mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2023-05-17T00:00:24.004568+00:00
This commit is contained in:
parent
ecef3332c6
commit
76f957c5f6
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2020-14575",
|
"id": "CVE-2020-14575",
|
||||||
"sourceIdentifier": "secalert_us@oracle.com",
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||||||
"published": "2020-07-15T18:15:23.597",
|
"published": "2020-07-15T18:15:23.597",
|
||||||
"lastModified": "2022-07-01T15:18:32.567",
|
"lastModified": "2023-05-16T22:55:30.580",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -96,22 +96,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
{
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
|
||||||
"versionEndIncluding": "8.0.20",
|
|
||||||
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"nodes": [
|
"nodes": [
|
||||||
{
|
{
|
||||||
@ -196,6 +180,23 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.0.0",
|
||||||
|
"versionEndIncluding": "8.0.20",
|
||||||
|
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2020-14678",
|
"id": "CVE-2020-14678",
|
||||||
"sourceIdentifier": "secalert_us@oracle.com",
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||||||
"published": "2020-07-15T18:15:32.457",
|
"published": "2020-07-15T18:15:32.457",
|
||||||
"lastModified": "2022-06-30T21:00:30.310",
|
"lastModified": "2023-05-16T22:59:36.700",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -96,22 +96,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
{
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
|
||||||
"versionEndIncluding": "8.0.20",
|
|
||||||
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"nodes": [
|
"nodes": [
|
||||||
{
|
{
|
||||||
@ -171,6 +155,23 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.0.0",
|
||||||
|
"versionEndIncluding": "8.0.20",
|
||||||
|
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2020-14680",
|
"id": "CVE-2020-14680",
|
||||||
"sourceIdentifier": "secalert_us@oracle.com",
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||||||
"published": "2020-07-15T18:15:32.647",
|
"published": "2020-07-15T18:15:32.647",
|
||||||
"lastModified": "2022-06-30T21:01:56.163",
|
"lastModified": "2023-05-16T22:58:48.653",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -96,22 +96,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
{
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
|
||||||
"versionEndIncluding": "8.0.20",
|
|
||||||
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"nodes": [
|
"nodes": [
|
||||||
{
|
{
|
||||||
@ -171,6 +155,23 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.0.0",
|
||||||
|
"versionEndIncluding": "8.0.20",
|
||||||
|
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2020-14697",
|
"id": "CVE-2020-14697",
|
||||||
"sourceIdentifier": "secalert_us@oracle.com",
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||||||
"published": "2020-07-15T18:15:33.973",
|
"published": "2020-07-15T18:15:33.973",
|
||||||
"lastModified": "2022-06-30T21:03:05.463",
|
"lastModified": "2023-05-16T22:55:00.257",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -105,8 +105,9 @@
|
|||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.0.0",
|
||||||
"versionEndIncluding": "8.0.20",
|
"versionEndIncluding": "8.0.20",
|
||||||
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
|
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2020-14702",
|
"id": "CVE-2020-14702",
|
||||||
"sourceIdentifier": "secalert_us@oracle.com",
|
"sourceIdentifier": "secalert_us@oracle.com",
|
||||||
"published": "2020-07-15T18:15:34.397",
|
"published": "2020-07-15T18:15:34.397",
|
||||||
"lastModified": "2022-06-30T20:47:58.960",
|
"lastModified": "2023-05-16T22:56:00.377",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -96,22 +96,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
{
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
|
||||||
"versionEndIncluding": "8.0.20",
|
|
||||||
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"nodes": [
|
"nodes": [
|
||||||
{
|
{
|
||||||
@ -171,6 +155,23 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.0.0",
|
||||||
|
"versionEndIncluding": "8.0.20",
|
||||||
|
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2020-15888",
|
"id": "CVE-2020-15888",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2020-07-21T22:15:12.090",
|
"published": "2020-07-21T22:15:12.090",
|
||||||
"lastModified": "2021-07-21T11:39:23.747",
|
"lastModified": "2023-05-16T22:31:05.550",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -92,9 +92,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:lua:lua:5.4.0:-:*:*:*:*:*:*",
|
||||||
"versionEndIncluding": "5.4.0",
|
"matchCriteriaId": "E9F78BF8-B73C-42C6-AF54-2CD935670053"
|
||||||
"matchCriteriaId": "0081016A-225E-4C17-8B9E-F39047CA61CD"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2020-16168",
|
"id": "CVE-2020-16168",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2020-08-07T13:15:10.777",
|
"published": "2020-08-07T13:15:10.777",
|
||||||
"lastModified": "2020-09-02T19:15:17.500",
|
"lastModified": "2023-05-16T22:42:15.457",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -85,8 +85,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:robotemi:temi_firmware:20190419.165201:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:robotemi:temi_firmware:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "EFC89C88-25E2-43D8-BA74-EB10820F24D8"
|
"versionEndExcluding": "1.3.7931",
|
||||||
|
"matchCriteriaId": "2B3C8C0D-7B39-48C1-BECE-70F96BD9FCF9"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0010.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0010.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0010",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.137",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.137",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0011.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0011.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0011",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.210",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.210",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0014.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0014.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0014",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.260",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.260",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0015.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0015.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0015",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.310",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.310",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0016.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0016.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0016",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.357",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.357",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0017.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0017.