239b58800858bef46036ac2496e9dbfe83e14c2c6b490811ce2c2c3d99b,2020-01-08T17:16:40.980000 -CVE-2012-3956,0,0,ef54e2299cda7a2731736250b15f4aa75a1364ceeb1df2f1045599ae1b32ea39,2024-10-21T13:55:03.510000 -CVE-2012-3957,0,0,a07fd433edc8e177d652a2c5ae099f31918c560d5057913139a2497580db72b8,2024-10-21T13:55:03.510000 -CVE-2012-3958,0,0,d25788c0fab6e711a6889e354f8c710d0776aa8b542ecf137e33f52de1109632,2024-10-21T13:55:03.510000 -CVE-2012-3959,0,0,daf4a67392a6d8e8b2fcad48ef03f9183961f121cf9210e73c47170d760bf0cf,2024-10-21T13:55:03.510000 -CVE-2012-3960,0,0,42b1bd670820885d367c797bda19dd0394102adf0338494db93adf31a5d3c99e,2024-10-21T13:55:03.510000 -CVE-2012-3961,0,0,40a342007191395036a3bd085e7a89c21ce6711b8e899bc99adc399bb8e3a3f4,2024-10-21T13:55:03.510000 -CVE-2012-3962,0,0,a8253a8f3bac033bebfce4693d3a33e6aac6b7aab872ca38aab00fcfd8e75dbc,2024-10-21T13:55:03.510000 -CVE-2012-3963,0,0,3c22c005113ef2351b24722169d301d457ea9c62e0ec849db66b9c0c07beb914,2024-10-21T13:55:03.510000 -CVE-2012-3964,0,0,cc72adc9c1f741b5c4fdddf30de9626d9608a281196e4218baf05b50fc18d37b,2024-10-21T13:55:03.510000 -CVE-2012-3965,0,0,53489d2ad1654bcb66ddd064bbfb5d196e3ee4170bb062591f7dd3b127d96fc7,2017-09-19T01:35:12.653000 -CVE-2012-3966,0,0,6062db6c258556fbe41e9c1cddfd0caa92c3993dddf3f8442362abad7f23c154,2024-10-21T13:55:03.510000 -CVE-2012-3967,0,0,ed1ae7e98fba4a64fbc5225c3bd6eedf5f638f9e096d77092a066fe4d59e3e88,2024-10-21T13:55:03.510000 -CVE-2012-3968,0,0,b36381035991aa41450bd151169e9b6ff3416c76272b1833f0308223a7d806e6,2024-10-21T13:55:03.510000 -CVE-2012-3969,0,0,0d0dcd3bf709168824bbf1ba3f3e31fcd253212b1178ed9a1712ada61d707df7,2024-10-21T13:55:03.510000 -CVE-2012-3970,0,0,793b550bef2991fb743abdf8b6acdd28a40cb8d77afc8be769dda0198cc1e388,2024-10-21T13:55:03.510000 -CVE-2012-3971,0,0,d9513a242d3ab8651890ddb5e34d89f70ffc1bdfb0759138a046da25db7fd000,2017-09-19T01:35:13.510000 -CVE-2012-3972,0,0,f2f8d8fc7fd1898a26433341e2621af3b7de76f498a8fd60080fc0137fb36e72,2024-10-21T13:55:03.510000 -CVE-2012-3973,0,0,81461171ae5c4de54454581baf3605bdaf1c5b85c763de9b028fb869637d2c17,2017-09-19T01:35:13.730000 -CVE-2012-3974,0,0,251d3e3aad6679205c5e514aadf0f2950c718a545d3ce44fe404602dba9b04b5,2024-10-21T13:55:03.510000 -CVE-2012-3975,0,0,8d7b0293e976e1f2b5530058c41eeb01c97f7aff6cbba6203fc292b670051118,2017-09-19T01:35:13.983000 -CVE-2012-3976,0,0,5cb49d292e660129b6da6df182b9f68f922473625d54f3c9fafb999b3a2584b7,2024-10-21T13:55:03.510000 +CVE-2012-3956,0,1,ff01236633ca321c45375a74e8e172f422c5d0a6eb707e3c234d2996e70f51d1,2024-11-21T01:41:53.073000 +CVE-2012-3957,0,1,b844f9d1eac62a9bb8efa4ccae266e3021b85ff9704cd9886db8868e5036531c,2024-11-21T01:41:53.233000 +CVE-2012-3958,0,1,1862d7d08d6c2858797dd6ea39b6b2b1db9a9f23c28487c8d02f4cbe8eae4b78,2024-11-21T01:41:53.400000 +CVE-2012-3959,0,1,7f996c460e1379632767e67c5dd146355ca7b5e9171ac0b7bf1835d0f93a276d,2024-11-21T01:41:53.583000 +CVE-2012-3960,0,1,4c00ad74385974a67b52f259c13ef1aada1552024b64fb52667b58d5e10a9f8a,2024-11-21T01:41:53.757000 +CVE-2012-3961,0,1,a8e6f94a4f408aa4ea5eeb2af54ca21641aa7d85f62d7775e1f7d8a67708fff9,2024-11-21T01:41:53.917000 +CVE-2012-3962,0,1,2b55964d47b79509993590439b2ccd2ffeda9e2ffc92b449bcbf4d0b4073f8b1,2024-11-21T01:41:54.083000 +CVE-2012-3963,0,1,01273873ab8cc2137a653c0d7214619f0aeafe65b0839a3be1d64a5b22bd341f,2024-11-21T01:41:54.277000 +CVE-2012-3964,0,1,4801ebb777f80500921029027f285a1ac644d2a00e02c76fb28916a7851b3588,2024-11-21T01:41:54.433000 +CVE-2012-3965,0,1,623b4d692a0fea9f8f1dc7236c2f6d439887d7cddd30ee849729958973b3c8da,2024-11-21T01:41:54.627000 +CVE-2012-3966,0,1,9b102be61a1938d6025607a00f4d14da15f9027d05205466b689e675c2de3bf7,2024-11-21T01:41:54.787000 +CVE-2012-3967,0,1,60561bd9c1e244cdfd098c7e4bff0685cfc76c7b59c46c1b03bba0e3600d5bc4,2024-11-21T01:41:54.963000 +CVE-2012-3968,0,1,516708ee8c57d2798e0de31fa671008004f31aa429711138060661d46d3587a0,2024-11-21T01:41:55.140000 +CVE-2012-3969,0,1,0f976944c741bf695a63579796c2dbd71d89b35a984a0cd32ba247d9ffa8de01,2024-11-21T01:41:55.303000 +CVE-2012-3970,0,1,59b108bd0ca3dbc917ec4a5ba7fea3d7f6fa1d8f8753277d4cc9fd6b30ce77c8,2024-11-21T01:41:55.497000 +CVE-2012-3971,0,1,2fcf4a958aab5dfe41c4ef100f3f4e19978fb6a4bb10e1306f9c1605041e5783,2024-11-21T01:41:55.697000 +CVE-2012-3972,0,1,d18db921edbd089fadd415b2bc081445497a500f4df4066abd8703e16d8ea872,2024-11-21T01:41:55.883000 +CVE-2012-3973,0,1,dc42027eef34f12fd0a8954c03068be91f7e1da2865f4432de45c615fb4b9996,2024-11-21T01:41:56.077000 +CVE-2012-3974,0,1,e80901300bbe7e43723f442902d3510f6cfeab840a230c05cbba2a194a9c83bb,2024-11-21T01:41:56.240000 +CVE-2012-3975,0,1,c344fcfd8b94e7c1c2f451878ec6a0b641535b63ece8203d876942d0eeb61deb,2024-11-21T01:41:56.417000 +CVE-2012-3976,0,1,5e31e4fbe904e6eae9c23dfd760836f108b15c58ffe22ea62111d15d32e5d493,2024-11-21T01:41:56.597000 CVE-2012-3977,0,0,920ad0c2f8382b1a4438c3d7a6ecf83f4bbf330a39d56af02985c1e16589a5b9,2023-11-07T02:11:41.997000 -CVE-2012-3978,0,0,29baf885fbc53c7132d14c4fba1ea48f937788122d25cd3d5766d200647e0ca9,2024-10-21T13:55:03.510000 -CVE-2012-3979,0,0,14b0feb908acad5ba2b73605ee365188f4b00bdddd3180b52df76c7803f96b63,2024-10-21T13:55:03.510000 -CVE-2012-3980,0,0,4e30ec19b6b3f8fd459f3829cb8db5703bd490f99741920b5a6e5dafde8b5257,2024-10-21T13:55:03.510000 -CVE-2012-3981,0,0,c9c82193a0bdcbe06050b508fa642b81cc41fbccce1ae6958db7f96cbad4e97e,2017-08-29T01:32:07.353000 +CVE-2012-3978,0,1,4311e34b7a97119c0c5d3d089b00b0092296ba62cd05600e4ffb960a44c153c8,2024-11-21T01:41:56.767000 +CVE-2012-3979,0,1,a175b021e9bffe66c9d14e096adda529854dfaee9563d98840628e7cac7c9c81,2024-11-21T01:41:56.957000 +CVE-2012-3980,0,1,4b6923dc43603d84c84d86f8282e54de5d355c080ecb4ed0ce4cbf27c8aaca6d,2024-11-21T01:41:57.123000 +CVE-2012-3981,0,1,1abd532c3a4e2182e5a4ade180a2f0c984fda0fb23f161fdb287f9549050286f,2024-11-21T01:41:57.300000 CVE-2012-3982,0,0,f24ec8fe58ba062b9008f68682a61faa04366561eea107f78ab0412a38c60934,2024-10-21T13:55:03.510000 CVE-2012-3983,0,0,9467f009aa6c75ffa615a1da12418c2d4d16edd97e0e68594cb1f6f7b6383f5c,2020-08-27T14:53:01.623000 CVE-2012-3984,0,0,a6f2bf4eca5d495b42e662f1bf55c205ba86133fd3b9c9e1328c0e0407f46321,2020-08-26T19:36:10.453000 @@ -55390,23 +55390,23 @@ CVE-2012-3992,0,0,0e1ec49350fcacebb0ef616d6b8cba4d5227daeb5ed5258c6ff2370b9bd04d CVE-2012-3993,0,0,f88b3322fdce8c93ef7e3776a3b273978507ca059982f12b0d3828421cb7ac28,2024-10-21T13:55:03.510000 CVE-2012-3994,0,0,4b16c6b4afcc773948e424c299c284e2e89ca2f773e80ab5856daae4e09a1b34,2024-10-21T13:55:03.510000 CVE-2012-3995,0,0,8197176238b62701ef47db01d244c83919c956d6e5b4344c99ebdd423651532e,2024-10-21T13:55:03.510000 -CVE-2012-3996,0,0,ad007cca1319351d2c9819acc11feb42196d6c04e166372cd5f2bfb3d08f39f0,2012-10-24T04:00:00 -CVE-2012-3997,0,0,05b98d89ec7afe524a9b9680ca1f05f4ec1e437d255bc33e75378a6451055f8b,2012-07-19T04:00:00 -CVE-2012-3998,0,0,e6824bed22a2188c9b61d6d7a3531538f2bd21964b7c0f19f5f4a25db32b2d12,2012-07-19T04:00:00 -CVE-2012-3999,0,0,0e0a2bdd1a763a673f18ac6dd985d08fb9991436f0d90642376a4eac1e0a724f,2017-12-01T02:29:01.270000 -CVE-2012-4000,0,0,0a5c9cf18b3b76ea1107cd699ccb602da847ec78e0abe4831db2aae1cbd402a9,2017-08-29T01:32:08.023000 +CVE-2012-3996,0,1,09528cd4d154ad877e506bd1c67f1b401eb430768d442df844d7b19f42637245,2024-11-21T01:42:00.080000 +CVE-2012-3997,0,1,7574f295d881746e57832fcd9cb06c9159e3aaf6d5ee2dcd78c081292e79d3c1,2024-11-21T01:42:00.247000 +CVE-2012-3998,0,1,a340380bffd65a0f534a2c481ce410c01413572f4ac9c974e2539042a52b7f94,2024-11-21T01:42:00.403000 +CVE-2012-3999,0,1,9481682f7056970b5537821eec910b15e17e04eba20e7d62e8db9b0c862c2eee,2024-11-21T01:42:00.557000 +CVE-2012-4000,0,1,f89c5622623dc40b2da01536979f5ff2661d33dcbc70182d53949a9a1478b1a9,2024-11-21T01:42:00.700000 CVE-2012-4001,0,0,0636a6972f3c76242ff7c1a7801ab9a9e591c5244027fe7161b0ae7baf1425f9,2018-10-30T16:26:14.530000 CVE-2012-4002,0,0,36fc16e47f0bfb8261b23eeb545397d945bf9a18fe074b4c0fd6b3ba088318fa,2013-04-11T03:30:31.587000 CVE-2012-4003,0,0,e94d2f4c680f27e244a8047dd503916ca382829b7a7b7e7694838080bd52fc9d,2013-04-11T03:30:31.653000 -CVE-2012-4004,0,0,c80a7622e99b6818c35b78ef37f3bb396bea044df1f52186161844857b0ff64d,2012-08-09T13:47:10.197000 -CVE-2012-4005,0,0,c4de706dbaca53b292b70dad109656b180532deb9aa37a865da7e3de0f8bcf13,2012-12-18T05:00:00 -CVE-2012-4006,0,0,ae0a7c0b5f15da5e9337523708069476b87367caf2d862fc3aaf453ab67df99d,2015-11-10T18:57:32.893000 -CVE-2012-4007,0,0,2012c85473fd2c8a69f231c8ddb8d753590392fcabd7784922f0e25f97cd6550,2012-08-20T04:00:00 -CVE-2012-4008,0,0,0c652474a73eb718ec51ead591d062788671dbfa8220921cb3842e1bfdbe77eb,2013-06-19T04:00:00 -CVE-2012-4009,0,0,ab6ab8641cc15cb72cfa5271d92a97979f8c7424c94840bd7343b693d14112db,2013-06-19T04:00:00 -CVE-2012-4010,0,0,a70b9d9e1a79597cf898d7e3a3bec0957bfaf7d944fdf26407b1bba2350546b5,2012-09-13T04:00:00 -CVE-2012-4011,0,0,a9c411bc7a43d2d9d000ffd4659d84fb8d3642790aa8902034ce3b4f2dbe34e3,2012-09-17T04:00:00 -CVE-2012-4012,0,0,748a2d44446eca1ce550d80a85051fbfc5ce26816a0a3d833f9fe1beb68c424d,2012-09-10T04:00:00 +CVE-2012-4004,0,1,2ead05917042c35afb740c812915b65462467abb24ad98df892f694d00ae78db,2024-11-21T01:42:01.333000 +CVE-2012-4005,0,1,85c94f6c1fb1928ec4c57f2031f27f208a664f12743c96e0a5d67722d8b72063,2024-11-21T01:42:01.467000 +CVE-2012-4006,0,1,b7148b5ba5a6be252f6c3926f34c6df69828ff18837ce055cc1f3ede62b10482,2024-11-21T01:42:01.587000 +CVE-2012-4007,0,1,8c1f4957c00200df268c7b76a42a7106d09f39eae7f972e51d73e45f73bbac6a,2024-11-21T01:42:01.720000 +CVE-2012-4008,0,1,4d3f9ad63412c296abf56433dddceb29f2308cf0af060f12c6a395333141ccf9,2024-11-21T01:42:01.840000 +CVE-2012-4009,0,1,c79aac40297fa09b3c2d197d3e3a3e2c9f2a6f43165f117abe2cdc936fcb70a1,2024-11-21T01:42:01.950000 +CVE-2012-4010,0,1,ac6b07920befb4a152714d0efe3a8950bd3c3ddcdae9d8f3da702e677e16884f,2024-11-21T01:42:02.060000 +CVE-2012-4011,0,1,22f044ed18fbb89d4b7603ef943f256b6defe683e6a9385fee6957585612dac4,2024-11-21T01:42:02.203000 +CVE-2012-4012,0,1,2e7169ca7e523430b6cc2bfaa388ec20a40477bd02f2a91245fbdf3f97698c22,2024-11-21T01:42:02.320000 CVE-2012-4013,0,0,e81317fd1af74069027f7e37cbfbcb64cb61d1c4ff3e13234dc8bc0009ebe82f,2012-09-17T04:00:00 CVE-2012-4014,0,0,248499f58c6b5c7e734fa00d54e8c40ba68d2a77afb7c1aaeae13978fd76ee78,2012-09-25T11:07:47.783000 CVE-2012-4015,0,0,c0733d548b4d7869ec11c06cf1fa46819399a38c2129a92491bfe18dfba6873f,2012-09-25T11:07:47.847000 @@ -55418,46 +55418,46 @@ CVE-2012-4020,0,0,c69acff71cbeb0c4f1262766fc99a5b5c1630e7d31567e25532fd06f12c972 CVE-2012-4021,0,0,98a8a4f159b797695dff8f3cbaa4f75747a0d1b84af59fefb95717c45f90f6af,2013-03-02T04:44:58.603000 CVE-2012-4022,0,0,338c3142b7e0ed641dd63431eecc55740ee93c6f76d2c7499701988a380b6b8b,2013-02-02T05:07:29.880000 CVE-2012-4023,0,0,69259c370e4a96d2bf73d53271cc32edb6c345d6a3e9750afa333b351301b0c0,2013-02-02T05:07:30.100000 -CVE-2012-4024,0,0,40ef662b26cf4ee4c842080c6d428c32ebe8870cc77c6a9f0f43f56c418c8fee,2020-01-10T19:07:34.667000 -CVE-2012-4025,0,0,7f8fa29ac31976c687948f805a165e8d8bda9f436a5d5393b80cdc09183de0ab,2020-01-10T19:08:04.323000 -CVE-2012-4026,0,0,9b89535c676be0b5bb8da004395d37ba36f1cedd0300c6d0d71f31816c9b746c,2012-08-24T04:00:00 -CVE-2012-4027,0,0,8481f4281210b36c2417c126069079275c48abf685a2aea77c7ea0ad0066a46b,2023-03-22T14:09:05.423000 -CVE-2012-4028,0,0,890d25a39779b9cf26f24eaa2e4c6e5662d7386c6a44dd2b36de69bc5dc22d54,2023-03-22T14:10:02.130000 +CVE-2012-4024,0,1,208d0bf9f2cc088c841707771c8b2a447cd330b6e1913d73734354c3ff21d786,2024-11-21T01:42:03.820000 +CVE-2012-4025,0,1,ae8ec80f77cda0023dce4d7814f4fceefdcd2e914a2b80976161acabf2ad0cd1,2024-11-21T01:42:03.987000 +CVE-2012-4026,0,1,4af28101d6fdaaef7ae08b476b0574d80472ab9f1f93873774235b0970fad38f,2024-11-21T01:42:04.143000 +CVE-2012-4027,0,1,28b9f234d297b914c3b37827e4a5a686bb778275f788962dbe7ffe535e241bec,2024-11-21T01:42:04.297000 +CVE-2012-4028,0,1,9550efffa5211a6840a5090d6ac6a9b0d526b187f541478a2a4d7bda1fa4145f,2024-11-21T01:42:04.447000 CVE-2012-4029,0,0,67fae6aeb3021b962da616b626b96d6b04ee7a751189965f3df5244d54dff429,2020-02-12T15:29:46.673000 CVE-2012-4030,0,0,40b664c97f5ef136e0250156cc7026fb99bff7275af9e8088d116c76173230d9,2020-01-15T20:21:08.570000 -CVE-2012-4031,0,0,6e9ab841b32e563ab866b0a5ba1d57674e7a2b92fedb57859c44780d03d6e2d9,2017-08-29T01:32:08.197000 -CVE-2012-4032,0,0,a99da15d055aca085818160cd38e361a21bb522f89f02493036bb4cff7f99903,2017-08-29T01:32:08.260000 -CVE-2012-4033,0,0,f0f34f1e07f7a493322efd1645ef544babc531e49b8e7efd8b5d40893cdfbe5f,2017-08-29T01:32:08.320000 -CVE-2012-4034,0,0,08c7bb97c19de9ea4058b985c05a73ee60f288c03e2aa2025b5060e5b67e5a37,2024-02-14T01:17:43.863000 -CVE-2012-4035,0,0,7d21f7c3444079fadd9d8181d38fd5bdcf0b5ffe1d26916dfdccdd44e064a3ed,2024-02-14T01:17:43.863000 -CVE-2012-4036,0,0,5925cf109bd0ab85188f555a4ef6ddf42906450b872a0d305c05a15b2a451ec4,2024-02-14T01:17:43.863000 -CVE-2012-4037,0,0,f1b65995af6c3c050367304ac04bb63c071322f09082f511495065c9286ceb3a,2013-02-22T04:40:25.223000 -CVE-2012-4043,0,0,e84780ad1057504d2f50080e741f49f49efa4d25477eb48b8edb9a143864f100,2012-07-27T04:00:00 -CVE-2012-4045,0,0,1b34d36fee1b521978305e31dce9dcf601b66cbab006b0750029764337a81339,2017-09-19T01:35:16.120000 +CVE-2012-4031,0,1,d5bed5b3bc61641cdf573ab6cdd636a49d004b13a88102e1922912c4a0b83844,2024-11-21T01:42:04.867000 +CVE-2012-4032,0,1,9bb8c7714d93cfcad422d02408ad5ba0f2beca5ca2af951a667d4e37a23c3541,2024-11-21T01:42:05.023000 +CVE-2012-4033,0,1,2b3ecd92f88b7f7c61922bf3b363b52ee4e54faa2f044f0571c6dc45ecbb9cdd,2024-11-21T01:42:05.487000 +CVE-2012-4034,0,1,f639a6d0e47738acf33f1b16e9aa41683ef34b15c79c4cc1b5122d3ad2412c45,2024-11-21T01:42:05.657000 +CVE-2012-4035,0,1,93073876362adf7922c4fc918eb4e922ac4972f25105a4c87b5614a543352b35,2024-11-21T01:42:05.807000 +CVE-2012-4036,0,1,a27cc0ff232d1673d54fd3437ced87b6e850b2676dbc541b8838a390612c9b1b,2024-11-21T01:42:05.960000 +CVE-2012-4037,0,1,3625db1ed4094f218e0c79111b93c3fb2d9e05c4b5e5de2e4093c225f0b8ce40,2024-11-21T01:42:06.107000 +CVE-2012-4043,0,1,3af94198cce63cd79acded25491d83f969fefc9d0d27337674eddf04998e1d11,2024-11-21T01:42:06.273000 +CVE-2012-4045,0,1,83333e3576d0277b7934bb8495f456f17ad440980a43816c77539a76f3566551,2024-11-21T01:42:06.413000 CVE-2012-4046,0,0,119665c561c347d0d45a36f73ca8b08b2aaf1df22ce6c6051b52b21b52b0c4d4,2023-04-26T19:27:52.350000 -CVE-2012-4048,0,0,6ac41cdc60b0fc4b2a03a7fb4f3e1b356278ed590c8b337d847344408a9fded2,2017-09-19T01:35:16.200000 -CVE-2012-4049,0,0,7904821e6a98c53bd7036b0598f2c3208ba4631774267937be4bd46de761561f,2018-10-30T16:27:33.653000 -CVE-2012-4050,0,0,59547748252c0163060710db57cab1270b5688308f7974e1ea5f192b557a3774,2017-08-29T01:32:08.557000 +CVE-2012-4048,0,1,1e3fc2ca62abd9d852dee7ed5ccde839e713a8cf82170a95e9650e55ef122d1a,2024-11-21T01:42:06.710000 +CVE-2012-4049,0,1,d1ab0e0c53f44142913ca2e7c036d06040907aaab9a2a0163b49ba67fcd8d75d,2024-11-21T01:42:06.860000 +CVE-2012-4050,0,1,b527cedf50f709ae44734414d8b65ce3c674d58e031969b7f7a7f1871b4da1ae,2024-11-21T01:42:07.007000 CVE-2012-4051,0,0,c6d58a1b5b7ed0f4a74322ae6600a677e01c4a3aaf3c7b85723856ca1ce97d9e,2012-09-28T10:40:22.147000 -CVE-2012-4052,0,0,209b57bbd6757ee0842c81947eb1e490810f60b9e4fdf467bc704a69b1cd9834,2023-11-07T02:11:42.593000 -CVE-2012-4053,0,0,1db145e78859976f0fe2bc9b3994421164e906ee25c36a02bc9d872bd2649fdc,2019-07-30T15:51:48.520000 -CVE-2012-4054,0,0,d376d043a24f37cd3c9a4f38d10e04cff52d483eb771da6964c11e9258bdfd58,2017-08-29T01:32:08.680000 -CVE-2012-4055,0,0,9abec47604b73e6cd5da0fc05fdeb36834b5f7a2579bdbf79311d5299b6064f7,2017-08-29T01:32:08.727000 -CVE-2012-4056,0,0,81a4bd2083e59451a3e705ed25f1c9e62ae671a303eb0448ddac25142e710686,2017-08-29T01:32:08.773000 -CVE-2012-4057,0,0,d3934a184019abab21ed6336af1f3aa0cdd2503e0554b24ee7f10181ad03d1f9,2017-08-29T01:32:08.837000 -CVE-2012-4058,0,0,bdbfe26af157726a583544a079df0bd74f137ae2c7aafbae0461122d946fda46,2017-08-29T01:32:08.883000 -CVE-2012-4059,0,0,5a7c2fe31e2ce3401cb9fc0289542b72fd936221dd5b717e39352acaf4962f01,2017-08-29T01:32:08.947000 -CVE-2012-4060,0,0,edcd1ff1d643068fa3f77d6f942c5ff08c19168cb63f0a9eab72d358f26c6e98,2017-08-29T01:32:08.993000 -CVE-2012-4061,0,0,ecdcc7ade5deb1f01d5204aee2425f6e09c9b2e03869b2144752a2e060bfa61a,2017-08-29T01:32:09.057000 +CVE-2012-4052,0,1,7c319482493989408e32561fce47e1abed1fc96e65e3432c3855696ef3c4df46,2024-11-21T01:42:07.287000 +CVE-2012-4053,0,1,7aed3d87945874e8ad6285d8cc8db4dd16e187642053830fb38d4e5eba4beec7,2024-11-21T01:42:07.423000 +CVE-2012-4054,0,1,2a9c7c9a7993833c958ee939bbc82ffc4323524c6f6c4d5a2cf506a802fa9c8e,2024-11-21T01:42:07.557000 +CVE-2012-4055,0,1,a1c0301ea3bdc7aa9248b23806e93162d1ad9ee097f9c4c513ad09526f48f44d,2024-11-21T01:42:07.690000 +CVE-2012-4056,0,1,d8cd083dcce56af48ab8d9d1b38f78b54e61efdd39aedf172dbfa961883f4370,2024-11-21T01:42:07.827000 +CVE-2012-4057,0,1,30ffeb11cf3e399a74a12822cd2edf05297525f4c22628cb19e1b68c6b315335,2024-11-21T01:42:07.980000 +CVE-2012-4058,0,1,d8057c19d44aff547e007f144741dcad3fe53079939fa7e7ef39378d0c3f2d79,2024-11-21T01:42:08.133000 +CVE-2012-4059,0,1,4db8995a274d161d58f64247d413f8b274d2a4087bb20528709cf027b19efa40,2024-11-21T01:42:08.270000 +CVE-2012-4060,0,1,12e71ccaaabacf645bb6ca6c13e4cf33107956e10a224236c3b7b0a6bfee15e2,2024-11-21T01:42:08.410000 +CVE-2012-4061,0,1,228329c6c7c812f69f32f7f489a080b441c39676884e508bf23f9f16e39a4520,2024-11-21T01:42:08.540000 CVE-2012-4063,0,0,1e5dd8f5c47d499b7bd8a32fcd58ba1bb04503019a08cf9a944291b1ffa980be,2017-08-29T01:32:09.117000 CVE-2012-4064,0,0,7f1e34dea071be98a5f45b98fd2bd0a7288fc0c5093d4cd42d8acd7b629bb4d6,2012-10-02T20:11:27.583000 CVE-2012-4065,0,0,5478f17453199df8be67601bb78868442d35bdb1d7b8b61182eda043021948c6,2012-10-02T20:18:16.410000 CVE-2012-4066,0,0,c5f6790a00010e734accedfdce7564078ff77a5d2d41f29935632bebeb0a8841,2013-03-18T04:00:00 CVE-2012-4067,0,0,c4fabcd1008de8945ff3dc72e523e3f3b3a48abcb80e0f7e8355962ab8b507da,2013-09-18T19:51:07.723000 -CVE-2012-4068,0,0,5706c8bbfe4e82dfd54d997de99069d545f2836b617336472e73031bd9585640,2017-08-29T01:32:09.180000 -CVE-2012-4069,0,0,4214379c9b1f21ecc264a286d203999fb527c40ad2a1e05a4b1bf85893e25090,2012-08-13T04:00:00 -CVE-2012-4070,0,0,80fdbde943ce5f4bcb2c1a96cf47b4a2b3cfc78fa7bb785be1e83bcef82f2523,2012-08-13T04:00:00 -CVE-2012-4071,0,0,f7b3e3722c08df11371171ba64fcc8839db4c8cdd7bda9098f081c028158282a,2012-08-10T10:34:48.517000 +CVE-2012-4068,0,1,e9f1584aff2a4c198f9a1beabaa64326892b49bf118e44d0b3881a14afc5c709,2024-11-21T01:42:09.440000 +CVE-2012-4069,0,1,f5a88e35c310d870c8c09a786a1df0ce076420535d37fac92d34f600df68fdfe,2024-11-21T01:42:09.593000 +CVE-2012-4070,0,1,36290feac946a1e7d03f85af3cf039bc9d8dcb3087339edafabdaa548c3ebaf2,2024-11-21T01:42:09.753000 +CVE-2012-4071,0,1,57c25f493173dac09effad3507442783e77248dfeb4163a43333e4f52cba1abd,2024-11-21T01:42:09.897000 CVE-2012-4072,0,0,8c0979794c8646616081bc51f4bea76d3e65485fafa00659c3b39c5da78fe110,2016-09-23T16:34:30.557000 CVE-2012-4073,0,0,2adbe8a129e87aef10586161c47d9f74a4c4175edfdc6a81ed18d1fef830302d,2016-09-09T13:58:33.827000 CVE-2012-4074,0,0,353f204ce20ba0573aae28aee2936d75c70b74d5628a30a0a18c9944672d3abf,2016-09-23T16:22:05.313000 @@ -55528,43 +55528,43 @@ CVE-2012-4138,0,0,b3b96296e2de78be5e2a415d08654ff05419a492356d932c8b1563f41b072e CVE-2012-4139,0,0,7b787d47740e6ab1b6b6c4dde2beddffea2df7a046db20ef9c3568d83965868a,2023-11-07T02:11:47.413000 CVE-2012-4140,0,0,9b439be132ae49b253f972c9ac136d71b2c7d489b264b544b2780a91574fdea9,2023-11-07T02:11:47.633000 CVE-2012-4141,0,0,404e7ef81a9fd37d616937d525053ad36f3a011811d707f56e21e263aebbe7cc,2016-09-22T17:35:44.887000 -CVE-2012-4142,0,0,e6de750d1ac958c695e247f051ffaa5e665e01b021dd2770aec9bb035e0f3b27,2012-08-07T04:00:00 -CVE-2012-4143,0,0,1ea89479e611ee475723d4d9d64db2f08d62170cc100141759222fc5e7cadfa4,2012-08-07T04:00:00 -CVE-2012-4144,0,0,73ca4e02e88d726e492bf76102da9b016dceb4cc72dfa3cd8df159fabe70390c,2012-08-07T04:00:00 -CVE-2012-4145,0,0,d3556146a401a93b4fd3d2194b582f8c270b4ec9b82cbf297dfb3da93a67387f,2012-08-07T04:00:00 -CVE-2012-4146,0,0,00b7c73ce664dc1cb5f2b4134af01d1937871f8eeefa8decd71a4fea89eb2ce9,2012-08-07T04:00:00 -CVE-2012-4147,0,0,adf0bf1b7d1f44895bf209aaeb53634fb2829eab620f0614b303ef8ee0132d73,2017-09-19T01:35:16.340000 -CVE-2012-4148,0,0,7f8b86db5596838a33585ea68e9c3ad655fdf1c408c24d6e24135f9fdd248480,2017-09-19T01:35:16.417000 -CVE-2012-4149,0,0,1e815a3481374188a5f3b408bfd26ae6ed7e19c38bb5268bccc2157efd30c9b3,2017-09-19T01:35:16.497000 -CVE-2012-4150,0,0,7fbc9ae1316ab15b9e5c3f7e5d0ff4670ad705a38396e1dd694e1664f1589a44,2017-09-19T01:35:16.637000 -CVE-2012-4151,0,0,87d656b00a6530f4f5192f7caea3d676e7f78943e9414d2c85a17eb9536dc47e,2017-09-19T01:35:16.713000 -CVE-2012-4152,0,0,120a32fd10f5108a8594ebfe8b5d1165ff08d22e299c952620b0d0447b70e829,2017-09-19T01:35:16.793000 -CVE-2012-4153,0,0,37105c5ffe96ea521128dce07e86149a9ff1b088653a96a5268670b4f1a0a32a,2017-09-19T01:35:16.857000 -CVE-2012-4154,0,0,09f975551429d075a65ec9424509dda678c82b8bc5dd7127d9cf4f1f4b1cd4dc,2017-09-19T01:35:16.933000 -CVE-2012-4155,0,0,e191e9710a88b6e60483ddb095e8f59e55f71c7055d99a368ec87982325c6253,2017-09-19T01:35:16.997000 -CVE-2012-4156,0,0,4588c63bcf42dc88ee64ee782fdc48572b2629d40200bb28f9f484adb5febbf0,2017-09-19T01:35:17.073000 -CVE-2012-4157,0,0,ec309a8eac526d87c40b8ab1caebfaba7678bd6f195c025b295cdf1624799f85,2017-09-19T01:35:17.153000 -CVE-2012-4158,0,0,0b09ddcb801086e04b7be0b6aef80aa7aabe4fe830ae111151033416dbce8877,2017-09-19T01:35:17.217000 -CVE-2012-4159,0,0,426df47a95e723bc3d9448d155e6c02c3c2dd983c1374b79cc01583f5545b1c8,2017-09-19T01:35:17.293000 -CVE-2012-4160,0,0,2e153ff3d5d45cca61f73254c3ac519986ebf0e917c107003dc210f0e89a85dd,2017-09-19T01:35:17.370000 -CVE-2012-4161,0,0,9d20de77bc89d5b0aa0a816c7f24cc280680ca67eb9f842858678934ff99f75e,2012-08-15T10:31:41.740000 -CVE-2012-4162,0,0,d07a9e3a33cbe5cc26a84eb423b7788f4dabfbde43dd6c2e6a6b7b7a844a2e94,2012-08-15T10:31:41.787000 -CVE-2012-4163,0,0,4ec2c096f4e7ee13ae2f7d21c8b87b8d12c7c65b875a3905a9d8fd559e297283,2018-12-04T17:12:30.340000 -CVE-2012-4164,0,0,cd079ff82ba04b16b39e472a985d965b6ba073d1437392270bb287283af278dd,2018-12-04T17:13:12.747000 -CVE-2012-4165,0,0,893797a0da3d690853d9324d6eaab334c8103172cb6adcfdfd06b830b9eb6cb3,2018-12-04T17:23:39.167000 +CVE-2012-4142,0,1,510cdebbd41cf01c69c00e63d4b980e01f6236d73eccb030cf306cdacaa186d3,2024-11-21T01:42:15.587000 +CVE-2012-4143,0,1,db6df2b7b04986a1d50ffe55e5a2829aa26e5bd164bd90cdf87daee9832bd05b,2024-11-21T01:42:15.740000 +CVE-2012-4144,0,1,aa62223ad3b8acead54df7044c706b81fe9ba03c371a9054130e0258d3df6539,2024-11-21T01:42:15.890000 +CVE-2012-4145,0,1,a8fc40124fcd5d20603eb46c0ff7f0dd596c34f8424c7fddf3f352901d34bd07,2024-11-21T01:42:16.047000 +CVE-2012-4146,0,1,03daf36713bbfaf8a428be749170740fa47a71475c2831f0a11cd8a520bd867c,2024-11-21T01:42:16.193000 +CVE-2012-4147,0,1,265d78351f9d1d5d8f5f8a05773a7ddd7b6eb17e0c4847d108ca69db7b254525,2024-11-21T01:42:16.347000 +CVE-2012-4148,0,1,0bc4ea83ef50d0d3df6e417f335bf843dd5a6b1135b2b32945e9210777250b07,2024-11-21T01:42:16.480000 +CVE-2012-4149,0,1,fab5f5e5982fba7a2157411bca5bbbefd995f801020dd371c8c4c19c28670f4d,2024-11-21T01:42:16.617000 +CVE-2012-4150,0,1,cf6fe840f020733a45b8db96b638c67310fbb1bffb776aef3e7411076e370438,2024-11-21T01:42:16.747000 +CVE-2012-4151,0,1,220e3185893fd08a9ffbda749bf6381d965beb353296507e9665b11dccf1d4f2,2024-11-21T01:42:16.880000 +CVE-2012-4152,0,1,55b0f22477ddc8ec37d3cd571ca2f91d1c5760cf1302090afd2dd305c2fb5899,2024-11-21T01:42:17.017000 +CVE-2012-4153,0,1,9ad8548a1f76ae772c5ac3995f424d30d41c34bc435a212e97d74e5d6fbbfa6e,2024-11-21T01:42:17.140000 +CVE-2012-4154,0,1,05e5a0342cba6f7a73b1f922db72a7cbe578e1c039a5946101b4f0a6360acc7f,2024-11-21T01:42:17.267000 +CVE-2012-4155,0,1,15f4a9507d9acbd2f952069502d1a4b750950386cf05009c4cfe6de0f3ecdfb1,2024-11-21T01:42:17.390000 +CVE-2012-4156,0,1,3494c12d230680314505950ca568b2e3dc6807b870aa8e66b68511de4d25cf1e,2024-11-21T01:42:17.520000 +CVE-2012-4157,0,1,f8756f663054f2bb8a250fff081dc37124329d2893c8e82704e178642f443e3d,2024-11-21T01:42:17.650000 +CVE-2012-4158,0,1,514d6d7ab52b046d3c54767c5adaf5c919e05193d9feba6a79460659cde536fe,2024-11-21T01:42:17.773000 +CVE-2012-4159,0,1,cc6fb26628862b5677d81a0a10bbbfb2998cb9720079ea19a9e00293fcc3563f,2024-11-21T01:42:17.903000 +CVE-2012-4160,0,1,a06f158b7ea7fff9ffd4456c95e34133f6de38650b7c611019e864c831be645d,2024-11-21T01:42:18.017000 +CVE-2012-4161,0,1,7c0e99309bda5293b13449ebcfef1fe14f9feb48bdd612573ef97df54f51cfe7,2024-11-21T01:42:18.173000 +CVE-2012-4162,0,1,792ef3d5e63c7b330456b57d987e8bc2043e7439855785d44f4be53a1f75dc7c,2024-11-21T01:42:18.297000 +CVE-2012-4163,0,1,deb4938d483ea56e6156e74f5b7ad107e675589d5dd1ee25f125550480eea3b8,2024-11-21T01:42:18.423000 +CVE-2012-4164,0,1,cafad1bfb5e9fc8de39a445deaf64785c6ba1309cf65f9f68bcd77f45b57b63d,2024-11-21T01:42:18.543000 +CVE-2012-4165,0,1,096c20bbf3857fe34b60809c28510e4bbc181f2a3b89c50541238d286e6516f7,2024-11-21T01:42:18.663000 CVE-2012-4166,0,0,795b584e412bd83fe5dc58ed912448b2f88bee0544f36a4f493ab2d2545df2f5,2023-11-07T02:11:48.030000 -CVE-2012-4167,0,0,f24a2f9012c699d038df7f356a59b53edc5dec4774f6dce8da64c8b571fd5ad1,2018-12-04T17:24:47.837000 -CVE-2012-4168,0,0,c18873aa1fd416a2500c02b1c08fbcff0d11a48fb6e8fba9399f0df75f6ebf8e,2018-12-04T17:28:30.023000 +CVE-2012-4167,0,1,0ab69aba78ea0310b861f334139f0a5d600fec91628d49d84cda884c1f24d75d,2024-11-21T01:42:18.800000 +CVE-2012-4168,0,1,3038eed5e1d94dd71633e52d9f26f87f3177182766cdaeff5f28dda2329883ff,2024-11-21T01:42:18.913000 CVE-2012-4169,0,0,53cd5cd7bb964efda222628b116c92c48c6c354837c73b14446b41fabf5e6baf,2023-11-07T02:11:48.313000 -CVE-2012-4170,0,0,3f78765c95da9ec3ea882af460f089da5c225beb3ea08be2a851b553d0ad67f5,2013-04-19T03:24:32.643000 -CVE-2012-4171,0,0,0ea9648293accb959195d7f8533c25532cbd8057954f85204a705e2b126a9700,2018-10-30T16:26:24.687000 +CVE-2012-4170,0,1,dc43926fa1399763617a709c04e081f22fa66e6d4af7b693714c8312c2785f87,2024-11-21T01:42:19.047000 +CVE-2012-4171,0,1,de12c2e06ad9578350db425b90e407d4343b5e75bd08ee6c0aea09766f8227b6,2024-11-21T01:42:19.157000 CVE-2012-4172,0,0,ecb38312b6f39b66a13ba9956c1761a9e119a3b4fed9acc9a800c9f42bfc2084,2017-08-29T01:32:10.430000 CVE-2012-4173,0,0,e6ec14c6d4ad224e7452a96bac2934c14df3ead7fd23a197651671442a0c65d9,2017-08-29T01:32:10.510000 CVE-2012-4174,0,0,ef1bcde9d73af11174c1dad577fe6001168728206f9db81668779d6f8caa6bcc,2017-08-29T01:32:10.587000 CVE-2012-4175,0,0,aa3b78d1dc78ea97a8a4f5b5f004143677491cb44abb89089a52a608f17570af,2017-08-29T01:32:10.650000 CVE-2012-4176,0,0,be3188c1e96e3e004a76a26a8656b3f265dbc3009176b32218630b895d68fe07,2017-08-29T01:32:10.713000 -CVE-2012-4177,0,0,e8992bad5f4170794dfd01ff9c032bfba8ac678d6a2ce6365232ac276c22e5c0,2013-04-02T03:19:51.853000 -CVE-2012-4178,0,0,1e2b8d811e158f6cfbaa83782293065e1d7ddc1b5275cad4cf603fd0b4b8247e,2017-08-29T01:32:10.807000 +CVE-2012-4177,0,1,b305929a736e505fba0f262163fa046beea753f1581d98af6e165dd1d8989df8,2024-11-21T01:42:19.927000 +CVE-2012-4178,0,1,64367f85444ec93fb0987e3766a429607ba22a471ef1fb607146fc561014fa99,2024-11-21T01:42:20.073000 CVE-2012-4179,0,0,6812de3811d2a26de0f90fbede900b3b7f8ed23ae5c3bd7ecfa7f08bd6ccd825,2024-10-21T13:55:03.510000 CVE-2012-4180,0,0,946bbcd4eee5245944732fdb2adbaaa7e60355da98acc1053b80fe500a13bdf2,2024-10-21T13:55:03.510000 CVE-2012-4181,0,0,0e6e94f5ba2407f493844a23ea24337879794c3bac57d1e381e7b4822d3cb524,2024-10-21T13:55:03.510000 @@ -55604,7 +55604,7 @@ CVE-2012-4215,0,0,70bf1e8bc413b573aff9947aa98c8d4f61eba1dd1fea3f6c9f84a06701b230 CVE-2012-4216,0,0,09369fa06a3362fb731fc6a15a389ffe5b0fb885d48770829599f97a64fb067c,2024-10-21T13:55:03.510000 CVE-2012-4217,0,0,746f8036d83acdafc9a06c3cee712d02bf2bcfaafb100c2bde5e13a6beed22e7,2020-08-13T13:30:23.390000 CVE-2012-4218,0,0,bff5d1c34cf6def61a6160b33fd49ea2a3294b6a58ae228dc952940ea5895262,2020-08-21T18:44:09.217000 -CVE-2012-4219,0,0,4299b3993f1cd5b5a4d6bd85f11a646aa8a4e54f82f262b5e1eb9fb1f51bb27f,2012-09-07T04:31:24.803000 +CVE-2012-4219,0,1,3e33b9f9f0a9e3d34bbc3dda5e21f6fba4812a662c83503ed1ff737944745e99,2024-11-21T01:42:28.320000 CVE-2012-4220,0,0,ddeafd3df6a34aca3fce6d90c20b92ace00150b0e0e1ca90a8cb3eaad4d39abb,2013-10-10T18:28:04.673000 CVE-2012-4221,0,0,d210bbe8ff6c6db32e231be2f153bce96a894e4dad1ebd68329b5003dbaae0bb,2013-10-11T13:27:04.247000 CVE-2012-4222,0,0,0c9ccd7ac07f112cafd46989778c492f9f8a45015955157f40dfb450544a1fe3,2013-10-11T13:31:17.487000 @@ -55617,108 +55617,108 @@ CVE-2012-4231,0,0,76af62affd18fa8415a69e0b554f6afe4e946ed0f104d4eaaf7c041cf36972 CVE-2012-4232,0,0,4f6ad0a44c340d8cb55661b81c9abf7ed5fe7b09d40ab50c334e299d3b2cf029,2017-08-29T01:32:14.447000 CVE-2012-4233,0,0,b0c9f3291af38e990aa80b67384aee448bc8f1081a0cd3595e464843a6b26198,2017-08-29T01:32:14.540000 CVE-2012-4234,0,0,0b0ecc9a9e4928dd4e7f092632c9da5e7bd3eac28b708faf9e233206039638fa,2023-11-07T02:11:49.680000 -CVE-2012-4235,0,0,8f7defa23b70a1981205a8980306dbf75d5160554800551c2a7cf355039b82d0,2012-08-10T10:34:48.563000 -CVE-2012-4236,0,0,91915f2ddee55c1872084922b5104aedd3decb4fa7911efea0afe9f187b9efa2,2012-08-21T04:00:00 -CVE-2012-4237,0,0,42e69175d607d2420cb6b4030c2a591f159d84ae08864432a46b1c2b81f0c7a5,2023-11-07T02:11:49.767000 -CVE-2012-4238,0,0,badaebaef5058a359df729765dc136fdf80371e84051cf8d5ffd486570e99212,2023-11-07T02:11:49.860000 +CVE-2012-4235,0,1,e46063d218961c6131fc2da74dc83753244694f8882c2de7412a5a3301488fbd,2024-11-21T01:42:30 +CVE-2012-4236,0,1,1c4406ccbae9e2a62889d146e53d67323f221a16b8c84c5b4aee5e2ee713d182,2024-11-21T01:42:30.163000 +CVE-2012-4237,0,1,5b5b8d41cf98752b0799a42f83c8521f7ccfafb318f56aad8bdb4ca4443639c3,2024-11-21T01:42:30.337000 +CVE-2012-4238,0,1,6be5bbd988943dc2c57b24c1c6366a05e589c650f2c84516bdb14c59702e3363,2024-11-21T01:42:30.507000 CVE-2012-4240,0,0,2a3b2c530bcaf3354cb65751f3d59d677abea0c854edd73067fabfe0e68eb089,2017-08-29T01:32:14.667000 CVE-2012-4241,0,0,2007b9e8a3e0729bdbdb277ed05590599b18af8cc84947c291b4a899e45a6636,2017-08-29T01:32:14.727000 CVE-2012-4242,0,0,ea3c33d40806ddc8adf58062ef1f0e29d9bbf4d6e5557f708f6a1ea5d6749d35,2023-08-03T02:18:52.920000 CVE-2012-4244,0,0,ac66c9dfb5895aa474e4838905c1af5e20c47030c618e54cae04cc1b1a5566ed,2022-12-09T19:15:10.687000 -CVE-2012-4245,0,0,8ec890eade8eba41cab0e2c314534381b7d03c999e854a1380b0d3f82e12b4a6,2022-02-07T18:57:37.273000 -CVE-2012-4246,0,0,bbf27d3bdfa5532bc0e76d05899912ea618b3d2b7d3d20648209f040a6fdb4d3,2012-08-13T04:00:00 -CVE-2012-4247,0,0,ad69ddd212356956797d152a5ecc612a37d63c65939efd94b0ccb1ab682aa775,2012-08-13T14:23:52.707000 -CVE-2012-4248,0,0,309df2559e29640015b8bb5f6e9f83e79bcaf0fb79539fd80aaec0de993c7c70,2012-08-13T04:00:00 -CVE-2012-4249,0,0,69b63a8a4b73f3169b79006fb36932e0d83f5d7c5df8e66598253cb825bdae27,2012-08-13T16:49:14.913000 -CVE-2012-4250,0,0,26c9a250bc72ad7bbee545a990dc1a4e6c8faf259a93048006d1657a465d1bef,2017-08-29T01:32:14.790000 -CVE-2012-4251,0,0,9f63d6b40a48a1e0474a6032cc65747a2d27211ddce1886433361cf3e0fd3f5f,2017-08-29T01:32:14.853000 -CVE-2012-4252,0,0,e49d30bf541f728c4a5ab20ee62a707ebeaae922c9bd82842352804c187914c9,2017-08-29T01:32:14.917000 -CVE-2012-4253,0,0,324cfa38a9332f65e8bd253ef99952fb5932a3908504adaaaabc5b3713f3bf9c,2017-08-29T01:32:14.963000 -CVE-2012-4254,0,0,fa9298fada13df0675a4c21a2d1f06392c38e9ca73bd709778e71d7d50be1034,2017-08-29T01:32:15.027000 -CVE-2012-4255,0,0,a9cff2811152a6e6f47a860cccb73065915e40e965a40ca432376ecad256262f,2012-08-14T04:00:00 -CVE-2012-4256,0,0,876db4fa3859fb343be0e6413361a1a9d6bf8100cefa4de8a9406932871c8fcc,2017-08-29T01:32:15.073000 -CVE-2012-4257,0,0,4f980be57fe25e46310ad3e358db90c6d56a03a979a83222c5b5f7d4239f6573,2017-08-29T01:32:15.133000 -CVE-2012-4258,0,0,aa5752a94e5a794dd1712362270606c0d0aed7b529c52ff679835c97b1bead09,2012-08-14T04:00:00 -CVE-2012-4259,0,0,06f82d99932944719035f230713b0d6c9bf0630660c2533dc0525a5af745ebe4,2017-08-29T01:32:15.180000 -CVE-2012-4260,0,0,7aad871188add9b2df9ec4e7ecb71d3c68559d643cb286c0689aae34cccd2fba,2017-08-29T01:32:15.243000 -CVE-2012-4261,0,0,5b3db26bfb6befe4983ebead77ebc89cb7ff0d0b6373bf03bb3ceb5d00985e0e,2017-08-29T01:32:15.290000 -CVE-2012-4262,0,0,f86fe8f863f8b4f221c217646ceffcbd1479877c7916dff582b8171733f57c8c,2017-08-29T01:32:15.353000 -CVE-2012-4263,0,0,ddc32089a1337cd1135fd84c1513e83b248a5aed4a0ca40059cb9fc232862859,2017-08-29T01:32:15.447000 -CVE-2012-4264,0,0,f6848d4b1ef2744442c733df7892cadad728ef4981580934527b6c51f3c421aa,2012-08-14T04:00:00 -CVE-2012-4265,0,0,dc1a9efb0f158a1acc5f0767442334180d6beb738cfad5ae23c36062bab3febe,2013-07-14T06:25:04.163000 -CVE-2012-4266,0,0,450f7aba373bb64e68b71594e824033d37bd3d555b854fa2f35b8ca03c70e0b3,2012-08-14T18:26:29.160000 -CVE-2012-4267,0,0,8ad84bf767d18b6a2b264fbb765df9a9fa98ff5701047a00f2b61dd44fc3c900,2024-02-14T01:17:43.863000 -CVE-2012-4268,0,0,a1d474dfa51cef12e583d7c7e50c1f536e4277ec1ee8675d53c3741fa70fa15e,2017-08-29T01:32:15.510000 -CVE-2012-4269,0,0,5b6a729ecda74e6072610d1e33227709ec65e3d8a061875aced9afbfc6391749,2017-08-29T01:32:15.573000 -CVE-2012-4270,0,0,aef155f2180fd53dad319ef45fb982e38e6e7510866694c1342051426c5af8bc,2017-08-29T01:32:15.633000 -CVE-2012-4271,0,0,633d84034e1eba6f3db6a41b667e821098a3082b82261add1d024d215907d77a,2017-08-29T01:32:15.680000 -CVE-2012-4272,0,0,14240b5ecd892944898bc6b2ae37ee024e6c9eac0eeb148556000e95c14701eb,2012-08-22T04:00:00 -CVE-2012-4273,0,0,b6b57b1c3fc12f699f0415eeb6a52d0ade121a6e78ddb076ae2583b9f8c1f2c2,2017-08-29T01:32:15.743000 -CVE-2012-4274,0,0,917abede7e1caaed0553f404721d6d6dec49ead8c195b262c0c5a8542f0547c5,2012-08-14T04:00:00 -CVE-2012-4275,0,0,8557b4cc6aa234dfa07ea74a5325f3907858963e2ccfb261b830b269bfdd2423,2012-08-14T04:00:00 -CVE-2012-4276,0,0,1a65471fbd3455a8934c3ef1ff94762eec448eea9b4d7c8e92146b22fd129a8a,2012-08-14T04:00:00 -CVE-2012-4277,0,0,c33aa2aeb49b62271394a629dff4834a647ba6004230ea197e20617bbb50b754,2012-08-14T04:00:00 -CVE-2012-4278,0,0,75f13d836a213623bd80e40445cf3c1630eeb1ca673ab84ee1d78c354311621e,2012-08-14T04:00:00 -CVE-2012-4279,0,0,66aba02397e54235b872ac82e0b8d95f4464f7ac353d3dd7d9901b3508b4d3b8,2012-08-14T04:00:00 -CVE-2012-4280,0,0,633159e2e65fc09be3fc636976cf6ce61fec905ca80618bfa2b3186e19b00e32,2012-08-14T22:05:32.033000 -CVE-2012-4281,0,0,883e33551df96b0088a8942f3a6fbb8ffd66d658fd4c435dbc7221e9008e75af,2017-08-29T01:32:15.823000 -CVE-2012-4282,0,0,676b533042617bbe0df2df33bfb75d58b57fa4e499e1f0a125c79f542c688c86,2017-08-29T01:32:15.870000 -CVE-2012-4283,0,0,47ca45e7f1209c6005ddb1dbaed64d6d28f49a1358013f016689b7d87ec3d919,2012-08-14T04:00:00 +CVE-2012-4245,0,1,e7c46cf1d400c0bb8a69cb040db02795f3d020eb4cf1203c0494c327147aa270,2024-11-21T01:42:31.330000 +CVE-2012-4246,0,1,20a7135ebe2b7fd1e3f47bbc540e141e6db41c01903fe55649f083037e1df88f,2024-11-21T01:42:31.500000 +CVE-2012-4247,0,1,a7255fde2fb53e397b76d860ff7e9f2e1173bac9e2ab4922645a68ae794d7b43,2024-11-21T01:42:31.663000 +CVE-2012-4248,0,1,dc806c793678097398169f80f60af219255467f49d6064b75e74919ee3e10fc8,2024-11-21T01:42:31.820000 +CVE-2012-4249,0,1,51633947d59259b3b8aabc087c29fc163d965fa6c4fb6f057e27845a2831ac5f,2024-11-21T01:42:31.967000 +CVE-2012-4250,0,1,f4001db8243b8ec59850eec523a29e79e86ce2ddc3bf892ee19d21c86a65891e,2024-11-21T01:42:32.127000 +CVE-2012-4251,0,1,5fb2195da50cfa1830d67510cde6fa964f36e1c192d7cdf72ffa6e8ed38bc89d,2024-11-21T01:42:32.283000 +CVE-2012-4252,0,1,75c0ae094585b9c352690a9b97a996fd70ed7db1f12e135af191bd456695045b,2024-11-21T01:42:32.450000 +CVE-2012-4253,0,1,b49716157b67a66c8453425f03c5c2bcd791f3626747672e6f4e8302b8bfb3bc,2024-11-21T01:42:32.607000 +CVE-2012-4254,0,1,7d69f6504e4742eda5277850678e85b64bd15bd119e7dee95e0a69eb2722cd02,2024-11-21T01:42:32.767000 +CVE-2012-4255,0,1,1037428e722688228ad1ed95f797602dd2e6b2faa688806be135bc5eca4e87b2,2024-11-21T01:42:32.930000 +CVE-2012-4256,0,1,b9ebf68537861f69f0a0545926ffc514eebf2ca8be49ea7ad7971e909579987f,2024-11-21T01:42:33.087000 +CVE-2012-4257,0,1,b46c2cc0d94e3f0cd1e1c7693f0dbc5a77cee7cf5eae4d84fee61c553aba4b30,2024-11-21T01:42:33.240000 +CVE-2012-4258,0,1,dea7e4b3351930b2b41c7f43461b8a52a0600790f758e516a3252866f09dea87,2024-11-21T01:42:33.380000 +CVE-2012-4259,0,1,09b16504a1c2913c11c58064681f8c9ef0b83b9940b0f6b940d66c1ba33a4f38,2024-11-21T01:42:33.537000 +CVE-2012-4260,0,1,742e591d8a5957f74e05e89abfa1719aa939f7d29273b9e1e4425bbf4c9ec063,2024-11-21T01:42:33.730000 +CVE-2012-4261,0,1,a81038fd897b2567f229ca10071cc01bea54468796d4519216dfac156e7f2154,2024-11-21T01:42:33.893000 +CVE-2012-4262,0,1,fb2a9bca7473cb947eae27457e299a116ac5b2f05a77ad9ba122db2293a61976,2024-11-21T01:42:34.040000 +CVE-2012-4263,0,1,80ed0726d0e8395ebb57739d33d790315e76625909dffd1b1a43dfcd39421840,2024-11-21T01:42:34.203000 +CVE-2012-4264,0,1,68f8a0deeecfc05c2b6488800f9b666eb08a59e7d7ffb7ac8822550ef1412e1b,2024-11-21T01:42:34.370000 +CVE-2012-4265,0,1,0d190ba13fb1a47e1ebf945b7d9e2f4cbfb432e4decad0a8477015a6ef31f229,2024-11-21T01:42:34.537000 +CVE-2012-4266,0,1,641bfdfb4cc8ff777610b9b78cd5242c5f5c4a0e2538c4d3cee507ee53436942,2024-11-21T01:42:34.680000 +CVE-2012-4267,0,1,c3c2b72179438e7a1771750db0be3bbc95eb9d7543b877abfe76e3dc1fe487a1,2024-11-21T01:42:34.833000 +CVE-2012-4268,0,1,7cb4a3f6e14b44081b2d5eede228e3ae78d17bc2a9393aafed426b7a3c67d3c0,2024-11-21T01:42:35 +CVE-2012-4269,0,1,3d22a9e176006a0790a873add850655ec2e67a1a33e5bfb6dd962d37835cc7b0,2024-11-21T01:42:35.180000 +CVE-2012-4270,0,1,f3ee4d470ad384cfd58dd14125361dc986a702b9a8601062ef188055de5963d3,2024-11-21T01:42:35.333000 +CVE-2012-4271,0,1,09a77fcff64265837adcfd00b79b76b557063296d6514effd73d7998fc5c13de,2024-11-21T01:42:35.490000 +CVE-2012-4272,0,1,96312b0130f152f64d4c7627c5a05e89e4651f80a9f64f5348dfb4118bf3949f,2024-11-21T01:42:35.643000 +CVE-2012-4273,0,1,cdd6b7c670a0ab8030b3b921065558b015f75a84813e1fe6d88dbc9275bbb91e,2024-11-21T01:42:35.803000 +CVE-2012-4274,0,1,8dc449a1e0023b46671fbbf519ae09872f067f3521a4b339f78c2528c1aac570,2024-11-21T01:42:35.967000 +CVE-2012-4275,0,1,45ea650fbd3f68bce71f70b5d3f6eb95fcbf1137fca2114ea2513a112bc54221,2024-11-21T01:42:36.123000 +CVE-2012-4276,0,1,ea7786575385aec6ae28bc8028fae01f72b569a3ce5819cc99624a456b76a416,2024-11-21T01:42:36.290000 +CVE-2012-4277,0,1,adff9b24d53cef7144184958b76cd86955a172a5a496f57ffffec683b24080a4,2024-11-21T01:42:36.433000 +CVE-2012-4278,0,1,ee885551cc81a419c32dd8caadd068cf7da0a9d47251f8b824189379dd8d34e3,2024-11-21T01:42:36.600000 +CVE-2012-4279,0,1,b655b45e877d655dc8a63a020aeb5e9fca3801cd7712b04d533fd131135064cc,2024-11-21T01:42:36.753000 +CVE-2012-4280,0,1,9c4b3d48daa0f5f8c4a767b81f9f78804832638ac15e572edba6d83745784620,2024-11-21T01:42:36.907000 +CVE-2012-4281,0,1,62f0e88ff7777ed3229783025f986462033f31e4af1d5da8d77e75639dc3afed,2024-11-21T01:42:37.053000 +CVE-2012-4282,0,1,12658a340d744b4e60fb000c30661f38a313df6d87c97679eef6bf1b53c0cb49,2024-11-21T01:42:37.210000 +CVE-2012-4283,0,1,aa34af30378169550fd29f153c24987129009e5c20d5427efbe81aa550b61dc1,2024-11-21T01:42:37.353000 CVE-2012-4284,0,0,d6ec379ec9d1bf3cb5ef164dbf9fa5f69a827715c742516a821ffa77ccba88f1,2020-05-11T19:20:57.117000 -CVE-2012-4285,0,0,0b04497ddd744538ca98a450f400d9c25fb9e575a34e664fcb1bd77667dd4889,2018-10-30T16:27:33.653000 -CVE-2012-4286,0,0,1b491202ebf06656be09b516a89676899a0cd3c8b0b31528dca5fd291721922c,2017-09-19T01:35:21.807000 -CVE-2012-4287,0,0,5005add1c43a30ad60cbe08e595ccc8f5444701035cc9d890e7c6bfd3cc69762,2017-09-19T01:35:21.887000 -CVE-2012-4288,0,0,9f7e0e32ba477dd73d549f26d8967153d266a5ebbc6c01bc2db5206c8ead0b9c,2018-10-30T16:27:33.653000 -CVE-2012-4289,0,0,df69fe9b0ad193d98b4795deb9815cdf3fb16fb89b75d71b774e1414b87d017b,2018-10-30T16:27:33.653000 -CVE-2012-4290,0,0,bfb60b46254fefbdd3992f0ab741fa9cd01961cc5748652929f8c131308f568a,2018-10-30T16:27:33.653000 -CVE-2012-4291,0,0,925a88cd51a60729334cd4b5f6a4eac4a9098379af34ec9d6f15c6489c4a32b3,2018-10-30T16:27:33.653000 -CVE-2012-4292,0,0,c8465912f8d77580671aa4832c9812bc07c9c68aeb956c832f4139dcd4266d61,2018-10-30T16:27:33.653000 -CVE-2012-4293,0,0,317860ace9453d849fcfdc5d9acf312fe09d9e19491c915051f36aa94fa78412,2018-10-30T16:27:33.653000 -CVE-2012-4294,0,0,b3606fdcf15b6ad5d5c41d35af948ae9d6a8d68d9a430e92b919f1f7c1bbca6e,2017-09-19T01:35:22.403000 -CVE-2012-4295,0,0,97467ec57617fafd032e72ce8b289958d3a8593fc8f1e0c097c0108f9f9cd055,2017-09-19T01:35:22.467000 -CVE-2012-4296,0,0,25753253387bb57272554f33afcd181a220917c63b7db00b8cc6afc8f45e3fce,2018-10-30T16:27:33.653000 -CVE-2012-4297,0,0,8eb7ad4215dc317062510372427178bf9c4c762a32cc5d105d7483805b6a3109,2017-09-19T01:35:22.607000 -CVE-2012-4298,0,0,5e12575a52611bc2129c8afec862c6e8e83dcd41e5e1ac5a9b7fb88baced8dd4,2017-09-19T01:35:22.667000 +CVE-2012-4285,0,1,ac399a91e8069ee15ceee0fec3bcf28dca8aefc5bf352176a8eb1a3f1a7fe0f1,2024-11-21T01:42:37.670000 +CVE-2012-4286,0,1,1930f5fabeba230601a396d820c2bbfd77b5e2c1a0ec9413b7eb44c98c51340b,2024-11-21T01:42:37.843000 +CVE-2012-4287,0,1,cbd7118238cdb6b8fa1c6e977b822884e9492e1d4774db57c86ef5cb9a36a393,2024-11-21T01:42:38 +CVE-2012-4288,0,1,7b86eed6fe6bb54e08644572e3ac2bdeceeab5358bdfafc080e600c290bd71d4,2024-11-21T01:42:38.173000 +CVE-2012-4289,0,1,17086ca4d35e048b1d8137b16525514995ff578a43dc44fdeb5f6e6ef95fa491,2024-11-21T01:42:38.350000 +CVE-2012-4290,0,1,2bf6d8695f7dd79c7c52478d7c60b95dc718b7e9aca10d4f7b45307bb4b750da,2024-11-21T01:42:38.513000 +CVE-2012-4291,0,1,37099ec482dff41ad3da7c085d73babf343614e5cbdad925c8a61a84a26835ec,2024-11-21T01:42:38.680000 +CVE-2012-4292,0,1,95f16d3339c7a15c5de6638f097ddac432227b964c671642016291ba245582aa,2024-11-21T01:42:38.863000 +CVE-2012-4293,0,1,f8a10cf3157bf522d0e438fdf913140ba867e6bf7f68c9ee20128e00f5e79ccc,2024-11-21T01:42:39.027000 +CVE-2012-4294,0,1,070844706e02d642b081ba0b71f6eeba4c2c0f2cee0f8ee1f79ab68673966cdd,2024-11-21T01:42:39.197000 +CVE-2012-4295,0,1,c13663c9afc327e09e2125a40e9e957a0fe53532381877da306ce533866142a9,2024-11-21T01:42:39.350000 +CVE-2012-4296,0,1,069e3bb51e822988b08f43a7cb1d9dc5f17c458e7ad3a468f0e18e0baefcade1,2024-11-21T01:42:39.497000 +CVE-2012-4297,0,1,8858a3a25d4c521f62450a1829da4c02569443cafbaf33a4661cc691381ed82d,2024-11-21T01:42:39.657000 +CVE-2012-4298,0,1,2644642a612042af68e87d173573e81159891999b49ac0c060cd86670ddba96a,2024-11-21T01:42:39.810000 CVE-2012-4301,0,0,6e2e094771f51a0cce3dffed8f80a44f002bcd91c516978eac39e32593f27f4e,2017-09-19T01:35:22.730000 CVE-2012-4303,0,0,933c6ff575917e31c397f47cc974b6244a9a26565db129f45a6ea60291e3db7c,2013-10-11T03:45:56.540000 CVE-2012-4305,0,0,0764e10e5228ef56cd54eaa9ca563a5e7576f3ac94b4ac09f5abd9997a77682c,2017-09-19T01:35:22.777000 -CVE-2012-4324,0,0,814838a58d0ce0bf01d7399fb325ce84afc85e0e7ea187d0fa19db12a9b91dcc,2017-08-29T01:32:15.947000 -CVE-2012-4325,0,0,0187d9b14eb414cb5ca30becbd7dea7b200b60d5f7684fdda843d61df5753537,2017-08-29T01:32:15.993000 -CVE-2012-4326,0,0,bf1df6eff5dc742b5008ca3599cafca3a2b25e44a5f55b36ef1f748c00d7be78,2017-08-29T01:32:16.040000 -CVE-2012-4327,0,0,39e77c78194e41a3a744602048cf7eecd7cce3c3f999a23a0aa5f532e9bc0046,2017-08-29T01:32:16.103000 -CVE-2012-4328,0,0,af6df1bfa545668543197c8825b03f15fe9e7a85f9f1674076f744420892aab8,2017-08-29T01:32:16.167000 -CVE-2012-4329,0,0,62e1264d3f7b22ec6d1f764347cb7125b3d6ec555cf69aae3f0299a6064efbad,2022-02-09T19:21:56.123000 -CVE-2012-4330,0,0,df5bbe11930df046153ce5e49cec8fc750c1fee6da1fe211bcdf02afd4cb218e,2022-02-24T19:12:09.820000 -CVE-2012-4331,0,0,7653c81d08384acc91995d9572b179c7f9ca810ce8b5f936682690ea066c628d,2012-08-15T20:10:24.150000 -CVE-2012-4332,0,0,dcd9f322bc6f40131fbe2ac3dc4f848fc8541c99fdd2e57474e9a808f1caeb43,2012-08-28T04:00:00 -CVE-2012-4333,0,0,a30d85746be65d4f857ebfcb26a00dddb7178859050f2c33ab5ac9fcef7b0bfd,2017-08-29T01:32:16.323000 -CVE-2012-4334,0,0,87d6864346ac7d54b96ab168c4fbe153246f1b940461d59a08929daf91ab2a57,2017-08-29T01:32:16.383000 -CVE-2012-4335,0,0,b1ebbf4e3b6d471b0551b36fb6f34fd53253bcbb0f36eb677526686bf16947df,2017-08-29T01:32:16.430000 +CVE-2012-4324,0,1,6e6843907379c01ef69ce09ef6e16c114e305b443553b5eb62d851c0b47d0667,2024-11-21T01:42:40.400000 +CVE-2012-4325,0,1,9c2f55109c6a0dd1849191b949dde876e15e0a9d2cbb15e62eb6d9de7dddecf5,2024-11-21T01:42:40.550000 +CVE-2012-4326,0,1,808403d14c0919615ce0cf88c413ce28ad2879622a1f7742cf021323522e819e,2024-11-21T01:42:40.680000 +CVE-2012-4327,0,1,e4ea60e49898e732bf326503d33081cbaf5cbd06a3c4f11ba6cc49607e24a898,2024-11-21T01:42:40.813000 +CVE-2012-4328,0,1,a8af3dd2279537273cbf84fa12718a246d5b6960f1540d09edab83286115ac46,2024-11-21T01:42:40.967000 +CVE-2012-4329,0,1,ac9865e9118c46b933332d42a1be1ecfb43db3636a8619584d6c41236f7c4270,2024-11-21T01:42:41.120000 +CVE-2012-4330,0,1,346d22134c1840fb66db70c51e5eda48a580a5cb74a9f0c4ca526265ec3ab60d,2024-11-21T01:42:41.273000 +CVE-2012-4331,0,1,ef1c70ce3a03d4e9919a04769c3bd2b43da966758befe07981fa59399b7a5d1c,2024-11-21T01:42:41.430000 +CVE-2012-4332,0,1,140306cb33e611b68cdc8fb1a49c2afd6bd192e2fb046755f2b1e2f68dffd507,2024-11-21T01:42:41.570000 +CVE-2012-4333,0,1,81202d6068948429fd64ebc1fed7c87d4d69509a1d23c2b401e7517ea9ff03df,2024-11-21T01:42:41.717000 +CVE-2012-4334,0,1,2fc212454969d8a44017f1bed13581ed63e8e965b0ad14577c07df7d1f87876d,2024-11-21T01:42:41.850000 +CVE-2012-4335,0,1,4c3a7ee944242dfc041379e0b6d1543942cb87b8beb331fea23502e5372ac947,2024-11-21T01:42:42 CVE-2012-4336,0,0,a7d5221459e45f3ed0ca71e2586f985003707db0fb1e5a2e71732fe794ae23f7,2017-08-29T01:32:16.493000 -CVE-2012-4337,0,0,ec93b0ab34d651837750d7267cba35393ed2f983abe40c88d076c4fbf746c315,2012-08-24T04:00:00 -CVE-2012-4340,0,0,77d28833cf96f92d96d41dc5db0926a75a492a47ae21d8226f3994fa315dbb81,2012-08-16T04:00:00 -CVE-2012-4341,0,0,404e67c3628b4d6ca272c64110a3ea484b37b6af795ce906a35c3efe847df98d,2023-11-07T02:11:50.587000 -CVE-2012-4342,0,0,e86fd45827576c41f14174273ca8912e031852003eca3f83a0f57412dfed13e9,2012-10-09T04:00:00 -CVE-2012-4343,0,0,8f2123066aee412fda9822d4f858250a3ff798eaf6c56ca312b8ddc19ca25c32,2012-08-16T04:00:00 -CVE-2012-4344,0,0,0585e30e348cd2b8bcd3d8b19495c930bcfaa3338ee16f63062d43aaced1273b,2024-08-27T17:48:24.383000 -CVE-2012-4345,0,0,1c0e36f1fd436d4ac503b42031575dce078cd92b59451c94e5b9d0dd20983a98,2013-04-02T03:20:04.500000 +CVE-2012-4337,0,1,7362cf10a6a40546cfbeb77a25a2558125fe2cbbd0323836ef8cfde44de2dc81,2024-11-21T01:42:42.300000 +CVE-2012-4340,0,1,767298cb5f35bd663bce88867899c5ff9ec3a61024e9ed12019e8be808a4d135,2024-11-21T01:42:42.467000 +CVE-2012-4341,0,1,f6e159dab254ca1d98947e9a4a5c9e2a5ba3e5f85e3434a2f728a9e074b2f7c5,2024-11-21T01:42:42.603000 +CVE-2012-4342,0,1,2e136086e6d45b197564d7cd7f4cdf80674779366454c50e2cfa5533f704fdcb,2024-11-21T01:42:42.753000 +CVE-2012-4343,0,1,effb5f2d321e72b4f435c7d958bb148291aa8b4227e7ced4e4d354ab31e5ba84,2024-11-21T01:42:42.887000 +CVE-2012-4344,0,1,e052381dc120ff0163236ef99291225c847151327090def0fa24777c8c9cbf83,2024-11-21T01:42:43.017000 +CVE-2012-4345,0,1,55b8bc07a87bad823578756f4f1cc39f6913b22304ebe281d35c56ee8fe5dbc9,2024-11-21T01:42:43.147000 CVE-2012-4347,0,0,8e6ebe91e2ed52ebaa78aea3f5547fbc1a3264419b797fd4bfe77714e73cc329,2013-10-11T13:18:21.300000 CVE-2012-4348,0,0,901dbe3227d936f6c9e770630716b59792dca4bd51056b7017fa5f0888a4f742,2013-03-14T03:10:09.620000 CVE-2012-4349,0,0,988f7a2151d0777b566b20a8d48f4ccf99bc564c228f531ad2472d8d0bea952d,2013-10-11T14:26:44.037000 CVE-2012-4350,0,0,ae6db278fab1af3c12efca4ac9dd71b5ccaa0ce82de0118c3fa36690695ea297,2013-03-14T03:10:17.090000 CVE-2012-4351,0,0,7636d1b275f0d68e25d48ed22c561f3eb1498a1160d3586902c0fdfc7a0aef4d,2013-02-18T18:23:47.450000 CVE-2012-4352,0,0,2215620af1593789325aeb4eb88a0ac744023b62b61308669befc90872a5c177,2013-02-18T11:56:38.633000 -CVE-2012-4353,0,0,bc6cc2e1b8a169d38e861d89acd8d56af054d3dca484c94ec7fe242af85705c9,2012-08-20T04:00:00 -CVE-2012-4354,0,0,22971acf439d00e44f39abbef68898516c925e1857f7e796919f0f685bb117e6,2012-08-20T04:00:00 -CVE-2012-4355,0,0,daa48cd1d7933230d5d9ea2dc3bf9b67425fcb954c121b675a7c51c58d3dfbe9,2012-08-20T04:00:00 -CVE-2012-4356,0,0,2620a9cadd68ced6b637051e16e898f243c6769259d65df4e364008bf8d12e42,2012-08-20T16:16:14.573000 -CVE-2012-4357,0,0,fe97b2caab81c019a283647741422ef6d6026aa52640686ae89161bf73809f11,2012-08-20T04:00:00 -CVE-2012-4358,0,0,0fdccedda888503f97cd949a635e4931343ab293d9fad464b635354eed0d0f9f,2012-08-20T04:00:00 -CVE-2012-4359,0,0,6c4361b889ff53c7a9e7db9b481c2df931801b17cb2f152aa3e3d36c85e68989,2012-08-20T04:00:00 +CVE-2012-4353,0,1,560b160362e15e1c079d9e473bf59612e57ed0072ab19dbc35810692305e4adf,2024-11-21T01:42:44.130000 +CVE-2012-4354,0,1,8378eea1d06d40c5584d6de5ebbbd42afb5b7ae3a6cb4d18dcce459c4466343f,2024-11-21T01:42:44.277000 +CVE-2012-4355,0,1,ea96bcfa0835d787081e5d8a9b4574bdeaaa8900a1df467856a28fe2b12c2686,2024-11-21T01:42:44.413000 +CVE-2012-4356,0,1,adfdf9fcf1bf00f483f8334147d9e4f42422db02e1689b2b8ea93a74ecf38351,2024-11-21T01:42:44.557000 +CVE-2012-4357,0,1,1ddc0fa5bc7e03d9b1697874b991181f0a22c4b02268fe00d3fbe10e8d5700c2,2024-11-21T01:42:44.697000 +CVE-2012-4358,0,1,69216d7cf4f72a131282787ae51c6456cbe4986b3896eb168aa9f549518864d4,2024-11-21T01:42:44.840000 +CVE-2012-4359,0,1,c497e7add87351184193ccb855c42d4fb2fc47abbb8c4146068a2175b6315c66,2024-11-21T01:42:44.993000 