From 76f957c5f622b79cf2fd656c18d5f342c8a9ebc8 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=A9=20Helmke?= Date: Wed, 17 May 2023 02:00:27 +0200 Subject: [PATCH] Auto-Update: 2023-05-17T00:00:24.004568+00:00 --- CVE-2020/CVE-2020-145xx/CVE-2020-14575.json | 35 +- CVE-2020/CVE-2020-146xx/CVE-2020-14678.json | 35 +- CVE-2020/CVE-2020-146xx/CVE-2020-14680.json | 35 +- CVE-2020/CVE-2020-146xx/CVE-2020-14697.json | 5 +- CVE-2020/CVE-2020-147xx/CVE-2020-14702.json | 35 +- CVE-2020/CVE-2020-158xx/CVE-2020-15888.json | 7 +- CVE-2020/CVE-2020-161xx/CVE-2020-16168.json | 9 +- CVE-2021/CVE-2021-00xx/CVE-2021-0010.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0011.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0014.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0015.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0016.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0017.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0018.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0019.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0020.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0021.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0022.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0023.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0024.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0025.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0026.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0027.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0028.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0029.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0030.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0031.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0032.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0033.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0034.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0035.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0036.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0037.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0038.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0039.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0040.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0041.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0042.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0043.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0044.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0045.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0046.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0047.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0048.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0049.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0050.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0059.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0068.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0080.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0081.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0085.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0087.json | 15 + CVE-2021/CVE-2021-00xx/CVE-2021-0088.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0122.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0123.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0128.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0130.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0136.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0137.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0138.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0139.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0140.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0141.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0142.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0149.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0150.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0181.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0184.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0187.json | 1506 +------------------ CVE-2021/CVE-2021-01xx/CVE-2021-0191.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0192.json | 15 + CVE-2021/CVE-2021-01xx/CVE-2021-0195.json | 15 + CVE-2021/CVE-2021-206xx/CVE-2021-20600.json | 17 +- CVE-2021/CVE-2021-231xx/CVE-2021-23145.json | 15 + CVE-2021/CVE-2021-269xx/CVE-2021-26946.json | 15 + CVE-2021/CVE-2021-330xx/CVE-2021-33065.json | 15 + CVE-2021/CVE-2021-330xx/CVE-2021-33066.json | 15 + CVE-2021/CVE-2021-330xx/CVE-2021-33067.json | 15 + CVE-2021/CVE-2021-330xx/CVE-2021-33070.json | 15 + CVE-2021/CVE-2021-36xx/CVE-2021-3609.json | 32 +- CVE-2022/CVE-2022-247xx/CVE-2022-24738.json | 8 +- CVE-2022/CVE-2022-278xx/CVE-2022-27856.json | 47 +- CVE-2022/CVE-2022-352xx/CVE-2022-35266.json | 4 +- CVE-2022/CVE-2022-450xx/CVE-2022-45061.json | 238 ++- CVE-2022/CVE-2022-471xx/CVE-2022-47137.json | 59 +- CVE-2022/CVE-2022-474xx/CVE-2022-47423.json | 47 +- CVE-2022/CVE-2022-474xx/CVE-2022-47436.json | 47 +- CVE-2023/CVE-2023-275xx/CVE-2023-27510.json | 93 +- CVE-2023/CVE-2023-316xx/CVE-2023-31677.json | 20 + CVE-2023/CVE-2023-316xx/CVE-2023-31678.json | 20 + CVE-2023/CVE-2023-316xx/CVE-2023-31679.json | 20 + CVE-2023/CVE-2023-319xx/CVE-2023-31906.json | 65 +- CVE-2023/CVE-2023-319xx/CVE-2023-31907.json | 65 +- README.md | 227 ++- 94 files changed, 1934 insertions(+), 1792 deletions(-) create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0010.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0011.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0014.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0015.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0016.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0017.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0018.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0019.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0020.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0021.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0022.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0023.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0024.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0025.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0026.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0027.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0028.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0029.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0030.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0031.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0032.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0033.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0034.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0035.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0036.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0037.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0038.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0039.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0040.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0041.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0042.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0043.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0044.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0045.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0046.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0047.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0048.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0049.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0050.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0059.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0068.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0080.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0081.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0085.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0087.json create mode 100644 CVE-2021/CVE-2021-00xx/CVE-2021-0088.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0122.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0123.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0128.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0130.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0136.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0137.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0138.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0139.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0140.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0141.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0142.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0149.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0150.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0181.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0184.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0191.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0192.json create mode 100644 CVE-2021/CVE-2021-01xx/CVE-2021-0195.json create mode 100644 CVE-2021/CVE-2021-231xx/CVE-2021-23145.json create mode 100644 CVE-2021/CVE-2021-269xx/CVE-2021-26946.json create mode 100644 CVE-2021/CVE-2021-330xx/CVE-2021-33065.json create mode 100644 CVE-2021/CVE-2021-330xx/CVE-2021-33066.json create mode 100644 CVE-2021/CVE-2021-330xx/CVE-2021-33067.json create mode 100644 CVE-2021/CVE-2021-330xx/CVE-2021-33070.json create mode 100644 CVE-2023/CVE-2023-316xx/CVE-2023-31677.json create mode 100644 CVE-2023/CVE-2023-316xx/CVE-2023-31678.json create mode 100644 CVE-2023/CVE-2023-316xx/CVE-2023-31679.json diff --git a/CVE-2020/CVE-2020-145xx/CVE-2020-14575.json b/CVE-2020/CVE-2020-145xx/CVE-2020-14575.json index de991552c2a..bfbe3306165 100644 --- a/CVE-2020/CVE-2020-145xx/CVE-2020-14575.json +++ b/CVE-2020/CVE-2020-145xx/CVE-2020-14575.json @@ -2,7 +2,7 @@ "id": "CVE-2020-14575", "sourceIdentifier": "secalert_us@oracle.com", "published": "2020-07-15T18:15:23.597", - "lastModified": "2022-07-01T15:18:32.567", + "lastModified": "2023-05-16T22:55:30.580", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,22 +96,6 @@ } ], "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", - "versionEndIncluding": "8.0.20", - "matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407" - } - ] - } - ] - }, { "nodes": [ { @@ -196,6 +180,23 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.20", + "matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD" + } + ] + } + ] } ], "references": [ diff --git a/CVE-2020/CVE-2020-146xx/CVE-2020-14678.json b/CVE-2020/CVE-2020-146xx/CVE-2020-14678.json index 4af8de3b02b..13cbf838d71 100644 --- a/CVE-2020/CVE-2020-146xx/CVE-2020-14678.json +++ b/CVE-2020/CVE-2020-146xx/CVE-2020-14678.json @@ -2,7 +2,7 @@ "id": "CVE-2020-14678", "sourceIdentifier": "secalert_us@oracle.com", "published": "2020-07-15T18:15:32.457", - "lastModified": "2022-06-30T21:00:30.310", + "lastModified": "2023-05-16T22:59:36.700", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,22 +96,6 @@ } ], "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", - "versionEndIncluding": "8.0.20", - "matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407" - } - ] - } - ] - }, { "nodes": [ { @@ -171,6 +155,23 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.20", + "matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD" + } + ] + } + ] } ], "references": [ diff --git a/CVE-2020/CVE-2020-146xx/CVE-2020-14680.json b/CVE-2020/CVE-2020-146xx/CVE-2020-14680.json index 4952a8b21f9..17243fcb137 100644 --- a/CVE-2020/CVE-2020-146xx/CVE-2020-14680.json +++ b/CVE-2020/CVE-2020-146xx/CVE-2020-14680.json @@ -2,7 +2,7 @@ "id": "CVE-2020-14680", "sourceIdentifier": "secalert_us@oracle.com", "published": "2020-07-15T18:15:32.647", - "lastModified": "2022-06-30T21:01:56.163", + "lastModified": "2023-05-16T22:58:48.653", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,22 +96,6 @@ } ], "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", - "versionEndIncluding": "8.0.20", - "matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407" - } - ] - } - ] - }, { "nodes": [ { @@ -171,6 +155,23 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.20", + "matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD" + } + ] + } + ] } ], "references": [ diff --git a/CVE-2020/CVE-2020-146xx/CVE-2020-14697.json b/CVE-2020/CVE-2020-146xx/CVE-2020-14697.json index c7e477345a8..8298c164ed2 100644 --- a/CVE-2020/CVE-2020-146xx/CVE-2020-14697.json +++ b/CVE-2020/CVE-2020-146xx/CVE-2020-14697.json @@ -2,7 +2,7 @@ "id": "CVE-2020-14697", "sourceIdentifier": "secalert_us@oracle.com", "published": "2020-07-15T18:15:33.973", - "lastModified": "2022-06-30T21:03:05.463", + "lastModified": "2023-05-16T22:55:00.257", "vulnStatus": "Analyzed", "descriptions": [ { @@ -105,8 +105,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.20", - "matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407" + "matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD" } ] } diff --git a/CVE-2020/CVE-2020-147xx/CVE-2020-14702.json b/CVE-2020/CVE-2020-147xx/CVE-2020-14702.json index 3c460c232cf..744a1fbf0d6 100644 --- a/CVE-2020/CVE-2020-147xx/CVE-2020-14702.json +++ b/CVE-2020/CVE-2020-147xx/CVE-2020-14702.json @@ -2,7 +2,7 @@ "id": "CVE-2020-14702", "sourceIdentifier": "secalert_us@oracle.com", "published": "2020-07-15T18:15:34.397", - "lastModified": "2022-06-30T20:47:58.960", + "lastModified": "2023-05-16T22:56:00.377", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,22 +96,6 @@ } ], "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", - "versionEndIncluding": "8.0.20", - "matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407" - } - ] - } - ] - }, { "nodes": [ { @@ -171,6 +155,23 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.20", + "matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD" + } + ] + } + ] } ], "references": [ diff --git a/CVE-2020/CVE-2020-158xx/CVE-2020-15888.json b/CVE-2020/CVE-2020-158xx/CVE-2020-15888.json index fadff5c42a1..e0c5a9da9b8 100644 --- a/CVE-2020/CVE-2020-158xx/CVE-2020-15888.json +++ b/CVE-2020/CVE-2020-158xx/CVE-2020-15888.json @@ -2,7 +2,7 @@ "id": "CVE-2020-15888", "sourceIdentifier": "cve@mitre.org", "published": "2020-07-21T22:15:12.090", - "lastModified": "2021-07-21T11:39:23.747", + "lastModified": "2023-05-16T22:31:05.550", "vulnStatus": "Analyzed", "descriptions": [ { @@ -92,9 +92,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.4.0", - "matchCriteriaId": "0081016A-225E-4C17-8B9E-F39047CA61CD" + "criteria": "cpe:2.3:a:lua:lua:5.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "E9F78BF8-B73C-42C6-AF54-2CD935670053" } ] } diff --git a/CVE-2020/CVE-2020-161xx/CVE-2020-16168.json b/CVE-2020/CVE-2020-161xx/CVE-2020-16168.json index 0070d518b7d..2fd26f75169 100644 --- a/CVE-2020/CVE-2020-161xx/CVE-2020-16168.json +++ b/CVE-2020/CVE-2020-161xx/CVE-2020-16168.json @@ -2,8 +2,8 @@ "id": "CVE-2020-16168", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-07T13:15:10.777", - "lastModified": "2020-09-02T19:15:17.500", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T22:42:15.457", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:robotemi:temi_firmware:20190419.165201:*:*:*:*:*:*:*", - "matchCriteriaId": "EFC89C88-25E2-43D8-BA74-EB10820F24D8" + "criteria": "cpe:2.3:o:robotemi:temi_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.7931", + "matchCriteriaId": "2B3C8C0D-7B39-48C1-BECE-70F96BD9FCF9" } ] }, diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0010.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0010.json new file mode 100644 index 00000000000..d12801da3ca --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0010.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0010", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.137", + "lastModified": "2023-05-16T22:15:10.137", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0011.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0011.json new file mode 100644 index 00000000000..9e0782433a9 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0011.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0011", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.210", + "lastModified": "2023-05-16T22:15:10.210", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0014.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0014.json new file mode 100644 index 00000000000..3b737f05da9 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0014.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0014", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.260", + "lastModified": "2023-05-16T22:15:10.260", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0015.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0015.json new file mode 100644 index 00000000000..1ccc55540b8 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0015.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0015", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.310", + "lastModified": "2023-05-16T22:15:10.310", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0016.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0016.json new file mode 100644 index 00000000000..47c61c56001 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0016.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0016", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.357", + "lastModified": "2023-05-16T22:15:10.357", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0017.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0017.json new file mode 100644 index 00000000000..b4f35d30a7f --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0017.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0017", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.403", + "lastModified": "2023-05-16T22:15:10.403", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0018.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0018.json new file mode 100644 index 00000000000..d69eea761c7 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0018.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0018", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.450", + "lastModified": "2023-05-16T22:15:10.450", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0019.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0019.json new file mode 100644 index 00000000000..81e70ddbf11 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0019.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0019", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.497", + "lastModified": "2023-05-16T22:15:10.497", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0020.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0020.json new file mode 100644 index 00000000000..7a2707ebe8c --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0020.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0020", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.547", + "lastModified": "2023-05-16T22:15:10.547", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0021.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0021.json new file mode 100644 index 00000000000..7f5331899c8 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0021.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0021", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.593", + "lastModified": "2023-05-16T22:15:10.593", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0022.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0022.json new file mode 100644 index 00000000000..83970e98870 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0022.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0022", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.643", + "lastModified": "2023-05-16T22:15:10.643", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0023.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0023.json new file mode 100644 index 00000000000..453c9a30ef3 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0023.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0023", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.693", + "lastModified": "2023-05-16T22:15:10.693", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0024.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0024.json new file mode 100644 index 00000000000..57dbb9d43fc --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0024.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0024", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.733", + "lastModified": "2023-05-16T22:15:10.733", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0025.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0025.json new file mode 100644 index 00000000000..8bf1333fddb --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0025.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0025", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.773", + "lastModified": "2023-05-16T22:15:10.773", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0026.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0026.json new file mode 100644 index 00000000000..4852ad34fc5 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0026.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0026", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.813", + "lastModified": "2023-05-16T22:15:10.813", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0027.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0027.json new file mode 100644 index 00000000000..e611da88a1f --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0027.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0027", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.860", + "lastModified": "2023-05-16T22:15:10.860", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0028.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0028.json new file mode 100644 index 00000000000..db9903118b3 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0028.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0028", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.910", + "lastModified": "2023-05-16T22:15:10.910", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0029.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0029.json new file mode 100644 index 00000000000..e277efd0462 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0029.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0029", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:10.963", + "lastModified": "2023-05-16T22:15:10.963", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0030.