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0017",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.403",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.403",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0018.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0018.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0018",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.450",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.450",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0019.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0019.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0019",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.497",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.497",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0020.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0020.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0020",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.547",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.547",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0021.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0021.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0021",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.593",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.593",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0022.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0022.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0022",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.643",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.643",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0023.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0023.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0023",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.693",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.693",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0024.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0024.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0024",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.733",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.733",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0025.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0025.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0025",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.773",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.773",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0026.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0026.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0026",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.813",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.813",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0027.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0027.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0027",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.860",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.860",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0028.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0028.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0028",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.910",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.910",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0029.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0029.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0029",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:10.963",
|
||||||
|
"lastModified": "2023-05-16T22:15:10.963",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0030.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0030.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0030",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.010",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.010",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0031.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0031.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0031",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.060",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.060",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0032.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0032.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0032",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.107",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.107",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0033.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0033.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0033",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.157",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.157",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0034.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0034.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0034",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.207",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.207",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0035.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0035.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0035",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.247",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.247",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0036.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0036.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0036",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.290",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.290",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0037.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0037.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0037",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.337",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.337",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0038.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0038.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0038",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.387",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.387",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0039.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0039.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0039",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.423",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.423",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0040.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0040.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0040",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.470",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.470",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0041.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0041.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0041",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.513",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.513",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0042.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0042.