CVE-2012-4360,0,0,b302daed5b7187302d09b69f8da490161f6ec4485ce84d98c00191dfb63b5ab5,2018-10-30T16:26:14.623000 -CVE-2012-4361,0,0,8f23cd8b8d5200bd1d1fde9dbe4a54fa559b26014d297678ea16312054fb0f88,2012-08-21T04:00:00 -CVE-2012-4362,0,0,78c3a9dc8d8f3828b9265bc29a0451fba92bee6d3b79e0d4b081849df2af2bf2,2012-08-21T18:24:46.170000 -CVE-2012-4363,0,0,cb64decc96e631b5d09b373a77dbe0e52682c7196993ae441384ed149ef812d3,2017-08-29T01:32:16.680000 +CVE-2012-4361,0,1,4895e3c27824dad7e09ffcd2275503c225364848fe3d01dc076cc85956acd4e6,2024-11-21T01:42:45.297000 +CVE-2012-4362,0,1,98e7ff5b700f983a71c7254b1b560b6c27f0e859f30c117bdf6941a231daf740,2024-11-21T01:42:45.443000 +CVE-2012-4363,0,1,8edc36e75e0affae68585f84b218d60720be63c26a348fd97ec37110f6ef25b5,2024-11-21T01:42:45.573000 CVE-2012-4366,0,0,34d6b74087626ca771ba5a34c1dbacebc78fec146287418c0da7a12cfca3e041,2017-08-29T01:32:16.727000 CVE-2012-4377,0,0,ec4cc8c4fdbc1b420664e39c8dad47ae3e9b2fbdbb11aa3f5ed1333e3e3432e3,2017-10-31T21:41:48.227000 CVE-2012-4378,0,0,299cdccb77052710d37f5bba560998a72b3a1fbe8b5c4e71dece6c399b79ea7f,2017-10-31T21:41:37.977000 @@ -55729,25 +55729,25 @@ CVE-2012-4382,0,0,6f6a7e3ff2a6296eb08ee870b74d9133da87b08a547d3adf5af89416cd4aef CVE-2012-4383,0,0,0a6ae1a203883259cdfdcd2c6f45f003c005043a1dcaf65dbdd0cf78abe44dc8,2020-01-31T14:11:51.287000 CVE-2012-4384,0,0,df9f26302c1d30f404868dafd2d1c9c734301b4c41ae871ddadbed36ea05345d,2019-11-14T19:23:51.587000 CVE-2012-4385,0,0,49f3ef2bef4d62daf46fd4967b900ef3781f0b3fe2a161b94599d7d0cbc9cdbd,2019-11-15T18:06:43.133000 -CVE-2012-4386,0,0,a39047e0b26784e065b3f95642427d1f4076072bf05183f3d896895ca56f4614,2017-08-29T01:32:16.790000 -CVE-2012-4387,0,0,687ff877fb51572057d27eb0b342c439ca5163b797d8b65d2d5872c5c817f28e,2017-08-29T01:32:16.883000 -CVE-2012-4388,0,0,7fb066ebf63e1cd9b54dfbfed85dca4786c6a0eb19e5098e42fed3cca254de35,2023-11-07T02:11:50.903000 -CVE-2012-4389,0,0,6cf179c21ec2c3f19c4e1471f2a94a77d4bfc1f2b73b849b52559d2d565c83fe,2012-09-13T04:00:00 -CVE-2012-4390,0,0,615e4586b0b8303f58f226fcc87360a0cd78c7f29f5d45e1413951921940d954,2012-09-13T04:00:00 -CVE-2012-4391,0,0,6366d10a235c0f919338743fa2dfdac4ceb9816778f5904ccb3d5f2c004aed81,2012-09-11T04:00:00 -CVE-2012-4392,0,0,798172b1c4a31ec73f6884010fc5ea47af4b41f3e146444a4b17a41743e807d9,2012-09-13T04:00:00 -CVE-2012-4393,0,0,6bee8e31475be84eab0e2b5c6278688af24b6dc38dc9d5b547538335ec219ce7,2013-10-11T14:10:37.283000 -CVE-2012-4394,0,0,3e58e93009eebc595db3b546a0ac938eedef3a413c7015f6ab9e731631fe3ba9,2012-09-06T15:36:40.737000 -CVE-2012-4395,0,0,cca0accd5dbc7120d8b131e57022cdbc8c29cdc775af94e8bbfd588dc3ae1beb,2012-09-06T15:39:10.317000 -CVE-2012-4396,0,0,22e1096cae50d34e8cf4a420294c6669df8369358319cdcda0bc749e2c298ffd,2012-09-06T15:43:16.940000 -CVE-2012-4397,0,0,d0fd3b9940f54e3f2e5bbae470caf990e763ad9602a1fd926f39012c7beb3dd5,2012-09-06T16:05:08.253000 +CVE-2012-4386,0,1,87962def6e3854daab2e3b5d23f49eb8629986fda19dd34be89cfe3750bd2af1,2024-11-21T01:42:46.837000 +CVE-2012-4387,0,1,a82708ea7f579e6285516d5ed43e5cef1ac523e64156935e58739db0be42a949,2024-11-21T01:42:46.950000 +CVE-2012-4388,0,1,cd05b47c35cec72561b6e67615b57d228ec5767d05d22f201766b7f0b1ebf535,2024-11-21T01:42:47.063000 +CVE-2012-4389,0,1,7fc39a71d8783be414efd68b4031ebb05e2292dca4b77df9481ef28a8ffb9f0e,2024-11-21T01:42:47.193000 +CVE-2012-4390,0,1,04d3215f3df52e9d320d8bcd6178b6973dd733a332ec1799e66271ff550fc54e,2024-11-21T01:42:47.297000 +CVE-2012-4391,0,1,4caa959a88c4f01e3536524dc43b1a22aac69561a3795deb855212a8ba1e6892,2024-11-21T01:42:47.407000 +CVE-2012-4392,0,1,eaf8936f2e3399fdf013f7dd098322d609d6b09284278512dfb038abebd9d1cf,2024-11-21T01:42:47.510000 +CVE-2012-4393,0,1,d3a7e778d008d4ec95705c544a2628568ce0ad06e64529b3a865201bf3593c67,2024-11-21T01:42:47.617000 +CVE-2012-4394,0,1,b2e187a43da92d6a9fca53e72ddd1b5bbd65e43dce744c91d978ef91c096d1c7,2024-11-21T01:42:47.730000 +CVE-2012-4395,0,1,fa13243286880bcb3b4a5802ea8006cf68cffddd57734bfc75dfd684ea728c9d,2024-11-21T01:42:47.850000 +CVE-2012-4396,0,1,86e78587f1a6a7efcb0a16c76f5c2e169c55d23bf67281a53c6a5beb20ef7be4,2024-11-21T01:42:47.957000 +CVE-2012-4397,0,1,c681bdab60134665f3681816e83ff5aef67428180ba6012dced1b0e685c0c38b,2024-11-21T01:42:48.087000 CVE-2012-4398,0,0,6fb437dd739e7a4e8e9d0f9de89542377ef96d553d2e3e93fd8e8cac958eadd3,2015-03-26T01:59:01.877000 CVE-2012-4399,0,0,6fccc26d1be130ce97bfc23caa6933674962604591928db04015634e1f64e614,2024-02-15T03:23:23.083000 CVE-2012-4400,0,0,e39e2eb51339398b5a5073230012e15154f8a305b3b321760c28c8378e470d78,2020-12-01T14:52:17.767000 CVE-2012-4401,0,0,21ae2cfb637eea0494ceaa9ec9c5cbfa7ed998ec07289fc14f9b1648681023a5,2020-12-01T14:52:17.767000 CVE-2012-4402,0,0,27ef97e6ac83c6c62665a8fcc631469c147737db2f144386085f4b25aa244cb0,2020-12-01T14:52:17.767000 CVE-2012-4403,0,0,247349d2c938bf1d7f57c5097b3f556bf5a3c0d96784cdbaf36ddcfecde2c25c,2020-12-01T14:52:17.767000 -CVE-2012-4404,0,0,60e2a5038a2083eb1ecae0b658b36344737f042a28a9c105569f22fddf64ae3c,2013-04-19T03:24:59.513000 +CVE-2012-4404,0,1,d145a16f8ed94b35179bf3ca6bd4021a1cf9800e1ee64b618805bcb67a89e8b7,2024-11-21T01:42:48.910000 CVE-2012-4405,0,0,b6a8084b6a6a70d82583336f1cfb64baa361bad98cf1e9ca2067c0e6e3713b06,2023-11-07T02:11:51.090000 CVE-2012-4406,0,0,54bd41c9a631074a0627ccf37386b5503cfe758b4bc4bb7df99b769d43dee721,2024-01-25T02:13:29.080000 CVE-2012-4407,0,0,875608928d42c579b8a6fd262170f2ccb418fae2b82c2c2f66e178bad6918190,2020-12-01T14:52:17.767000 @@ -55920,35 +55920,35 @@ CVE-2012-4573,0,0,c8e97a90148902a6c6487470c1fc6445f789ddc92523e478e7ef8783e5d47c CVE-2012-4574,0,0,d23c9472cca3294856918d2011f3aa06b01db4204b1416124fd9f49d3fc3a938,2017-08-29T01:32:19.573000 CVE-2012-4575,0,0,ae3f2e249689619b6c9e8a6c0fb7ae126011cb0e8706e2bc10efccfde6ebbcd6,2023-02-13T04:34:46.190000 CVE-2012-4576,0,0,9b4471c8d31496e65768441334b2c751247b4f77fd38fb58d086a5d539925bce,2019-12-11T16:04:29.127000 -CVE-2012-4577,0,0,1cdc611faf08be43f2b10c5f917a8610b739d9f9f1e1fff514f4abf95ca330c3,2017-08-29T01:32:19.633000 -CVE-2012-4578,0,0,d711f3cfc0bb618d2f1d4130de1802d74684a4d0c430b678adc120f04ff51fe9,2017-08-29T01:32:19.680000 -CVE-2012-4579,0,0,8a1d0e97dccc3f348437a5529d24b09c8554ee70b7e3ad549a2a74a3a5f26dac,2012-08-22T04:00:00 -CVE-2012-4580,0,0,a817eafd51b6eef7f511d908d11ec606db0812907cf035b0f9c5c8e6f0a6ecd7,2012-08-22T10:42:04.710000 -CVE-2012-4581,0,0,17385af86223f7ba7589031ca5de09e0f8459a5d11571245e379937402329f11,2012-08-22T10:42:04.757000 -CVE-2012-4582,0,0,946038d2c01d7e2a4c4788cfed6f692ae09bb8de63bf32ce7df6120887a54e7d,2012-11-20T04:49:32.640000 -CVE-2012-4583,0,0,91cc516f0a87d94fec509feb2ccb60e0e2143530942d34b7f8f80faab51cedea,2012-11-20T04:49:32.890000 -CVE-2012-4584,0,0,f5c46fd588812ba605ea8dc95fddfc7964870221947b0625048a167f45195612,2012-10-30T04:07:53.127000 -CVE-2012-4585,0,0,b520e9e182e34ae9f0adecfffd1ef1a7525744981aa32f8d5eabee5bb6a811f1,2012-11-20T04:49:33.267000 -CVE-2012-4586,0,0,e88e810bdaf33360f28f2e18d5086dd182f9e96f3dc961b5b7a2e4c6ddb32f1d,2012-08-22T17:55:25.883000 -CVE-2012-4587,0,0,90dc2ff782b51606a601fdf636dc646f45725cdc7432397e487e9494af17677a,2017-08-29T01:32:19.743000 -CVE-2012-4588,0,0,b3844f1464bfb8a4cf0b9142f1c3189a56b5b913a0a175608c73af7a22051707,2012-08-22T10:42:05.037000 -CVE-2012-4589,0,0,17ef4aa6241ffa164df20d7b83e462be927b75e179330a9a85c9155137168c8b,2017-08-29T01:32:19.790000 -CVE-2012-4590,0,0,a4149d1f90083290b96e51c722161a3ef4f5e308892644324bbce0a10dbd18a6,2017-08-29T01:32:19.853000 -CVE-2012-4591,0,0,d609379d22e89979a86705dd29fe059079dbacf6d45a2c0e2bf893945f96ee29,2017-08-29T01:32:19.900000 -CVE-2012-4592,0,0,cd250a0ab975aae3f8260b9777e393ed4d3811199410c5fbebe78a7a2e473a7e,2017-08-29T01:32:19.963000 -CVE-2012-4593,0,0,5cc9d2b02c9b14c584bd621d5e338ce02bcb87cf6a148b12c1697ebe686df40d,2012-08-22T10:42:05.320000 -CVE-2012-4594,0,0,ee0e1a0c86a07cc16aaa9eaadcb1eee3fc589b0b558b45a63b38e23d5ddae72d,2017-08-29T01:32:20.027000 -CVE-2012-4595,0,0,c846e8233a99ae5bcb064672bcef952bde5b0525fa6df1994e61be5a3dec851a,2017-08-29T01:32:20.087000 -CVE-2012-4596,0,0,46dc538a9e53f869b748e5705217e31018718b6fe5e8f1ac62abdc4ce875cf57,2013-04-11T03:31:07.060000 -CVE-2012-4597,0,0,7bfdbf45afe2fd7b8632eeac57683275ff84052fa6ab1f4352b7f6a9f27367b4,2017-08-29T01:32:20.133000 -CVE-2012-4598,0,0,3ece4048ed7d16cc3214d2f8d2f6e8a473b7b340bcf24ea6b2b849b446e2928f,2012-08-22T10:42:05.523000 -CVE-2012-4599,0,0,c049966a08b508b0e32700992bc36099b86ff1ee547406c05c48024e9933cb41,2017-01-20T02:59:02.120000 -CVE-2012-4600,0,0,1368656fda2b6d4d9343dae4f95dea84ab514005b94c1f3ecd90b32fd0ba4cc7,2023-11-07T02:11:54.567000 +CVE-2012-4577,0,1,84dd5c7934a9d5dba282d6322df11c0324884048ef90c93629a4a6c41ea2c26a,2024-11-21T01:43:10.480000 +CVE-2012-4578,0,1,a8bb28de3d3577f8c1dd0d7da718b24f95026c451e71365353e4a42924b97871,2024-11-21T01:43:10.633000 +CVE-2012-4579,0,1,82ef1e65a4c231d00484e4847e871c6a4b4f89ab018be1390555c4795ae92949,2024-11-21T01:43:10.790000 +CVE-2012-4580,0,1,fdab67d13a2c1bd1a455a2f4988ae2e65c266af18667b0d27c48014e4e87ea0d,2024-11-21T01:43:10.940000 +CVE-2012-4581,0,1,ec30d347fd586e9501e9288b410d8a9e0e631aa44214b6ff6ef23f588c98f636,2024-11-21T01:43:11.083000 +CVE-2012-4582,0,1,f3e313d54ec9368264614527139721aac60629ed3568529a5ea087df649e6890,2024-11-21T01:43:11.220000 +CVE-2012-4583,0,1,346c545cf944a1f374fc488d954d97ff4061a36604a283dd7f26907e54c9b264,2024-11-21T01:43:11.363000 +CVE-2012-4584,0,1,5091f608a81054f77e25adc18d52977fb6eea90a14c98b15731b5929395b6d7b,2024-11-21T01:43:11.520000 +CVE-2012-4585,0,1,2cd358b787288d6fc21ae62bc19320c97f1dd38b26ece919250abff6e38d528f,2024-11-21T01:43:11.660000 +CVE-2012-4586,0,1,f0dbba29fe3f230fd9756d30d9b6f06d6d3590b96ef2fcd88f3f71199c79ae76,2024-11-21T01:43:11.813000 +CVE-2012-4587,0,1,7692d0077a8fce93ae981c7d44d975e52b00350264672255d0444fb25a0ef1fe,2024-11-21T01:43:11.957000 +CVE-2012-4588,0,1,0098ded09b763b4102e64cfe58298d4c95e8bbaca915e25886145ed2858a763a,2024-11-21T01:43:12.117000 +CVE-2012-4589,0,1,335b5f8a459f53ea305787788b9aa38c6a9d778012501bf3c93b8b3182a53eed,2024-11-21T01:43:12.270000 +CVE-2012-4590,0,1,460cf226fb11f936c9cb033e11557ccad46aea5ab845aac0281292351396826b,2024-11-21T01:43:12.423000 +CVE-2012-4591,0,1,c6b8a263b15d4ffa0a5569f7b8ad3f96043c57f8c10b377b28d57fa879039194,2024-11-21T01:43:12.567000 +CVE-2012-4592,0,1,39fabfc5a2c18d327cdc87353ddfb7b203467d00278a1483f6f6f042978116cf,2024-11-21T01:43:12.710000 +CVE-2012-4593,0,1,9cb74b0f57683ed6025469361050305af6a861517899ee989a3ea952150648f5,2024-11-21T01:43:12.853000 +CVE-2012-4594,0,1,9e94dce0cd8043236152c77cf8ad569fa592add212a4acab231ccacb4adcf210,2024-11-21T01:43:13.007000 +CVE-2012-4595,0,1,04d5e0795bf038dfef08695acf7ea61eba1fac976ff48150813044de536b7805,2024-11-21T01:43:13.167000 +CVE-2012-4596,0,1,8bf0ae0be30c2657c9c50a69ca5415922340a6278e001b2022cafd18c4233728,2024-11-21T01:43:13.317000 +CVE-2012-4597,0,1,9ae8d977ebed1bba11ed8ffc2918a8f0a8253547c7a3269323142778f7cc73ce,2024-11-21T01:43:13.463000 +CVE-2012-4598,0,1,21559a63543e9ab1fe9cb448fcb23801a997585be49ac91e2871baf463b49764,2024-11-21T01:43:13.613000 +CVE-2012-4599,0,1,e5b9a4ec085e58cdc96593b3891075a48ba7511b1d7433b2e54049efb84d5efc,2024-11-21T01:43:13.763000 +CVE-2012-4600,0,1,d9ef45bf8cf94493dfbf1de76437787262d7c23cd73fb5f5075ffa8e4395847f,2024-11-21T01:43:13.917000 CVE-2012-4601,0,0,704e816518e4049241c996d096f6696afb6eec7c29fb4e5d64199e76cb62e09d,2023-11-07T02:11:54.647000 CVE-2012-4602,0,0,d4307ea3ac04f06ef96485f05b1822fdc9d760890871cdcbdaefe2c92a1ad7a6,2023-11-07T02:11:54.710000 CVE-2012-4603,0,0,90b03da31dd6a0cb3f31bba29949f13a7857340905c5a064ff42c2f2b69cad3c,2020-01-22T19:49:57.933000 -CVE-2012-4604,0,0,9c41e47c7c7706138bd10ae8031491582d535019fc439fe39b378d3a9dec3bfc,2012-08-23T10:32:15.047000 -CVE-2012-4605,0,0,97a07c4959fb11ea46ade7d011c14a252d1f3c71e6fa2a56d1a25f7b5587e927,2017-08-29T01:32:20.197000 +CVE-2012-4604,0,1,af6302af29fa29ac4ff82a8d195c55a540c01d81c2474d4e86435ccd8fd531c3,2024-11-21T01:43:14.570000 +CVE-2012-4605,0,1,af6efbcf8fd5b7c5544605b894b43673dbefafdc1096961f3dd7d018ee5321da,2024-11-21T01:43:14.717000 CVE-2012-4606,0,0,0e5311a31114c8d4353465a3bc790cbf0183d0ce74b5a309c7ff019580adb248,2020-02-03T16:16:38.517000 CVE-2012-4607,0,0,a2a2b31c0243b4fd6c62d86a0b11052f91111c28ccc09a08f9e0eebef582d4e4,2013-01-21T05:00:00 CVE-2012-4608,0,0,6da9f388a7bd2fb03530945d89d5c1549d8b46f76aeac4c9ebd97981a640d58c,2012-12-05T15:55:04.710000 @@ -55978,26 +55978,26 @@ CVE-2012-4660,0,0,93d425648bb35673abad08b4d489b9c7aac7533b25933be6381aef676a3613 CVE-2012-4661,0,0,d6aa9d1c67cd92e127cbc67232326153f039359b99dbb56e152a971a863b6852,2023-08-15T14:41:35.310000 CVE-2012-4662,0,0,c4d17dd116dde377ad774ae6821b8227785d2a35fcf246254ac8e2ce007993f0,2023-08-15T14:41:35.310000 CVE-2012-4663,0,0,4d0e2e2e386153adc786025606591a720d439d61c04f980e16110bb15d4177e2,2023-08-15T14:41:35.310000 -CVE-2012-4667,0,0,7d5f20e274179faecb8c37d2550459e45d75e7669975d7ec30097f9e753783b8,2012-10-12T03:30:52.787000 -CVE-2012-4668,0,0,ff38f7f02f658667b83cdbbbea3ce6239adc79a2cbaa795fae494abf058de823,2012-08-27T04:00:00 -CVE-2012-4669,0,0,6df535103d4c7af89a1beb2db23a74a754271bdf2f23aa0aa95287ec0a526412,2012-08-27T04:00:00 -CVE-2012-4670,0,0,156adb0549d6ee30e6d7041e886c5080ba922028ff84a9015d9d0681fb4bb765,2017-08-29T01:32:20.837000 -CVE-2012-4671,0,0,4fa6cfcb7409cc1b2c6ae86a3e12ef0fe8913240b9c2da61474baa8268cad7e3,2012-08-27T04:00:00 -CVE-2012-4672,0,0,3384be3f2ca309f6ffb78645c3ba78ad171333206910ad307031df072f71e4ad,2017-08-29T01:32:20.900000 -CVE-2012-4673,0,0,5e9186011ec85f5a1941d735c13b14a79523377a6602ad480e74181e4ff917c6,2012-08-27T04:00:00 -CVE-2012-4674,0,0,2ceaa8ab0027e7196e8552fe6c9ba3018508f6bf2aec6e10dd2071a74d9de0b0,2012-08-27T21:32:36.290000 -CVE-2012-4675,0,0,b306d38c2e6a141d54fa7332d0bb3f38e38a1d434415cce4425e2d45940c5749,2017-08-29T01:32:20.963000 -CVE-2012-4676,0,0,fe953d4315155a65256f1312d26bf7471744ad85588ac6a0890b0cf6195aaf73,2012-08-27T04:00:00 -CVE-2012-4677,0,0,552be6630cdb94e2d1992b86c8dfba9c7a38bf3590c1950b7ecbb1388de0e55a,2012-08-27T04:00:00 -CVE-2012-4678,0,0,9dfb4939544bba2b64f64274ef514bb37db8ae7da1239a28dda1e5e029f4500b,2012-08-27T13:05:43.227000 -CVE-2012-4679,0,0,d4fed7e5b245c67fd7e285c92f6b9655c583fd1d3f8f2bbe86620dfeb3518a3c,2017-08-29T01:32:21.027000 -CVE-2012-4680,0,0,258701e84158138cc279de6a31ff504aa01b6845849bb03b7b3f786ca089af7e,2013-07-25T16:46:00.353000 -CVE-2012-4681,0,0,93f5ed1fef2a7d98e2523e226c355edd713a005f28dbe39adf8507a73b752566,2022-12-21T15:28:09.200000 +CVE-2012-4667,0,1,9897fb8664c3088772b6741b8aacb70d105781830902e5bd80b952480e694f4e,2024-11-21T01:43:18.430000 +CVE-2012-4668,0,1,465bdc339e8ca31b8e2c5155ca7b582e0546ba45457133f286a08a39765b0f67,2024-11-21T01:43:18.590000 +CVE-2012-4669,0,1,14781e9aa776913bb1d4c04cebca0f2e09e6de5a10ecf09b569b3f568ac92a71,2024-11-21T01:43:18.747000 +CVE-2012-4670,0,1,8712ba25083dcbc64ad1a30d7941f7bd69c4a72f9a4b07faaa6ab0a7673e5036,2024-11-21T01:43:18.893000 +CVE-2012-4671,0,1,d59494052b5a2c49ce371d71c1bd6ea52e3251904e40e51bc28fab8f79e30df4,2024-11-21T01:43:19.040000 +CVE-2012-4672,0,1,22ff726cc76e1b51b5d784c56765efc612d9f25d08c449af46e03e0cce29f14a,2024-11-21T01:43:19.193000 +CVE-2012-4673,0,1,cf3d39a1da4890638319fbad0e90e2e5722ee9f869b137308e2f164ad84b93e7,2024-11-21T01:43:19.353000 +CVE-2012-4674,0,1,1595c57febf6a4b699a86fb9a38a39018b6214650a1349209b314e1756621346,2024-11-21T01:43:19.500000 +CVE-2012-4675,0,1,b978661076e31a7e324e919f6c702ec2727379d618354c14b721e3108cd9cfda,2024-11-21T01:43:19.647000 +CVE-2012-4676,0,1,a4a0332c8dc8014d59a22f8455bed123697129e5c1ce536f1abb1d5b7fd747fe,2024-11-21T01:43:19.787000 +CVE-2012-4677,0,1,36fb6d2700f3ca3f1bbb94ceae521db314e0fdac1315733ca07fac2eb544c218,2024-11-21T01:43:19.930000 +CVE-2012-4678,0,1,69cedad04a6589a75c02ba26e646c85f83d007040688604a5bd76f3495053bbd,2024-11-21T01:43:20.097000 +CVE-2012-4679,0,1,3067db1c35966d4312d8345377738204e72b523d5b541e9566e91ad20af1f23f,2024-11-21T01:43:20.307000 +CVE-2012-4680,0,1,5868e226983cbabd22f8bf823a5a09429fa41a717c72911749ae6cd89b3aef6d,2024-11-21T01:43:20.460000 +CVE-2012-4681,0,1,1d77e9670440e3db400368b000cd29d0aae3ef6621fd71a2aa738b61e2b32a84,2024-11-21T01:43:20.600000 CVE-2012-4682,0,0,ec31cbe4324677949207860d5d58c139cfb4e28a2c51499b6c95448bbc22fe26,2020-03-18T17:38:27.733000 CVE-2012-4683,0,0,1d02e74ffb51134974804419105f58e67b27348cbb7db17e3696fbdc7501f295,2020-03-18T17:38:27.733000 CVE-2012-4684,0,0,4857a6d3d1211d94a3bbb484e9ba9480fd6c359908f64dd54fde4212a3432b74,2020-03-18T17:38:21.580000 -CVE-2012-4685,0,0,694088c846c49d16ffa3f494f9a0f378a75c36c7108a0efebf52916854b3ce8d,2017-08-29T01:32:21.087000 -CVE-2012-4686,0,0,fc4b61afc42d673515c4820a8d241df87b8ef582e070379f1a8742ba556f2df9,2012-08-29T14:34:52.630000 +CVE-2012-4685,0,1,7cc12be85e8401fcdca2738cd7a76e9d65248f52c034f5fbf7872a288175556e,2024-11-21T01:43:21.223000 +CVE-2012-4686,0,1,990e33866467dc23871d4876f98e261f9f1c7ca5d80b30524797ba025d559d74,2024-11-21T01:43:21.377000 CVE-2012-4687,0,0,e199998fb3125d6e0967ccb0f4c81b20267c00fd1317183de0caa379f217ffec,2012-12-26T05:00:00 CVE-2012-4688,0,0,1d5bf5ed4d33edb43758b4b153c0ec32daf756e966b93f4951b167b1a6853a3f,2012-12-31T11:50:27.220000 CVE-2012-4689,0,0,8b18c01013660903cdfca9fd607d28c397e308ecb85e683045ac89fdd078403b,2013-01-29T05:00:00 @@ -56046,27 +56046,27 @@ CVE-2012-4732,0,0,4a6c63b5a6d78f0d41df53f8eecada097b1f0cb9140c0272eae13cb9a641d9 CVE-2012-4733,0,0,6a276047bf6678ab27171617bde43678e93b489b7e74cfd5de2aae4bb8933f19,2013-08-27T17:16:05.973000 CVE-2012-4734,0,0,5025ec835f725a6bc9c2f8597c2d662e6c8719fd233116d77d333bbd7162bb64,2013-03-02T04:46:08.570000 CVE-2012-4735,0,0,de3b1868df34ab7e17de2c9a04eeaec39ea6b13cd21308f41bf7fec12178cda4,2023-11-07T02:11:58.037000 -CVE-2012-4736,0,0,9125c21ca8db5849b83ed0663db6653fb09a129ae2be0c6b10daf3d192f114ed,2017-08-29T01:32:21.290000 -CVE-2012-4737,0,0,87e3c450db459cbe8917b6133f0fd0ba893063af82c7b480630d86141dd8ae90,2013-04-19T03:25:34.037000 -CVE-2012-4739,0,0,b39698214f3682c293078e0de4a8d89b5b3114ed2942cb3a6752292a26937bbd,2017-08-29T01:32:21.337000 -CVE-2012-4740,0,0,775c3626a685318bbbc695adc2e06859e9ab1fcf6af409ef95f5e7142ca9ccc0,2017-08-29T01:32:21.383000 -CVE-2012-4741,0,0,016d391873e7ee45f0c1e71f388b7a3b1c62bf04c3244a17e6797878d77c0cbc,2017-08-29T01:32:21.447000 -CVE-2012-4742,0,0,daea78b63a4a10ca7f6818f62c90063f59ab4056915734fcd5a00aa75203536a,2012-09-03T04:00:00 -CVE-2012-4743,0,0,ede54167cc0a729837de9293139f29cc2628c92516e79310c317bbc1c0241979,2017-08-29T01:32:21.493000 -CVE-2012-4744,0,0,315242fcce6ad7e3ac2e5aeafa5e0f20c423f256ecf747ac80adeb7faf3b2fd6,2017-08-29T01:32:21.557000 -CVE-2012-4745,0,0,cc45eb8df868d8a49a07c6e719ad10030322df10f062252da0a3d6e4eb01537d,2023-11-07T02:11:58.130000 -CVE-2012-4746,0,0,8a87de4a9bf88ee260a817d8ea30a01dd41b735f27165d7bafb070b7c87478c8,2012-09-03T04:00:00 -CVE-2012-4747,0,0,61a4e422c0b99b2357333dddea151479d3b6f81a2b3d555425b8da2327cc0b13,2012-09-04T11:04:50.357000 +CVE-2012-4736,0,1,a43b8a4b10f0bb48824e187c3449682086fe63de41c29644b2d10cc1ef414362,2024-11-21T01:43:25.940000 +CVE-2012-4737,0,1,59af0132b3711fe7a11468a87fdfc46155b7189f60b9b0b540e2d9a6b8c4e71c,2024-11-21T01:43:26.073000 +CVE-2012-4739,0,1,a408f5b41fe57d69282d90bfbf71bdc7203d2afb6162c292eb267e14758d88e1,2024-11-21T01:43:26.233000 +CVE-2012-4740,0,1,e550b726054ef098cab00efe66586d90caa9411710dc6249a9c239d56481d773,2024-11-21T01:43:26.390000 +CVE-2012-4741,0,1,06aa04314393f7a3d91a8c78ceda1d3478e01234ecbbad6a27e9934edc151d08,2024-11-21T01:43:26.530000 +CVE-2012-4742,0,1,f10fa7828b5fbbbff0d10ff8481f81a38ea0e9f047596bd8ea65d6ae53f6123f,2024-11-21T01:43:26.670000 +CVE-2012-4743,0,1,df8f452057f22a495e6ebc4e4dc99b1b1ffceee6499ab3f1f182bf16218a9176,2024-11-21T01:43:26.813000 +CVE-2012-4744,0,1,2779bc8e50353f1da435a32f180cb0745f8a484d88fb071357faf7f7da556ee8,2024-11-21T01:43:26.967000 +CVE-2012-4745,0,1,2d61b72f8a9b961bd627754495970c2e15b74918b5597e264890b675b12731ea,2024-11-21T01:43:27.107000 +CVE-2012-4746,0,1,963f62e1453f1a47b7d790bac7d7e15bbe1d54afcee66045f652cca34f568922,2024-11-21T01:43:27.253000 +CVE-2012-4747,0,1,4c983565a14fc36413b3aa1767dd4a189891d24d91a2c3429a04244098cc0cf7,2024-11-21T01:43:27.397000 CVE-2012-4750,0,0,3175af152730c2b7c5b82ccb6e1850ee917efa4fe6c6e15e232d29052945fd3e,2020-01-22T15:31:20.270000 CVE-2012-4751,0,0,48d37f8b9d28c30ff41c0b0476248037cb7539c0cdd9f109cc3398d6494f98e8,2023-11-07T02:11:58.207000 -CVE-2012-4752,0,0,c036087c5f0bee90793e067d0d073cf0bdc6602399e6580ada10e833d5d3fb77,2012-09-06T16:09:47.347000 -CVE-2012-4753,0,0,1e0011a9234a4a7e80e8638d092581a219ad1a3a3b0287a227d8b3269a1c9cad,2012-09-06T16:11:58.220000 -CVE-2012-4754,0,0,016d45179a06f749a15db1596eb8d413a11be4c9afb40f32000c0f44cf4145a6,2012-09-06T18:13:19.017000 -CVE-2012-4755,0,0,4a8e9e77c4990f2c1ae14129dd044750cdb27341b9166c4510d9af24617ee772,2012-09-06T18:18:13.613000 -CVE-2012-4756,0,0,32cc0a751df71c55416b1d843cb3da7516076c65a76571ec1065b3b545a8e97b,2012-09-06T10:41:58.923000 -CVE-2012-4757,0,0,3cbfae0e941502bc0d282b77830cb2f7c2de999922a6e47ff7fd2aa025eb4a8c,2012-09-06T10:41:58.957000 -CVE-2012-4758,0,0,90d8d9f3c32cdf3bc62da5b0bff01503df2444e66bc6990b3c2814983719f455,2012-09-06T18:21:27.440000 -CVE-2012-4759,0,0,2e7d633bf97f075f6af6c2cf718c1f9b1dc95957f710fb34616b2429f455dd9d,2012-09-06T10:41:59.173000 +CVE-2012-4752,0,1,e3d739cd2b43778d31030fefae7ed4dfb145c9d221ee39829aa64b0c535671b4,2024-11-21T01:43:27.900000 +CVE-2012-4753,0,1,7971f6bf75daeb94c226fd3ed2c25a06ae9ee243c2db4cb6bd46464ae9798901,2024-11-21T01:43:28.743000 +CVE-2012-4754,0,1,ead101fc753f653743bc5d8d03ebcc47a7ba77fbfd45229846bb76ca454159d0,2024-11-21T01:43:29.110000 +CVE-2012-4755,0,1,e5aebdf0ccb05e84cec5bfebc78fddbc7f887a3666d257cd65124358237ba1b2,2024-11-21T01:43:29.353000 +CVE-2012-4756,0,1,a72984435d1c3c2c6347503098258ec53b7787d0b0d6b2fa96387d08eea37329,2024-11-21T01:43:29.497000 +CVE-2012-4757,0,1,cb95c794a9de273fdfa32244f342faaf2c9a2e46792c1923010859d894927839,2024-11-21T01:43:29.643000 +CVE-2012-4758,0,1,adc9163d2bc2eef0a66a7e115208efd9cdca9dd516d9dc8c2f9f588f85ce7091,2024-11-21T01:43:29.790000 +CVE-2012-4759,0,1,60c3ebe9e3661027cb965944ebc5a28ded3677b97625d5c310fd22d7bc3c83f0,2024-11-21T01:43:29.930000 CVE-2012-4760,0,0,71d062ebaec71b39ad97371269216b33523c160cbd5e85c1c30e605834905785,2020-01-21T18:14:40.700000 CVE-2012-4761,0,0,7e21ea5b675a92b4a50238ee65feb9b393ab6f0fb97231f935f8fc22bff68b6a,2020-01-22T15:29:35.390000 CVE-2012-4767,0,0,a5178f9e0c96fd504ee111c716c59c3a36a64cfee07888f7b516d7a56b1f5b6d,2020-01-21T18:14:48.263000 @@ -56154,34 +56154,34 @@ CVE-2012-4859,0,0,f20f2c711f7fe82a05d241b9cf1eff0bf76a44c7b34fcc01355da2779e0652 CVE-2012-4861,0,0,1a0e7de306204da8d36ef9371936646c787fe9bca7cb5c5297091d6163ca9261,2017-08-29T01:32:24.087000 CVE-2012-4862,0,0,0a8329743aed3ed2f8854bb44c08a9bfb67b4caa8b10448a2c88afa7a50c61c7,2017-08-29T01:32:24.150000 CVE-2012-4863,0,0,3368134a6b980d030be1d5c75deea6aabcd55af36fbd424a656fc102e430264c,2020-01-30T14:25:40.537000 -CVE-2012-4864,0,0,2b213535610748cd306b03dfe46e01ae675b32d71db0ced06a7c7b0694213061,2017-08-29T01:32:24.197000 -CVE-2012-4865,0,0,dc190556b6754f85f90feab5041664f4e46ab8431b39face0e69bce3b2925880,2012-09-13T04:00:00 -CVE-2012-4866,0,0,140ff72cdd1aa1edf96053c0ed226636577af2312dbef9a805436f9a672da576,2017-08-29T01:32:24.260000 -CVE-2012-4867,0,0,0b4b3be3c66601f2a43d4086832bd620e6a945805e3709e280470791bae57566,2012-09-07T04:00:00 -CVE-2012-4868,0,0,6797fe6e30f03dad547463ac7c19fed6e0fac21855c4d863e03b584db7ec3546,2012-09-07T04:00:00 -CVE-2012-4869,0,0,4a2fb872f9645b969eca88077ab3cb88dd5fb54980c45ec308aa7875efc0c0f8,2019-12-10T16:01:35.610000 -CVE-2012-4870,0,0,1c36591fa7c2f0bbec2599adf7ec9cb258866196b60ae3aa07fd7b1f355ad8c7,2019-12-10T16:01:29.123000 -CVE-2012-4871,0,0,72cbee2f39c1baaec730802301ecb20ee13e426ab0f7b08846d64ccb21de1073,2024-02-14T01:17:43.863000 -CVE-2012-4872,0,0,6832a85869e63c3407843442a044604a91318a5074cd15e0cd1856ad6ea7db90,2017-08-29T01:32:24.493000 -CVE-2012-4873,0,0,75214586a8ab4dde041f321b06c461ed74d48483960b766f71dd7440f236df33,2012-09-10T04:00:00 -CVE-2012-4874,0,0,f7b7262b690cd848a43a91169e25ff55249b6547cd663cdc2fa0ecacc9873c17,2012-09-07T04:00:00 -CVE-2012-4875,0,0,7561ced43145505a5b45fac7e71b889df0056669305f845ac6a805451dedf47b,2024-08-06T21:15:49.507000 -CVE-2012-4876,0,0,dab6f65e4bacc07ac95756f7de409fe322383746af4ad405d2df902453332264,2012-09-07T04:00:00 -CVE-2012-4877,0,0,752a8fe9c5321b6175cbc52272b342568a017d8d8fe2d06060ca9d7ac0bf6360,2017-08-29T01:32:24.603000 -CVE-2012-4878,0,0,9241fc0c6fb42ba67b79c23ac4b5da118393f1f597fdc99c6f57e589aebf1181,2017-08-29T01:32:24.650000 -CVE-2012-4879,0,0,3a9268ec6029cfc9ebe4c9e183cf16719c853f73d12099c90452f7dd3da4aeb2,2013-10-11T14:45:26.637000 -CVE-2012-4880,0,0,2ecb000446f5f7ebe2e18a4a25755384acd0f4562a855f10f15c6633f0b8029f,2012-09-10T04:00:00 -CVE-2012-4881,0,0,4f1b9ac891de9c6f4eb8fcc77ffc870c70f3130bd49358fb09f6b20f4079f960,2012-09-10T04:00:00 -CVE-2012-4882,0,0,024d065b08e041c91deb33291a5a8433a0c29cb816f24e080eabee8a1c47f280,2012-09-10T04:00:00 -CVE-2012-4883,0,0,873950fb9a49c8457157b2923d1ca5be149146a171df6c2e57fd51ea43fa1209,2012-09-17T04:00:00 +CVE-2012-4864,0,1,9cac32ed70b875fdb90e31d21bda8d21216ef7bdf0bc3796c062eb294df1e4d8,2024-11-21T01:43:38 +CVE-2012-4865,0,1,f4b5e3d7e891f22e4b6358ba5479f68a84091c8928d4c3a1840ef74377eafd53,2024-11-21T01:43:38.143000 +CVE-2012-4866,0,1,6f5607f67f16ca7e5160a618dd3d00e8462094c4f73716f13ac90e4f43b89be7,2024-11-21T01:43:38.297000 +CVE-2012-4867,0,1,a7b0c3b2b463043629411cb27d658d11505eb33135d5f4eff4de601c37069776,2024-11-21T01:43:38.450000 +CVE-2012-4868,0,1,d383a8bcf62e1ea0eede00817b9197f7ab8f04cb75190886292ae49f970460cb,2024-11-21T01:43:38.593000 +CVE-2012-4869,0,1,62f2bf0666e41b7d65e87c6679f632086aa4e182601cc76e9220accd4fa4c1ae,2024-11-21T01:43:38.737000 +CVE-2012-4870,0,1,87a84bac549d1ed622e8684c15a8869e37f691d6c4c4b99f00a56086ced61564,2024-11-21T01:43:38.883000 +CVE-2012-4871,0,1,9b5d4364e970c8606e1907ac4e3be5af144b4cffa5276adbe2c994aabebd5181,2024-11-21T01:43:39.047000 +CVE-2012-4872,0,1,ca9f4b21dca58210c81576e2237bf7b67f2abbd8a6f8106898098afe8420fc72,2024-11-21T01:43:39.193000 +CVE-2012-4873,0,1,8da451df928d2b90cde71cb12a2edb0d229f04f8d1097227a9b5b3a3da947756,2024-11-21T01:43:39.343000 +CVE-2012-4874,0,1,0185afd0d695ecb5a7223ec6c4ef02b68a513e869e358e2e06bd9c8ac08e4b8b,2024-11-21T01:43:39.490000 +CVE-2012-4875,0,1,3dd35a397f949e877d5bd0fd644217105698db9f161cb08f76e0c82f2a62ddff,2024-11-21T01:43:39.647000 +CVE-2012-4876,0,1,7e68c5da1f56f283db212d26c3df08062c1c35c8b72117459b2a47e8940cf0a8,2024-11-21T01:43:39.807000 +CVE-2012-4877,0,1,daf536db8f6ebeff4ad222d191f53315950714befcae76df43b59f98983a30a7,2024-11-21T01:43:39.967000 +CVE-2012-4878,0,1,6f540d54e9f39414decb61c092843b79d298211fcb225f3c113ee0c085ab500c,2024-11-21T01:43:40.130000 +CVE-2012-4879,0,1,cf11741cf87d89d9a41b3399bfe8157a11ac5704d7ac32917bb5120754f881d2,2024-11-21T01:43:40.280000 +CVE-2012-4880,0,1,f735ba49531c2929b264c8f7347412edbeaafac7166c9a1cc6332cbc9f79e611,2024-11-21T01:43:40.423000 +CVE-2012-4881,0,1,a7ffb90971bbe2be43f859961d0a7a480134878bf85a0954b81e182b9d720e74,2024-11-21T01:43:40.563000 +CVE-2012-4882,0,1,c67b765f31382ac262f9731fbfe39c3fd47e85a5d9f3d3d14b802302a9d0b93c,2024-11-21T01:43:40.713000 +CVE-2012-4883,0,1,562f7b3da505efcc159d4f1164a66391848d7784838a1235c7b6d894ac514c5e,2024-11-21T01:43:40.873000 CVE-2012-4884,0,0,d71d3f8e36002916f259cd000af6f8edb31677aa126ac4ef0485c7a59b147f4e,2012-11-15T05:00:00 -CVE-2012-4885,0,0,df083bb5fd39ba4daafdc51360cd2d0bb04944b082344a286c58ecf9642e7211,2012-09-10T18:27:56.397000 +CVE-2012-4885,0,1,e2825b50054301a78b0b04086006496b689993b01299f22f9a13c1a5b7f80ec8,2024-11-21T01:43:41.163000 CVE-2012-4886,0,0,5d9930d6c8b94413bede499ead8de9216de533f6c5e29e2f1ac5f351d925de38,2017-08-29T01:32:24.743000 -CVE-2012-4889,0,0,33d6cf7bac26456cc85068c803f9efceb46eff0a2165deabeb39e9e4e7a60084,2017-08-29T01:32:24.807000 -CVE-2012-4890,0,0,3c7626b3b7aa1cff0564193d7b567c38ecb4344fa031b138b7a8bb69997b540e,2017-08-29T01:32:24.870000 -CVE-2012-4891,0,0,5d6556a1ab982ebcd7c24812ffe3b6efa1659b3a78a24c5a06e41f5d4063c57f,2017-08-29T01:32:24.977000 -CVE-2012-4892,0,0,bbaa5dcad42cecd94af114e264a828aff375e3c21656c00eabefb90ab25f413d,2017-08-29T01:32:25.027000 -CVE-2012-4893,0,0,e381f6a8943e18b4faf0b9332cb3b63f546eabdf35a173714e28f24aa6033f3f,2012-09-12T14:30:24.007000 +CVE-2012-4889,0,1,2d1994b6c92834e5e07e6c3f8006674e25040e6cc2e949caabc686177e3e153b,2024-11-21T01:43:41.523000 +CVE-2012-4890,0,1,552e0bee8b2a61315842416f2f25e9d3fe6d8bcaa2ea90707d9254c1fdb76e9f,2024-11-21T01:43:41.680000 +CVE-2012-4891,0,1,cbf2c3bc0d00570b9834c240af9016693c66a53c3e65f7a613e19ecba46dd602,2024-11-21T01:43:41.823000 +CVE-2012-4892,0,1,21e6e11f7ac1df57e5d93cb9f7a941df01698adee884d9a46a0b0a54b3b90e0c,2024-11-21T01:43:41.970000 +CVE-2012-4893,0,1,7ae7a7991cb992a7d4550b1aa4a705bfbe6c9d4e6a86413fe07f2ad81c9c1312,2024-11-21T01:43:42.123000 CVE-2012-4894,0,0,b8ec0957f7a2d5af188810ca932aa9716b20b2f576da6a48b5d45b65586413ca,2017-08-29T01:32:25.087000 CVE-2012-4895,0,0,e0786feba6f9ee9011987d926a93d86288bb4f408ef4008f4c068b4d638af404,2020-03-11T14:58:40.817000 CVE-2012-4896,0,0,9607cdcb68b2a21fb67771f0cbfd11b4cac3fc383a90162a4e36c012b17e262c,2020-03-11T14:58:40.817000