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0030.json new file mode 100644 index 00000000000..62fe1665ea1 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0030.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0030", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.010", + "lastModified": "2023-05-16T22:15:11.010", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0031.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0031.json new file mode 100644 index 00000000000..bc0234269fa --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0031.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0031", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.060", + "lastModified": "2023-05-16T22:15:11.060", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0032.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0032.json new file mode 100644 index 00000000000..bf55026829b --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0032.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0032", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.107", + "lastModified": "2023-05-16T22:15:11.107", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0033.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0033.json new file mode 100644 index 00000000000..ad8bee5b9fc --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0033.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0033", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.157", + "lastModified": "2023-05-16T22:15:11.157", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0034.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0034.json new file mode 100644 index 00000000000..1934ff1acea --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0034.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0034", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.207", + "lastModified": "2023-05-16T22:15:11.207", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0035.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0035.json new file mode 100644 index 00000000000..410185f6291 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0035.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0035", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.247", + "lastModified": "2023-05-16T22:15:11.247", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0036.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0036.json new file mode 100644 index 00000000000..f861cd051d3 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0036.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0036", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.290", + "lastModified": "2023-05-16T22:15:11.290", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0037.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0037.json new file mode 100644 index 00000000000..b44631ee376 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0037.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0037", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.337", + "lastModified": "2023-05-16T22:15:11.337", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0038.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0038.json new file mode 100644 index 00000000000..90410639c1e --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0038.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0038", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.387", + "lastModified": "2023-05-16T22:15:11.387", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0039.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0039.json new file mode 100644 index 00000000000..362b37926a6 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0039.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0039", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.423", + "lastModified": "2023-05-16T22:15:11.423", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0040.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0040.json new file mode 100644 index 00000000000..c96465a5e38 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0040.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0040", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.470", + "lastModified": "2023-05-16T22:15:11.470", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0041.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0041.json new file mode 100644 index 00000000000..4eba00204b7 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0041.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0041", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.513", + "lastModified": "2023-05-16T22:15:11.513", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0042.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0042.json new file mode 100644 index 00000000000..519c5961576 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0042.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0042", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.557", + "lastModified": "2023-05-16T22:15:11.557", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0043.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0043.json new file mode 100644 index 00000000000..dc2b751bf36 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0043.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0043", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.600", + "lastModified": "2023-05-16T22:15:11.600", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0044.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0044.json new file mode 100644 index 00000000000..dedf32d6485 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0044.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0044", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.647", + "lastModified": "2023-05-16T22:15:11.647", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0045.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0045.json new file mode 100644 index 00000000000..c2130ab7649 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0045.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0045", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.693", + "lastModified": "2023-05-16T22:15:11.693", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0046.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0046.json new file mode 100644 index 00000000000..fd0726924f4 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0046.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0046", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.737", + "lastModified": "2023-05-16T22:15:11.737", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0047.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0047.json new file mode 100644 index 00000000000..87917c1424f --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0047.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0047", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.780", + "lastModified": "2023-05-16T22:15:11.780", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0048.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0048.json new file mode 100644 index 00000000000..8e2a578149f --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0048.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0048", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.823", + "lastModified": "2023-05-16T22:15:11.823", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0049.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0049.json new file mode 100644 index 00000000000..f6f8227a3dd --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0049.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0049", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.867", + "lastModified": "2023-05-16T22:15:11.867", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0050.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0050.json new file mode 100644 index 00000000000..c2e1e6b5b45 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0050.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0050", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.917", + "lastModified": "2023-05-16T22:15:11.917", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0059.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0059.json new file mode 100644 index 00000000000..a80ba6251d4 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0059.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0059", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:11.963", + "lastModified": "2023-05-16T22:15:11.963", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0068.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0068.json new file mode 100644 index 00000000000..eedc15270cf --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0068.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0068", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.010", + "lastModified": "2023-05-16T22:15:12.010", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0080.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0080.json new file mode 100644 index 00000000000..96d50dbb770 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0080.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0080", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.060", + "lastModified": "2023-05-16T22:15:12.060", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0081.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0081.json new file mode 100644 index 00000000000..8cb3a5e5897 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0081.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0081", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.103", + "lastModified": "2023-05-16T22:15:12.103", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0085.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0085.json new file mode 100644 index 00000000000..1d3a292a6c1 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0085.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0085", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.147", + "lastModified": "2023-05-16T22:15:12.147", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0087.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0087.json new file mode 100644 index 00000000000..505e57f860e --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0087.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0087", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.197", + "lastModified": "2023-05-16T22:15:12.197", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-00xx/CVE-2021-0088.json b/CVE-2021/CVE-2021-00xx/CVE-2021-0088.json new file mode 100644 index 00000000000..7a442768286 --- /dev/null +++ b/CVE-2021/CVE-2021-00xx/CVE-2021-0088.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0088", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.243", + "lastModified": "2023-05-16T22:15:12.243", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0122.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0122.json new file mode 100644 index 00000000000..89189eedd47 --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0122.