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0042",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.557",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.557",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0043.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0043.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0043",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.600",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.600",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0044.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0044.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0044",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.647",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.647",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0045.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0045.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0045",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.693",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.693",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0046.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0046.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0046",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.737",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.737",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0047.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0047.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0047",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.780",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.780",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0048.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0048.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0048",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.823",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.823",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0049.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0049.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0049",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.867",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.867",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0050.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0050.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0050",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.917",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.917",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0059.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0059.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0059",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:11.963",
|
||||||
|
"lastModified": "2023-05-16T22:15:11.963",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0068.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0068.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0068",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.010",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.010",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0080.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0080.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0080",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.060",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.060",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0081.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0081.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0081",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.103",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.103",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0085.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0085.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0085",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.147",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.147",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0087.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0087.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0087",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.197",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.197",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-00xx/CVE-2021-0088.json
Normal file
15
CVE-2021/CVE-2021-00xx/CVE-2021-0088.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0088",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.243",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.243",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0122.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0122.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0122",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.287",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.287",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0123.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0123.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0123",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.327",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.327",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0128.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0128.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0128",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.370",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.370",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0130.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0130.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0130",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.410",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.410",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0136.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0136.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0136",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.457",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.457",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0137.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0137.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0137",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.507",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.507",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0138.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0138.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0138",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.553",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.553",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0139.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0139.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0139",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.597",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.597",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0140.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0140.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0140",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.637",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.637",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0141.