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0122", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.287", + "lastModified": "2023-05-16T22:15:12.287", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0123.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0123.json new file mode 100644 index 00000000000..149f2d00922 --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0123.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0123", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.327", + "lastModified": "2023-05-16T22:15:12.327", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0128.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0128.json new file mode 100644 index 00000000000..d03117ecb25 --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0128.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0128", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.370", + "lastModified": "2023-05-16T22:15:12.370", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0130.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0130.json new file mode 100644 index 00000000000..b48b9e396ea --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0130.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0130", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.410", + "lastModified": "2023-05-16T22:15:12.410", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0136.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0136.json new file mode 100644 index 00000000000..cbfd487c19e --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0136.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0136", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.457", + "lastModified": "2023-05-16T22:15:12.457", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0137.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0137.json new file mode 100644 index 00000000000..9f7c50c9ee9 --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0137.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0137", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.507", + "lastModified": "2023-05-16T22:15:12.507", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0138.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0138.json new file mode 100644 index 00000000000..87cf3cd4d3f --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0138.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0138", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.553", + "lastModified": "2023-05-16T22:15:12.553", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0139.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0139.json new file mode 100644 index 00000000000..e0079f7f5db --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0139.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0139", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.597", + "lastModified": "2023-05-16T22:15:12.597", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0140.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0140.json new file mode 100644 index 00000000000..dcb51a7a942 --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0140.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0140", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.637", + "lastModified": "2023-05-16T22:15:12.637", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0141.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0141.json new file mode 100644 index 00000000000..fb1bcc8ad8d --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0141.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0141", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.677", + "lastModified": "2023-05-16T22:15:12.677", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0142.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0142.json new file mode 100644 index 00000000000..57f5c8225e5 --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0142.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0142", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.720", + "lastModified": "2023-05-16T22:15:12.720", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0149.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0149.json new file mode 100644 index 00000000000..2c354e1ce47 --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0149.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0149", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.763", + "lastModified": "2023-05-16T22:15:12.763", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0150.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0150.json new file mode 100644 index 00000000000..056c343f7ae --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0150.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0150", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.810", + "lastModified": "2023-05-16T22:15:12.810", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0181.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0181.json new file mode 100644 index 00000000000..936fcf60959 --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0181.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0181", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.857", + "lastModified": "2023-05-16T22:15:12.857", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0184.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0184.json new file mode 100644 index 00000000000..5703b970b5f --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0184.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0184", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:12.903", + "lastModified": "2023-05-16T22:15:12.903", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0187.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0187.json index 4d85d6d5fd2..639159e5fdd 100644 --- a/CVE-2021/CVE-2021-01xx/CVE-2021-0187.json +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0187.json @@ -2,1510 +2,14 @@ "id": "CVE-2021-0187", "sourceIdentifier": "secure@intel.com", "published": "2023-02-16T20:15:12.210", - "lastModified": "2023-02-27T17:44:56.637", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-16T22:15:13.397", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 6.7, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 0.8, - "impactScore": 5.9 - }, - { - "source": "secure@intel.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 3.2, - "baseSeverity": "LOW" - }, - "exploitabilityScore": 1.5, - "impactScore": 1.4 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "NVD-CWE-noinfo" - } - ] - } - ], - "configurations": [ - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_5315y_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "56862563-A4A5-4444-886D-E17C99A87142" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "108518D9-D227-4F36-AE60-A56355D09622" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_5318n_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B12E1696-DE9D-40B5-97F1-E9157AED4A7F" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F2C5D3DE-5506-4F16-B7F9-5032A1277D23" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_5318s_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "315C9B38-2572-4B6A-A8AF-5D16553A3A30" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "ED598260-2A9B-46F7-AA85-0DA97DA0D42D" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_5318y_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8936DD6D-8039-4C46-BBC5-DD6A9F73A22E" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*", - "matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_5320_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "48A5F3C2-DE31-48CC-A5DF-C7A9F9CD089A" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_5320t_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "57BA492F-6F69-4598-AAF1-156BF98F34E2" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6312u_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6A1C9968-0AD3-4E96-A721-6EA6C0BF6209" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6314u_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EBA147EA-C92A-4255-948E-070616C09BC2" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FE3CA224-B5DE-4451-9CF9-929ABEA242EF" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6326_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EB165123-26C6-4D9F-90DA-96112B628702" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6330_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5ABB6218-E238-41F2-B349-8AF4B8DE6898" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*", - "matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6330n_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CCC28C3D-B261-4554-B944-4C2E56EBE8EB" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*", - "matchCriteriaId": "20821868-F7D2-4132-8D63-98E1089DB46C" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6334_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AEE9B3EC-2D8F-4167-9331-23EA64E2B631" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*", - "matchCriteriaId": "4EB9295A-8832-4670-B268-FBD0BC086447" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6336y_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2CAA2CF5-808C-4157-A730-4301ED88B659" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*", - "matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6338_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CAF70C32-227B-4263-8BE8-73F876B3A465" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C5694238-F4E5-4689-ADD2-67C25762ED92" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6338n_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7C3E8BF2-E5D5-490B-B3CE-EF47DD5E259A" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A57D44C0-AA8D-46B0-8923-ADB312E3937F" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6338t_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3ECF4055-8163-47A2-9767-D4CC0D34CCDB" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6342_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "03D1BED9-6173-4AC4-9453-9781EEC83E84" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8A4A44F2-68BF-4709-946B-C976DA3A9C7E" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6346_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6159A5FD-F734-4557-BA2A-214B2570C58E" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*", - "matchCriteriaId": "038AC553-5523-4687-843D-6FEA7264EDEA" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6348_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "53075C98-C062-4338-BD9B-4013ED9E139C" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8DE5D09C-3272-4810-9F41-97BDBBFE4160" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6354_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2F273BA3-F5B3-4970-8759-C5069845EAD5" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F14C3438-B876-45B9-85F5-61354207AF8A" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8351n_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E2ED7EDF-A382-4E0D-BF3B-638D0F8830CE" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D7C504C3-7EEE-4A0F-8589-19C1E806E690" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8352m_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E1E2981E-8DCA-4DB7-8E5B-B0D94B508303" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5230F6AF-88CB-4EE2-B292-8B9A7217D10F" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8352s_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "441CAAE3-9CC4-4C78-A4A3-CCCDDF2D9F24" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5B45C39D-03E8-46C1-88DD-94E382F4A961" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8352v_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "79B26858-BA9D-4DC4-B19F-A37D98E5D567" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EF2DC691-025A-441E-AAC2-C8583F54733D" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8352y_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A2FACD9F-6BB6-4D8C-9E35-0EDCD900C20B" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8358_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8710FEA6-3A6D-4F2E-8E41-57CC96231A5C" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8358p_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A6CF7B9C-80B6-4E9A-B581-A7E8D0B493FA" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*", - "matchCriteriaId": "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8360y_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "ACE0C287-92FB-4BF2-B30D-0525C4266536" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8362_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CB219989-055E-4D04-8738-7AF4E66E3A57" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*", - "matchCriteriaId": "91EB66B4-8F1B-4F35-9371-17FB761997CB" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8368_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A150305A-B59C-4C93-B0CB-93A6F408334F" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CBDFD1AF-2716-4C95-ADFF-79EFA915C286" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8368q_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A443FB47-021C-4B5F-84D2-C2612DDF5893" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*", - "matchCriteriaId": "5390A12B-80BD-4889-BF0F-95E65D10D037" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8380_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B5EAD7AA-B67C-4864-94D3-DBE56119A667" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*", - "matchCriteriaId": "33FA0279-D587-471E-8EC0-211F78DA4DFD" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_silver_4309y_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0EBE15F3-8B56-444A-9956-7FC9AF7D3345" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_silver_4310_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "678E18FE-BA19-4C86-ADF4-B776318F5D12" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_silver_4310t_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "156C3A26-74CB-4E99-AE8A-5B49424AB857" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_silver_4314_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A58CEC44-41C3-44FA-A512-CE0B59F4B294" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*", - "matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_silver_4316_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "446A632A-3B5E-490B-BF69-91190885380F" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*", - "matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6330h_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "73DEE8C8-6216-47C1-A5E9-007842AF111D" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8356h_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3816252E-5421-442E-B8F3-C3A6B78F3B6E" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8360h_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A5D03D31-328A-4AD5-88D4-037A4317F61D" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EB15368B-21A1-429E-8B9C-A095C4E8BA67" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8360hl_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "22EB43AC-A091-4FF6-AE2D-FCCBFF49B7BD" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BA925F96-6DDD-4F71-BF13-710C8A89D860" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_5318h_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "BD8048C0-45BB-4532-BD0C-98C8723C7862" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*", - "matchCriteriaId": "43808CCF-1EF0-41CE-983D-DD6BB775895E" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_5320h_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D25841AF-F1D2-4862-826F-A194B843B86E" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3BF1F73B-4736-40BC-9053-951B5BF1059E" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6328h_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "8BBC16B4-09E6-4122-9A7D-B2DD0C82C1BA" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*", - "matchCriteriaId": "710DBCD5-788D-4140-AC16-EC6E126CFA66" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6328hl_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2CAF6929-D8FE-4A6E-BB9F-E736680487B7" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A767EC83-AAED-4FEA-A35E-A503369FE4FB" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_gold_6348h_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0EBE74D3-855F-4726-B265-A7DF93121A94" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*", - "matchCriteriaId": "59C5122F-D822-4E71-A417-88EB51F1786B" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8353h_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9373835F-E7B5-442F-B11A-A46771B2D695" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*", - "matchCriteriaId": "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8354h_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "574533C8-52E2-445A-8C57-2357892468EF" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*", - "matchCriteriaId": "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8376h_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7428FE4A-4CA2-44AA-A412-81C6CC15FA04" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*", - "matchCriteriaId": "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8376hl_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D3506304-A3F5-482B-BFB9-2C4E0D5D8D94" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*", - "matchCriteriaId": "05637A96-AF09-4FF5-A918-AB369AA2D1CC" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8380h_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D0AA8576-BB5B-4128-92B3-50F839A5305B" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*", - "matchCriteriaId": "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:intel:xeon_platinum_8380hl_firmware:-:*:*:*:*:*:*:*", - "matchCriteriaId": "896731D5-B752-49F5-BD8E-924385C0E6F8" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E8FE9694-F0E7-4B45-82A1-065DA96B9794" - } - ] - } - ] - } - ], - "references": [ - { - "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html", - "source": "secure@intel.com", - "tags": [ - "Vendor Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0191.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0191.json new file mode 100644 index 00000000000..2b14b6148a3 --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0191.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0191", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:13.460", + "lastModified": "2023-05-16T22:15:13.460", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0192.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0192.json new file mode 100644 index 00000000000..37dfd05f59c --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0192.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0192", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:13.507", + "lastModified": "2023-05-16T22:15:13.507", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-01xx/CVE-2021-0195.json b/CVE-2021/CVE-2021-01xx/CVE-2021-0195.json new file mode 100644 index 00000000000..7cfedb3b88b --- /dev/null +++ b/CVE-2021/CVE-2021-01xx/CVE-2021-0195.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-0195", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:13.557", + "lastModified": "2023-05-16T22:15:13.557", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-206xx/CVE-2021-20600.json b/CVE-2021/CVE-2021-206xx/CVE-2021-20600.json index 0d465748d2b..b3e4901719d 100644 --- a/CVE-2021/CVE-2021-206xx/CVE-2021-20600.json +++ b/CVE-2021/CVE-2021-206xx/CVE-2021-20600.json @@ -2,8 +2,8 @@ "id": "CVE-2021-20600", "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "published": "2021-10-08T17:15:07.437", - "lastModified": "2022-07-07T16:15:08.927", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T22:50:39.020", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -43,18 +43,18 @@ "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", + "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "PARTIAL", - "baseScore": 4.3 + "availabilityImpact": "COMPLETE", + "baseScore": 7.1 }, - "baseSeverity": "MEDIUM", + "baseSeverity": "HIGH", "exploitabilityScore": 8.6, - "impactScore": 2.9, + "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, @@ -86,7 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:mitsubishielectric:r12ccpu-v_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "56BCED50-FEC2-4F26-81AC-0C3C9BD12C4B" + "versionEndIncluding": "16", + "matchCriteriaId": "B011D41D-5119-403C-A0A6-C872DA1ABB54" } ] }, diff --git a/CVE-2021/CVE-2021-231xx/CVE-2021-23145.json b/CVE-2021/CVE-2021-231xx/CVE-2021-23145.json new file mode 100644 index 00000000000..3e046379fc6 --- /dev/null +++ b/CVE-2021/CVE-2021-231xx/CVE-2021-23145.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-23145", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:13.603", + "lastModified": "2023-05-16T22:15:13.603", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-269xx/CVE-2021-26946.json b/CVE-2021/CVE-2021-269xx/CVE-2021-26946.json new file mode 100644 index 00000000000..5a9504ce6ca --- /dev/null +++ b/CVE-2021/CVE-2021-269xx/CVE-2021-26946.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-26946", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:13.647", + "lastModified": "2023-05-16T22:15:13.647", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33065.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33065.json new file mode 100644 index 00000000000..7fc1fff5ccd --- /dev/null +++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33065.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-33065", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:13.700", + "lastModified": "2023-05-16T22:15:13.700", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33066.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33066.json new file mode 100644 index 00000000000..7f9b04c013a --- /dev/null +++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33066.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-33066", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:13.750", + "lastModified": "2023-05-16T22:15:13.750", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33067.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33067.json new file mode 100644 index 00000000000..02158ea2c40 --- /dev/null +++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33067.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-33067", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:13.787", + "lastModified": "2023-05-16T22:15:13.787", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33070.