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0141.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0141",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.677",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.677",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0142.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0142.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0142",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.720",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.720",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0149.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0149.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0149",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.763",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.763",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0150.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0150.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0150",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.810",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.810",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0181.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0181.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0181",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.857",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.857",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0184.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0184.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0184",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:12.903",
|
||||||
|
"lastModified": "2023-05-16T22:15:12.903",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
File diff suppressed because it is too large
Load Diff
15
CVE-2021/CVE-2021-01xx/CVE-2021-0191.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0191.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0191",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:13.460",
|
||||||
|
"lastModified": "2023-05-16T22:15:13.460",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0192.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0192.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0192",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:13.507",
|
||||||
|
"lastModified": "2023-05-16T22:15:13.507",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-01xx/CVE-2021-0195.json
Normal file
15
CVE-2021/CVE-2021-01xx/CVE-2021-0195.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-0195",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:13.557",
|
||||||
|
"lastModified": "2023-05-16T22:15:13.557",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-20600",
|
"id": "CVE-2021-20600",
|
||||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||||
"published": "2021-10-08T17:15:07.437",
|
"published": "2021-10-08T17:15:07.437",
|
||||||
"lastModified": "2022-07-07T16:15:08.927",
|
"lastModified": "2023-05-16T22:50:39.020",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -43,18 +43,18 @@
|
|||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "2.0",
|
"version": "2.0",
|
||||||
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||||||
"accessVector": "NETWORK",
|
"accessVector": "NETWORK",
|
||||||
"accessComplexity": "MEDIUM",
|
"accessComplexity": "MEDIUM",
|
||||||
"authentication": "NONE",
|
"authentication": "NONE",
|
||||||
"confidentialityImpact": "NONE",
|
"confidentialityImpact": "NONE",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"availabilityImpact": "PARTIAL",
|
"availabilityImpact": "COMPLETE",
|
||||||
"baseScore": 4.3
|
"baseScore": 7.1
|
||||||
},
|
},
|
||||||
"baseSeverity": "MEDIUM",
|
"baseSeverity": "HIGH",
|
||||||
"exploitabilityScore": 8.6,
|
"exploitabilityScore": 8.6,
|
||||||
"impactScore": 2.9,
|
"impactScore": 6.9,
|
||||||
"acInsufInfo": false,
|
"acInsufInfo": false,
|
||||||
"obtainAllPrivilege": false,
|
"obtainAllPrivilege": false,
|
||||||
"obtainUserPrivilege": false,
|
"obtainUserPrivilege": false,
|
||||||
@ -86,7 +86,8 @@
|
|||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:mitsubishielectric:r12ccpu-v_firmware:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:mitsubishielectric:r12ccpu-v_firmware:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "56BCED50-FEC2-4F26-81AC-0C3C9BD12C4B"
|
"versionEndIncluding": "16",
|
||||||
|
"matchCriteriaId": "B011D41D-5119-403C-A0A6-C872DA1ABB54"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
15
CVE-2021/CVE-2021-231xx/CVE-2021-23145.json
Normal file
15
CVE-2021/CVE-2021-231xx/CVE-2021-23145.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-23145",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:13.603",
|
||||||
|
"lastModified": "2023-05-16T22:15:13.603",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-269xx/CVE-2021-26946.json
Normal file
15
CVE-2021/CVE-2021-269xx/CVE-2021-26946.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-26946",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:13.647",
|
||||||
|
"lastModified": "2023-05-16T22:15:13.647",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-330xx/CVE-2021-33065.json
Normal file
15
CVE-2021/CVE-2021-330xx/CVE-2021-33065.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-33065",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:13.700",
|
||||||
|
"lastModified": "2023-05-16T22:15:13.700",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-330xx/CVE-2021-33066.json
Normal file
15
CVE-2021/CVE-2021-330xx/CVE-2021-33066.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-33066",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:13.750",
|
||||||
|
"lastModified": "2023-05-16T22:15:13.750",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-330xx/CVE-2021-33067.json
Normal file
15
CVE-2021/CVE-2021-330xx/CVE-2021-33067.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-33067",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:13.787",
|
||||||
|
"lastModified": "2023-05-16T22:15:13.787",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2021/CVE-2021-330xx/CVE-2021-33070.json
Normal file
15
CVE-2021/CVE-2021-330xx/CVE-2021-33070.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-33070",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:13.830",
|
||||||
|
"lastModified": "2023-05-16T22:15:13.830",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-3609",
|
"id": "CVE-2021-3609",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2022-03-03T19:15:08.173",
|
"published": "2022-03-03T19:15:08.173",
|
||||||
"lastModified": "2023-02-12T23:41:20.010",
|
"lastModified": "2023-05-16T22:39:09.540",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -95,40 +95,40 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
"versionStartIncluding": "2.6.25",
|
"versionStartIncluding": "2.6.25",
|
||||||
"versionEndExcluding": "5.13",
|
"versionEndExcluding": "5.13",
|
||||||
"matchCriteriaId": "8EFC2DBA-66FA-4DAA-9541-E3A33920B255"
|
"matchCriteriaId": "1DCA7CEB-754B-474C-BB29-B3C5A04996AF"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "07CEAC13-3423-44F5-A2F8-6F5F846233C8"
|