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33070.json new file mode 100644 index 00000000000..bac05102c2b --- /dev/null +++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33070.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2021-33070", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:13.830", + "lastModified": "2023-05-16T22:15:13.830", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-36xx/CVE-2021-3609.json b/CVE-2021/CVE-2021-36xx/CVE-2021-3609.json index 7b58c6b584a..88fb2924b21 100644 --- a/CVE-2021/CVE-2021-36xx/CVE-2021-3609.json +++ b/CVE-2021/CVE-2021-36xx/CVE-2021-3609.json @@ -2,8 +2,8 @@ "id": "CVE-2021-3609", "sourceIdentifier": "secalert@redhat.com", "published": "2022-03-03T19:15:08.173", - "lastModified": "2023-02-12T23:41:20.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T22:39:09.540", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -95,40 +95,40 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.6.25", "versionEndExcluding": "5.13", - "matchCriteriaId": "8EFC2DBA-66FA-4DAA-9541-E3A33920B255" + "matchCriteriaId": "1DCA7CEB-754B-474C-BB29-B3C5A04996AF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", - "matchCriteriaId": "07CEAC13-3423-44F5-A2F8-6F5F846233C8" + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", - "matchCriteriaId": "F3CE353A-A5C0-4284-9D90-6B85475814B9" + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", - "matchCriteriaId": "4CDF8DC7-920B-45D8-BCED-B2FD21FE63FA" + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", - "matchCriteriaId": "3E8A9355-151F-476C-A0FD-747D46AAD110" + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", - "matchCriteriaId": "BCC24971-26E3-4C4C-8490-DCEAC102D29B" + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", - "matchCriteriaId": "B33BD284-D70B-4373-AE22-267AAE893A9B" + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" } ] } diff --git a/CVE-2022/CVE-2022-247xx/CVE-2022-24738.json b/CVE-2022/CVE-2022-247xx/CVE-2022-24738.json index dca0813e129..d5a25a1c57f 100644 --- a/CVE-2022/CVE-2022-247xx/CVE-2022-24738.json +++ b/CVE-2022/CVE-2022-247xx/CVE-2022-24738.json @@ -2,8 +2,8 @@ "id": "CVE-2022-24738", "sourceIdentifier": "security-advisories@github.com", "published": "2022-03-07T22:15:08.227", - "lastModified": "2022-03-17T15:55:20.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T22:53:49.397", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -114,9 +114,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tharsis:evmos:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.0.1", - "matchCriteriaId": "23DAB54E-9EC9-4A4B-84E2-6A7D52CDEBB5" + "matchCriteriaId": "5134674C-EAA2-423C-AB60-7CE330AC7BBB" } ] } diff --git a/CVE-2022/CVE-2022-278xx/CVE-2022-27856.json b/CVE-2022/CVE-2022-278xx/CVE-2022-27856.json index a0bc798cbb2..6d07396d9ab 100644 --- a/CVE-2022/CVE-2022-278xx/CVE-2022-27856.json +++ b/CVE-2022/CVE-2022-278xx/CVE-2022-27856.json @@ -2,8 +2,8 @@ "id": "CVE-2022-27856", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T11:15:09.587", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-16T21:56:30.183", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlasgondal:export_all_urls:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.1", + "matchCriteriaId": "F432B27C-5C08-47F6-B226-FB41A39ED10F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/export-all-urls/wordpress-export-all-urls-plugin-4-1-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-352xx/CVE-2022-35266.json b/CVE-2022/CVE-2022-352xx/CVE-2022-35266.json index f58627c1cdb..1b7be54cfb4 100644 --- a/CVE-2022/CVE-2022-352xx/CVE-2022-35266.json +++ b/CVE-2022/CVE-2022-352xx/CVE-2022-35266.json @@ -2,8 +2,8 @@ "id": "CVE-2022-35266", "sourceIdentifier": "talos-cna@cisco.com", "published": "2022-10-25T17:15:54.120", - "lastModified": "2022-12-23T00:15:13.423", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T22:36:44.887", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-450xx/CVE-2022-45061.json b/CVE-2022/CVE-2022-450xx/CVE-2022-45061.json index 7e88f59b5e8..16756344bce 100644 --- a/CVE-2022/CVE-2022-450xx/CVE-2022-45061.json +++ b/CVE-2022/CVE-2022-450xx/CVE-2022-45061.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45061", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-09T07:15:09.887", - "lastModified": "2023-05-03T11:15:11.877", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T23:04:21.670", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -48,6 +48,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -160,11 +161,17 @@ ] }, { + "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", + "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", @@ -178,6 +185,79 @@ ] } ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", + "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24B8DB06-590A-4008-B0AB-FCD1401C77C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85DF4B3F-4BBC-42B7-B729-096934523D63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A6E548F-62E9-40CB-85DA-FDAA0F0096C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B" + } + ] + } + ] } ], "references": [ @@ -192,11 +272,19 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/", @@ -208,39 +296,75 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/", @@ -252,63 +376,121 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202305-02", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20221209-0007/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47137.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47137.json index 9bca51b31e6..0578e765aff 100644 --- a/CVE-2022/CVE-2022-471xx/CVE-2022-47137.json +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47137.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47137", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T11:15:09.967", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-16T21:58:18.313", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,7 +56,7 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,12 +64,43 @@ "value": "CWE-79" } ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmanageninja:ninja_tables:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.3.4", + "matchCriteriaId": "9A71DD56-FD3F-40AF-9808-8CC2315C5BDB" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-best-data-table-plugin-for-wordpress-plugin-4-3-4-cross-site-scripting-xss?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47423.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47423.json index a233be62bf8..579d0ae167e 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47423.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47423.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47423", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T11:15:10.157", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-16T22:08:09.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-dtree_project:wp-dtree:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.4.5", + "matchCriteriaId": "8895F418-5443-41AB-A5CA-EBD1C0932B0A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-scripting-xss?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47436.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47436.json index 4c7caba4d4e..62aaf3f1985 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47436.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47436.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47436", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T11:15:10.307", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-16T22:09:53.720", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mantrabrain:yatra:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1.14", + "matchCriteriaId": "60CBD372-29D9-43DD-BA5D-1CD821531052" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/yatra/wordpress-best-travel-booking-wordpress-plugin-tour-booking-system-trip-booking-wordpress-plugin-yatra-plugin-2-1-13-cross-site-scripting-xss?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27510.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27510.json index 802faf14fe5..8c437147ca9 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27510.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27510.json @@ -2,23 +2,106 @@ "id": "CVE-2023-27510", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:13.807", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-16T22:29:07.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "JB Inquiry form contains an exposure of private personal information to an unauthorized actor vulnerability, which may allow a remote unauthenticated attacker to obtain information entered from forms created using the affected product. The affected products and versions are as follows: JB Inquiry form versions 0.6.1 and 0.6.0, JB Inquiry form versions 0.5.2, 0.5.1 and 0.5.0, and JB Inquiry form version 0.40." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "551D6264-5C5B-4CB5-A79E-77614A4619FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3845790E-96A1-41D8-8C63-34C38862075F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6262C814-C397-4DAE-920F-CAFA9162F2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4A7B3B7F-341D-42F2-846B-FA5A36924974" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4D04C8BD-88F3-4070-AC82-61CB32CAC814" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.40:*:*:*:*:*:*:*", + "matchCriteriaId": "8F3C55CD-138D-4B56-A59A-A90F30674ADC" + } + ] + } + ] + } + ], "references": [ { "url": "https://jubei.co.jp/formmail/info20230414.html", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jvn.jp/en/jp/JVN36340790/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31677.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31677.json new file mode 100644 index 00000000000..1d5f6f58d2e --- /dev/null +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31677.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31677", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:13.913", + "lastModified": "2023-05-16T22:15:13.913", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insecure permissions in luowice 3.5.18 allow attackers to view information for other alarm devices via modification of the eseeid parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/zzh-newlearner/record/blob/main/luowice.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31678.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31678.json new file mode 100644 index 00000000000..2cfa5d950a1 --- /dev/null +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31678.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31678", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:13.957", + "lastModified": "2023-05-16T22:15:13.957", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect access control in Videogo v6.8.1 allows attackers to bind shared devices after the connection has been ended." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/zzh-newlearner/record/blob/main/yingshi_devicekey.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31679.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31679.json new file mode 100644 index 00000000000..c2c1a7e97f1 --- /dev/null +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31679.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31679", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-16T22:15:14.003", + "lastModified": "2023-05-16T22:15:14.003", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect access control in Videogo v6.8.1 allows attackers to access images from other devices via modification of the Device Id parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/zzh-newlearner/record/blob/main/yingshi_privacy.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31906.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31906.json index 64f6251928c..a13c1fdc36e 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31906.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31906.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31906", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T15:15:10.187", - "lastModified": "2023-05-10T15:26:03.940", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-16T23:11:15.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jerryscript-project/jerryscript/issues/5066", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31907.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31907.json index 526c20d61a9..5b0886cad19 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31907.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31907.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31907", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T15:15:10.353", - "lastModified": "2023-05-10T15:26:03.940", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-16T23:12:04.163", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via the component scanner_literal_is_created at /jerry-core/parser/js/js-scanner-util.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jerryscript-project/jerryscript/issues/5073", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 684a3810e5b..b9af632338b 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-16T21:55:25.390018+00:00 +2023-05-17T00:00:24.004568+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-16T21:51:49.343000+00:00 +2023-05-16T23:12:04.163000+00:00 ``` ### Last Data Feed Release @@ -29,143 +29,112 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -215422 +215495 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `73` -* [CVE-2021-27131](CVE-2021/CVE-2021-271xx/CVE-2021-27131.json) (`2023-05-16T20:15:08.987`) -* [CVE-2023-27742](CVE-2023/CVE-2023-277xx/CVE-2023-27742.json) (`2023-05-16T20:15:09.093`) -* [CVE-2023-29927](CVE-2023/CVE-2023-299xx/CVE-2023-29927.json) (`2023-05-16T20:15:09.213`) -* [CVE-2023-30189](CVE-2023/CVE-2023-301xx/CVE-2023-30189.json) (`2023-05-16T20:15:09.273`) -* [CVE-2023-30281](CVE-2023/CVE-2023-302xx/CVE-2023-30281.json) (`2023-05-16T20:15:09.323`) -* [CVE-2023-31544](CVE-2023/CVE-2023-315xx/CVE-2023-31544.json) (`2023-05-16T21:15:09.027`) +* [CVE-2021-0010](CVE-2021/CVE-2021-00xx/CVE-2021-0010.json) (`2023-05-16T22:15:10.137`) +* [CVE-2021-0011](CVE-2021/CVE-2021-00xx/CVE-2021-0011.json) (`2023-05-16T22:15:10.210`) +* [CVE-2021-0014](CVE-2021/CVE-2021-00xx/CVE-2021-0014.json) (`2023-05-16T22:15:10.260`) +* [CVE-2021-0015](CVE-2021/CVE-2021-00xx/CVE-2021-0015.json) (`2023-05-16T22:15:10.310`) +* [CVE-2021-0016](CVE-2021/CVE-2021-00xx/CVE-2021-0016.json) (`2023-05-16T22:15:10.357`) +* [CVE-2021-0017](CVE-2021/CVE-2021-00xx/CVE-2021-0017.json) (`2023-05-16T22:15:10.403`) +* [CVE-2021-0018](CVE-2021/CVE-2021-00xx/CVE-2021-0018.json) (`2023-05-16T22:15:10.450`) +* [CVE-2021-0019](CVE-2021/CVE-2021-00xx/CVE-2021-0019.json) (`2023-05-16T22:15:10.497`) +* [CVE-2021-0020](CVE-2021/CVE-2021-00xx/CVE-2021-0020.json) (`2023-05-16T22:15:10.547`) +* [CVE-2021-0021](CVE-2021/CVE-2021-00xx/CVE-2021-0021.json) (`2023-05-16T22:15:10.593`) +* [CVE-2021-0022](CVE-2021/CVE-2021-00xx/CVE-2021-0022.json) (`2023-05-16T22:15:10.643`) +* [CVE-2021-0023](CVE-2021/CVE-2021-00xx/CVE-2021-0023.json) (`2023-05-16T22:15:10.693`) +* [CVE-2021-0024](CVE-2021/CVE-2021-00xx/CVE-2021-0024.json) (`2023-05-16T22:15:10.733`) +* [CVE-2021-0025](CVE-2021/CVE-2021-00xx/CVE-2021-0025.json) (`2023-05-16T22:15:10.773`) +* [CVE-2021-0026](CVE-2021/CVE-2021-00xx/CVE-2021-0026.json) (`2023-05-16T22:15:10.813`) +* [CVE-2021-0027](CVE-2021/CVE-2021-00xx/CVE-2021-0027.json) (`2023-05-16T22:15:10.860`) +* [CVE-2021-0028](CVE-2021/CVE-2021-00xx/CVE-2021-0028.json) (`2023-05-16T22:15:10.910`) +* [CVE-2021-0029](CVE-2021/CVE-2021-00xx/CVE-2021-0029.json) (`2023-05-16T22:15:10.963`) +* [CVE-2021-0030](CVE-2021/CVE-2021-00xx/CVE-2021-0030.json) (`2023-05-16T22:15:11.010`) +* [CVE-2021-0031](CVE-2021/CVE-2021-00xx/CVE-2021-0031.json) (`2023-05-16T22:15:11.060`) +* [CVE-2021-0032](CVE-2021/CVE-2021-00xx/CVE-2021-0032.json) (`2023-05-16T22:15:11.107`) +* [CVE-2021-0033](CVE-2021/CVE-2021-00xx/CVE-2021-0033.json) (`2023-05-16T22:15:11.157`) +* [CVE-2021-0034](CVE-2021/CVE-2021-00xx/CVE-2021-0034.json) (`2023-05-16T22:15:11.207`) +* [CVE-2021-0035](CVE-2021/CVE-2021-00xx/CVE-2021-0035.json) (`2023-05-16T22:15:11.247`) +* [CVE-2021-0036](CVE-2021/CVE-2021-00xx/CVE-2021-0036.json) (`2023-05-16T22:15:11.290`) +* [CVE-2021-0037](CVE-2021/CVE-2021-00xx/CVE-2021-0037.json) (`2023-05-16T22:15:11.337`) +* [CVE-2021-0038](CVE-2021/CVE-2021-00xx/CVE-2021-0038.json) (`2023-05-16T22:15:11.387`) +* [CVE-2021-0039](CVE-2021/CVE-2021-00xx/CVE-2021-0039.json) (`2023-05-16T22:15:11.423`) +* [CVE-2021-0040](CVE-2021/CVE-2021-00xx/CVE-2021-0040.json) (`2023-05-16T22:15:11.470`) +* [CVE-2021-0041](CVE-2021/CVE-2021-00xx/CVE-2021-0041.json) (`2023-05-16T22:15:11.513`) +* [CVE-2021-0042](CVE-2021/CVE-2021-00xx/CVE-2021-0042.json) (`2023-05-16T22:15:11.557`) +* [CVE-2021-0043](CVE-2021/CVE-2021-00xx/CVE-2021-0043.json) (`2023-05-16T22:15:11.600`) +* [CVE-2021-0044](CVE-2021/CVE-2021-00xx/CVE-2021-0044.json) (`2023-05-16T22:15:11.647`) +* [CVE-2021-0045](CVE-2021/CVE-2021-00xx/CVE-2021-0045.json) (`2023-05-16T22:15:11.693`) +* [CVE-2021-0046](CVE-2021/CVE-2021-00xx/CVE-2021-0046.json) (`2023-05-16T22:15:11.737`) +* [CVE-2021-0047](CVE-2021/CVE-2021-00xx/CVE-2021-0047.json) (`2023-05-16T22:15:11.780`) +* [CVE-2021-0048](CVE-2021/CVE-2021-00xx/CVE-2021-0048.json) (`2023-05-16T22:15:11.823`) +* [CVE-2021-0049](CVE-2021/CVE-2021-00xx/CVE-2021-0049.json) (`2023-05-16T22:15:11.867`) +* [CVE-2021-0050](CVE-2021/CVE-2021-00xx/CVE-2021-0050.json) (`2023-05-16T22:15:11.917`) +* [CVE-2021-0059](CVE-2021/CVE-2021-00xx/CVE-2021-0059.json) (`2023-05-16T22:15:11.963`) +* [CVE-2021-0068](CVE-2021/CVE-2021-00xx/CVE-2021-0068.json) (`2023-05-16T22:15:12.010`) +* [CVE-2021-0080](CVE-2021/CVE-2021-00xx/CVE-2021-0080.json) (`2023-05-16T22:15:12.060`) +* [CVE-2021-0081](CVE-2021/CVE-2021-00xx/CVE-2021-0081.json) (`2023-05-16T22:15:12.103`) +* [CVE-2021-0085](CVE-2021/CVE-2021-00xx/CVE-2021-0085.json) (`2023-05-16T22:15:12.147`) +* [CVE-2021-0087](CVE-2021/CVE-2021-00xx/CVE-2021-0087.json) (`2023-05-16T22:15:12.197`) +* [CVE-2021-0088](CVE-2021/CVE-2021-00xx/CVE-2021-0088.json) (`2023-05-16T22:15:12.243`) +* [CVE-2021-0122](CVE-2021/CVE-2021-01xx/CVE-2021-0122.json) (`2023-05-16T22:15:12.287`) +* [CVE-2021-0123](CVE-2021/CVE-2021-01xx/CVE-2021-0123.json) (`2023-05-16T22:15:12.327`) +* [CVE-2021-0128](CVE-2021/CVE-2021-01xx/CVE-2021-0128.json) (`2023-05-16T22:15:12.370`) +* [CVE-2021-0130](CVE-2021/CVE-2021-01xx/CVE-2021-0130.json) (`2023-05-16T22:15:12.410`) +* [CVE-2021-0136](CVE-2021/CVE-2021-01xx/CVE-2021-0136.json) (`2023-05-16T22:15:12.457`) +* [CVE-2021-0137](CVE-2021/CVE-2021-01xx/CVE-2021-0137.json) (`2023-05-16T22:15:12.507`) +* [CVE-2021-0138](CVE-2021/CVE-2021-01xx/CVE-2021-0138.json) (`2023-05-16T22:15:12.553`) +* [CVE-2021-0139](CVE-2021/CVE-2021-01xx/CVE-2021-0139.json) (`2023-05-16T22:15:12.597`) +* [CVE-2021-0140](CVE-2021/CVE-2021-01xx/CVE-2021-0140.json) (`2023-05-16T22:15:12.637`) +* [CVE-2021-0141](CVE-2021/CVE-2021-01xx/CVE-2021-0141.json) (`2023-05-16T22:15:12.677`) +* [CVE-2021-0142](CVE-2021/CVE-2021-01xx/CVE-2021-0142.json) (`2023-05-16T22:15:12.720`) +* [CVE-2021-0149](CVE-2021/CVE-2021-01xx/CVE-2021-0149.json) (`2023-05-16T22:15:12.763`) +* [CVE-2021-0150](CVE-2021/CVE-2021-01xx/CVE-2021-0150.json) (`2023-05-16T22:15:12.810`) +* [CVE-2021-0181](CVE-2021/CVE-2021-01xx/CVE-2021-0181.json) (`2023-05-16T22:15:12.857`) +* [CVE-2021-0184](CVE-2021/CVE-2021-01xx/CVE-2021-0184.json) (`2023-05-16T22:15:12.903`) +* [CVE-2021-0191](CVE-2021/CVE-2021-01xx/CVE-2021-0191.json) (`2023-05-16T22:15:13.460`) +* [CVE-2021-0192](CVE-2021/CVE-2021-01xx/CVE-2021-0192.json) (`2023-05-16T22:15:13.507`) +* [CVE-2021-0195](CVE-2021/CVE-2021-01xx/CVE-2021-0195.json) (`2023-05-16T22:15:13.557`) +* [CVE-2021-23145](CVE-2021/CVE-2021-231xx/CVE-2021-23145.json) (`2023-05-16T22:15:13.603`) +* [CVE-2021-26946](CVE-2021/CVE-2021-269xx/CVE-2021-26946.json) (`2023-05-16T22:15:13.647`) +* [CVE-2021-33065](CVE-2021/CVE-2021-330xx/CVE-2021-33065.json) (`2023-05-16T22:15:13.700`) +* [CVE-2021-33066](CVE-2021/CVE-2021-330xx/CVE-2021-33066.json) (`2023-05-16T22:15:13.750`) +* [CVE-2021-33067](CVE-2021/CVE-2021-330xx/CVE-2021-33067.json) (`2023-05-16T22:15:13.787`) +* [CVE-2021-33070](CVE-2021/CVE-2021-330xx/CVE-2021-33070.json) (`2023-05-16T22:15:13.830`) +* [CVE-2023-31677](CVE-2023/CVE-2023-316xx/CVE-2023-31677.json) (`2023-05-16T22:15:13.913`) +* [CVE-2023-31678](CVE-2023/CVE-2023-316xx/CVE-2023-31678.json) (`2023-05-16T22:15:13.957`) +* [CVE-2023-31679](CVE-2023/CVE-2023-316xx/CVE-2023-31679.json) (`2023-05-16T22:15:14.003`) ### CVEs modified in the last Commit -Recently modified CVEs: `118` +Recently modified CVEs: `20` -* [CVE-2017-14025](CVE-2017/CVE-2017-140xx/CVE-2017-14025.json) (`2023-05-16T20:58:31.210`) -* [CVE-2017-15583](CVE-2017/CVE-2017-155xx/CVE-2017-15583.json) (`2023-05-16T20:58:31.210`) -* [CVE-2017-16731](CVE-2017/CVE-2017-167xx/CVE-2017-16731.json) (`2023-05-16T20:10:13.340`) -* [CVE-2018-1168](CVE-2018/CVE-2018-11xx/CVE-2018-1168.json) (`2023-05-16T21:04:23.433`) -* [CVE-2018-14805](CVE-2018/CVE-2018-148xx/CVE-2018-14805.json) (`2023-05-16T20:21:29.777`) -* [CVE-2018-20720](CVE-2018/CVE-2018-207xx/CVE-2018-20720.json) (`2023-05-16T21:02:25.137`) -* [CVE-2019-0097](CVE-2019/CVE-2019-00xx/CVE-2019-0097.json) (`2023-05-16T21:43:11.747`) -* [CVE-2019-18247](CVE-2019/CVE-2019-182xx/CVE-2019-18247.json) (`2023-05-16T21:02:25.137`) -* [CVE-2019-18253](CVE-2019/CVE-2019-182xx/CVE-2019-18253.json) (`2023-05-16T21:02:25.137`) -* [CVE-2019-18998](CVE-2019/CVE-2019-189xx/CVE-2019-18998.json) (`2023-05-16T20:06:09.550`) -* [CVE-2019-19000](CVE-2019/CVE-2019-190xx/CVE-2019-19000.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19001](CVE-2019/CVE-2019-190xx/CVE-2019-19001.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19002](CVE-2019/CVE-2019-190xx/CVE-2019-19002.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19003](CVE-2019/CVE-2019-190xx/CVE-2019-19003.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19089](CVE-2019/CVE-2019-190xx/CVE-2019-19089.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19090](CVE-2019/CVE-2019-190xx/CVE-2019-19090.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19091](CVE-2019/CVE-2019-190xx/CVE-2019-19091.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19092](CVE-2019/CVE-2019-190xx/CVE-2019-19092.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19093](CVE-2019/CVE-2019-190xx/CVE-2019-19093.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19094](CVE-2019/CVE-2019-190xx/CVE-2019-19094.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19095](CVE-2019/CVE-2019-190xx/CVE-2019-19095.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19096](CVE-2019/CVE-2019-190xx/CVE-2019-19096.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-19097](CVE-2019/CVE-2019-190xx/CVE-2019-19097.json) (`2023-05-16T20:21:29.777`) -* [CVE-2019-5620](CVE-2019/CVE-2019-56xx/CVE-2019-5620.json) (`2023-05-16T20:44:12.157`) -* [CVE-2021-22278](CVE-2021/CVE-2021-222xx/CVE-2021-22278.json) (`2023-05-16T20:56:48.347`) -* [CVE-2021-26845](CVE-2021/CVE-2021-268xx/CVE-2021-26845.json) (`2023-05-16T20:21:29.777`) -* [CVE-2021-27196](CVE-2021/CVE-2021-271xx/CVE-2021-27196.json) (`2023-05-16T21:04:23.433`) -* [CVE-2021-27414](CVE-2021/CVE-2021-274xx/CVE-2021-27414.json) (`2023-05-16T20:16:56.977`) -* [CVE-2021-27416](CVE-2021/CVE-2021-274xx/CVE-2021-27416.json) (`2023-05-16T20:16:56.977`) -* [CVE-2021-31239](CVE-2021/CVE-2021-312xx/CVE-2021-31239.json) (`2023-05-16T21:03:51.827`) -* [CVE-2021-35526](CVE-2021/CVE-2021-355xx/CVE-2021-35526.json) (`2023-05-16T20:56:48.347`) -* [CVE-2021-35527](CVE-2021/CVE-2021-355xx/CVE-2021-35527.json) (`2023-05-16T20:21:29.777`) -* [CVE-2021-35529](CVE-2021/CVE-2021-355xx/CVE-2021-35529.json) (`2023-05-16T20:09:00.503`) -* [CVE-2021-35533](CVE-2021/CVE-2021-355xx/CVE-2021-35533.json) (`2023-05-16T21:04:23.433`) -* [CVE-2022-28613](CVE-2022/CVE-2022-286xx/CVE-2022-28613.json) (`2023-05-16T21:04:23.433`) -* [CVE-2023-0536](CVE-2023/CVE-2023-05xx/CVE-2023-0536.json) (`2023-05-16T20:05:41.627`) -* [CVE-2023-1031](CVE-2023/CVE-2023-10xx/CVE-2023-1031.json) (`2023-05-16T20:00:29.527`) -* [CVE-2023-2195](CVE-2023/CVE-2023-21xx/CVE-2023-2195.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2196](CVE-2023/CVE-2023-21xx/CVE-2023-2196.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-22361](CVE-2023/CVE-2023-223xx/CVE-2023-22361.json) (`2023-05-16T21:13:19.133`) -* [CVE-2023-22696](CVE-2023/CVE-2023-226xx/CVE-2023-22696.json) (`2023-05-16T21:25:22.240`) -* [CVE-2023-23794](CVE-2023/CVE-2023-237xx/CVE-2023-23794.json) (`2023-05-16T21:32:54.857`) -* [CVE-2023-23873](CVE-2023/CVE-2023-238xx/CVE-2023-23873.json) (`2023-05-16T21:35:51.213`) -* [CVE-2023-24406](CVE-2023/CVE-2023-244xx/CVE-2023-24406.json) (`2023-05-16T21:37:27.610`) -* [CVE-2023-25824](CVE-2023/CVE-2023-258xx/CVE-2023-25824.json) (`2023-05-16T20:54:11.347`) -* [CVE-2023-2631](CVE-2023/CVE-2023-26xx/CVE-2023-2631.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2632](CVE-2023/CVE-2023-26xx/CVE-2023-2632.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2633](CVE-2023/CVE-2023-26xx/CVE-2023-2633.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2721](CVE-2023/CVE-2023-27xx/CVE-2023-2721.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2722](CVE-2023/CVE-2023-27xx/CVE-2023-2722.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2723](CVE-2023/CVE-2023-27xx/CVE-2023-2723.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2724](CVE-2023/CVE-2023-27xx/CVE-2023-2724.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2725](CVE-2023/CVE-2023-27xx/CVE-2023-2725.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2726](CVE-2023/CVE-2023-27xx/CVE-2023-2726.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2738](CVE-2023/CVE-2023-27xx/CVE-2023-2738.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2739](CVE-2023/CVE-2023-27xx/CVE-2023-2739.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-2740](CVE-2023/CVE-2023-27xx/CVE-2023-2740.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-27419](CVE-2023/CVE-2023-274xx/CVE-2023-27419.json) (`2023-05-16T21:39:13.027`) -* [CVE-2023-27455](CVE-2023/CVE-2023-274xx/CVE-2023-27455.json) (`2023-05-16T21:43:52.443`) -* [CVE-2023-27527](CVE-2023/CVE-2023-275xx/CVE-2023-27527.json) (`2023-05-16T20:33:27.193`) -* [CVE-2023-27888](CVE-2023/CVE-2023-278xx/CVE-2023-27888.json) (`2023-05-16T20:20:33.970`) -* [CVE-2023-28076](CVE-2023/CVE-2023-280xx/CVE-2023-28076.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-28128](CVE-2023/CVE-2023-281xx/CVE-2023-28128.json) (`2023-05-16T20:15:09.140`) -* [CVE-2023-28318](CVE-2023/CVE-2023-283xx/CVE-2023-28318.json) (`2023-05-16T20:03:20.540`) -* [CVE-2023-28932](CVE-2023/CVE-2023-289xx/CVE-2023-28932.json) (`2023-05-16T21:23:45.097`) -* [CVE-2023-29101](CVE-2023/CVE-2023-291xx/CVE-2023-29101.json) (`2023-05-16T21:51:49.343`) -* [CVE-2023-29439](CVE-2023/CVE-2023-294xx/CVE-2023-29439.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-30501](CVE-2023/CVE-2023-305xx/CVE-2023-30501.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-30502](CVE-2023/CVE-2023-305xx/CVE-2023-30502.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-30503](CVE-2023/CVE-2023-305xx/CVE-2023-30503.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-30504](CVE-2023/CVE-2023-305xx/CVE-2023-30504.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-30505](CVE-2023/CVE-2023-305xx/CVE-2023-30505.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-30506](CVE-2023/CVE-2023-305xx/CVE-2023-30506.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-30507](CVE-2023/CVE-2023-305xx/CVE-2023-30507.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-30508](CVE-2023/CVE-2023-305xx/CVE-2023-30508.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-30509](CVE-2023/CVE-2023-305xx/CVE-2023-30509.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-30510](CVE-2023/CVE-2023-305xx/CVE-2023-30510.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-31519](CVE-2023/CVE-2023-315xx/CVE-2023-31519.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-31572](CVE-2023/CVE-2023-315xx/CVE-2023-31572.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-31576](CVE-2023/CVE-2023-315xx/CVE-2023-31576.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-31587](CVE-2023/CVE-2023-315xx/CVE-2023-31587.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-31856](CVE-2023/CVE-2023-318xx/CVE-2023-31856.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-31857](CVE-2023/CVE-2023-318xx/CVE-2023-31857.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-31890](CVE-2023/CVE-2023-318xx/CVE-2023-31890.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32568](CVE-2023/CVE-2023-325xx/CVE-2023-32568.json) (`2023-05-16T20:09:16.343`) -* [CVE-2023-32569](CVE-2023/CVE-2023-325xx/CVE-2023-32569.json) (`2023-05-16T20:13:37.477`) -* [CVE-2023-32570](CVE-2023/CVE-2023-325xx/CVE-2023-32570.json) (`2023-05-16T20:48:09.520`) -* [CVE-2023-32977](CVE-2023/CVE-2023-329xx/CVE-2023-32977.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32978](CVE-2023/CVE-2023-329xx/CVE-2023-32978.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32979](CVE-2023/CVE-2023-329xx/CVE-2023-32979.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32980](CVE-2023/CVE-2023-329xx/CVE-2023-32980.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32981](CVE-2023/CVE-2023-329xx/CVE-2023-32981.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32982](CVE-2023/CVE-2023-329xx/CVE-2023-32982.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32983](CVE-2023/CVE-2023-329xx/CVE-2023-32983.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32984](CVE-2023/CVE-2023-329xx/CVE-2023-32984.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32985](CVE-2023/CVE-2023-329xx/CVE-2023-32985.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32986](CVE-2023/CVE-2023-329xx/CVE-2023-32986.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32987](CVE-2023/CVE-2023-329xx/CVE-2023-32987.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32988](CVE-2023/CVE-2023-329xx/CVE-2023-32988.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32989](CVE-2023/CVE-2023-329xx/CVE-2023-32989.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32990](CVE-2023/CVE-2023-329xx/CVE-2023-32990.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32991](CVE-2023/CVE-2023-329xx/CVE-2023-32991.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32992](CVE-2023/CVE-2023-329xx/CVE-2023-32992.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32993](CVE-2023/CVE-2023-329xx/CVE-2023-32993.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32994](CVE-2023/CVE-2023-329xx/CVE-2023-32994.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32995](CVE-2023/CVE-2023-329xx/CVE-2023-32995.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32996](CVE-2023/CVE-2023-329xx/CVE-2023-32996.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32997](CVE-2023/CVE-2023-329xx/CVE-2023-32997.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32998](CVE-2023/CVE-2023-329xx/CVE-2023-32998.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-32999](CVE-2023/CVE-2023-329xx/CVE-2023-32999.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-33000](CVE-2023/CVE-2023-330xx/CVE-2023-33000.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-33001](CVE-2023/CVE-2023-330xx/CVE-2023-33001.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-33002](CVE-2023/CVE-2023-330xx/CVE-2023-33002.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-33003](CVE-2023/CVE-2023-330xx/CVE-2023-33003.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-33004](CVE-2023/CVE-2023-330xx/CVE-2023-33004.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-33005](CVE-2023/CVE-2023-330xx/CVE-2023-33005.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-33006](CVE-2023/CVE-2023-330xx/CVE-2023-33006.json) (`2023-05-16T20:04:03.627`) -* [CVE-2023-33007](CVE-2023/CVE-2023-330xx/CVE-2023-33007.json) (`2023-05-16T20:04:03.627`) +* [CVE-2020-14575](CVE-2020/CVE-2020-145xx/CVE-2020-14575.json) (`2023-05-16T22:55:30.580`) +* [CVE-2020-14678](CVE-2020/CVE-2020-146xx/CVE-2020-14678.json) (`2023-05-16T22:59:36.700`) +* [CVE-2020-14680](CVE-2020/CVE-2020-146xx/CVE-2020-14680.json) (`2023-05-16T22:58:48.653`) +* [CVE-2020-14697](CVE-2020/CVE-2020-146xx/CVE-2020-14697.json) (`2023-05-16T22:55:00.257`) +* [CVE-2020-14702](CVE-2020/CVE-2020-147xx/CVE-2020-14702.json) (`2023-05-16T22:56:00.377`) +* [CVE-2020-15888](CVE-2020/CVE-2020-158xx/CVE-2020-15888.json) (`2023-05-16T22:31:05.550`) +* [CVE-2020-16168](CVE-2020/CVE-2020-161xx/CVE-2020-16168.json) (`2023-05-16T22:42:15.457`) +* [CVE-2021-0187](CVE-2021/CVE-2021-01xx/CVE-2021-0187.json) (`2023-05-16T22:15:13.397`) +* [CVE-2021-20600](CVE-2021/CVE-2021-206xx/CVE-2021-20600.json) (`2023-05-16T22:50:39.020`) +* [CVE-2021-3609](CVE-2021/CVE-2021-36xx/CVE-2021-3609.json) (`2023-05-16T22:39:09.540`) +* [CVE-2022-24738](CVE-2022/CVE-2022-247xx/CVE-2022-24738.json) (`2023-05-16T22:53:49.397`) +* [CVE-2022-27856](CVE-2022/CVE-2022-278xx/CVE-2022-27856.json) (`2023-05-16T21:56:30.183`) +* [CVE-2022-35266](CVE-2022/CVE-2022-352xx/CVE-2022-35266.json) (`2023-05-16T22:36:44.887`) +* [CVE-2022-45061](CVE-2022/CVE-2022-450xx/CVE-2022-45061.json) (`2023-05-16T23:04:21.670`) +* [CVE-2022-47137](CVE-2022/CVE-2022-471xx/CVE-2022-47137.json) (`2023-05-16T21:58:18.313`) +* [CVE-2022-47423](CVE-2022/CVE-2022-474xx/CVE-2022-47423.json) (`2023-05-16T22:08:09.307`) +* [CVE-2022-47436](CVE-2022/CVE-2022-474xx/CVE-2022-47436.json) (`2023-05-16T22:09:53.720`) +* [CVE-2023-27510](CVE-2023/CVE-2023-275xx/CVE-2023-27510.json) (`2023-05-16T22:29:07.847`) +* [CVE-2023-31906](CVE-2023/CVE-2023-319xx/CVE-2023-31906.json) (`2023-05-16T23:11:15.007`) +* [CVE-2023-31907](CVE-2023/CVE-2023-319xx/CVE-2023-31907.json) (`2023-05-16T23:12:04.163`) ## Download and Usage