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "F3CE353A-A5C0-4284-9D90-6B85475814B9"
|
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "4CDF8DC7-920B-45D8-BCED-B2FD21FE63FA"
|
"matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "3E8A9355-151F-476C-A0FD-747D46AAD110"
|
"matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "BCC24971-26E3-4C4C-8490-DCEAC102D29B"
|
"matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "B33BD284-D70B-4373-AE22-267AAE893A9B"
|
"matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-24738",
|
"id": "CVE-2022-24738",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2022-03-07T22:15:08.227",
|
"published": "2022-03-07T22:15:08.227",
|
||||||
"lastModified": "2022-03-17T15:55:20.160",
|
"lastModified": "2023-05-16T22:53:49.397",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -114,9 +114,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:tharsis:evmos:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "2.0.1",
|
"versionEndExcluding": "2.0.1",
|
||||||
"matchCriteriaId": "23DAB54E-9EC9-4A4B-84E2-6A7D52CDEBB5"
|
"matchCriteriaId": "5134674C-EAA2-423C-AB60-7CE330AC7BBB"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-27856",
|
"id": "CVE-2022-27856",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2023-05-10T11:15:09.587",
|
"published": "2023-05-10T11:15:09.587",
|
||||||
"lastModified": "2023-05-10T13:06:16.563",
|
"lastModified": "2023-05-16T21:56:30.183",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -46,10 +66,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:atlasgondal:export_all_urls:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "4.1",
|
||||||
|
"matchCriteriaId": "F432B27C-5C08-47F6-B226-FB41A39ED10F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/export-all-urls/wordpress-export-all-urls-plugin-4-1-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/export-all-urls/wordpress-export-all-urls-plugin-4-1-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-35266",
|
"id": "CVE-2022-35266",
|
||||||
"sourceIdentifier": "talos-cna@cisco.com",
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
"published": "2022-10-25T17:15:54.120",
|
"published": "2022-10-25T17:15:54.120",
|
||||||
"lastModified": "2022-12-23T00:15:13.423",
|
"lastModified": "2023-05-16T22:36:44.887",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-45061",
|
"id": "CVE-2022-45061",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2022-11-09T07:15:09.887",
|
"published": "2022-11-09T07:15:09.887",
|
||||||
"lastModified": "2023-05-03T11:15:11.877",
|
"lastModified": "2023-05-16T23:04:21.670",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -48,6 +48,7 @@
|
|||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
|
"operator": "AND",
|
||||||
"nodes": [
|
"nodes": [
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
@ -160,11 +161,17 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"operator": "AND",
|
||||||
"nodes": [
|
"nodes": [
|
||||||
{
|
{
|
||||||
"operator": "OR",
|
"operator": "OR",
|
||||||
"negate": false,
|
"negate": false,
|
||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
|
||||||
@ -178,6 +185,79 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
|
||||||
|
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
|
||||||
|
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "24B8DB06-590A-4008-B0AB-FCD1401C77C6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "85DF4B3F-4BBC-42B7-B729-096934523D63"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8A6E548F-62E9-40CB-85DA-FDAA0F0096C6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
@ -192,11 +272,19 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/",
|
||||||
@ -208,39 +296,75 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/",
|
||||||
@ -252,63 +376,121 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security.gentoo.org/glsa/202305-02",
|
"url": "https://security.gentoo.org/glsa/202305-02",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://security.netapp.com/advisory/ntap-20221209-0007/",
|
"url": "https://security.netapp.com/advisory/ntap-20221209-0007/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-47137",
|
"id": "CVE-2022-47137",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2023-05-10T11:15:09.967",
|
"published": "2023-05-10T11:15:09.967",
|
||||||
"lastModified": "2023-05-10T13:06:16.563",
|
"lastModified": "2023-05-16T21:58:18.313",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -36,7 +56,7 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
@ -44,12 +64,43 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:wpmanageninja:ninja_tables:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "4.3.4",
|
||||||
|
"matchCriteriaId": "9A71DD56-FD3F-40AF-9808-8CC2315C5BDB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-best-data-table-plugin-for-wordpress-plugin-4-3-4-cross-site-scripting-xss?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-best-data-table-plugin-for-wordpress-plugin-4-3-4-cross-site-scripting-xss?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-47423",
|
"id": "CVE-2022-47423",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2023-05-10T11:15:10.157",
|
"published": "2023-05-10T11:15:10.157",
|
||||||
"lastModified": "2023-05-10T13:06:16.563",
|
"lastModified": "2023-05-16T22:08:09.307",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -46,10 +66,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:wp-dtree_project:wp-dtree:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "4.4.5",
|
||||||
|
"matchCriteriaId": "8895F418-5443-41AB-A5CA-EBD1C0932B0A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-scripting-xss?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-scripting-xss?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-47436",
|
"id": "CVE-2022-47436",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2023-05-10T11:15:10.307",
|
"published": "2023-05-10T11:15:10.307",
|
||||||
"lastModified": "2023-05-10T13:06:16.563",
|
"lastModified": "2023-05-16T22:09:53.720",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -46,10 +66,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mantrabrain:yatra:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "2.1.14",
|
||||||
|
"matchCriteriaId": "60CBD372-29D9-43DD-BA5D-1CD821531052"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/yatra/wordpress-best-travel-booking-wordpress-plugin-tour-booking-system-trip-booking-wordpress-plugin-yatra-plugin-2-1-13-cross-site-scripting-xss?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/yatra/wordpress-best-travel-booking-wordpress-plugin-tour-booking-system-trip-booking-wordpress-plugin-yatra-plugin-2-1-13-cross-site-scripting-xss?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,23 +2,106 @@
|
|||||||
"id": "CVE-2023-27510",
|
"id": "CVE-2023-27510",
|
||||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||||
"published": "2023-05-10T06:15:13.807",
|
"published": "2023-05-10T06:15:13.807",
|
||||||
"lastModified": "2023-05-10T13:06:16.563",
|
"lastModified": "2023-05-16T22:29:07.847",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "JB Inquiry form contains an exposure of private personal information to an unauthorized actor vulnerability, which may allow a remote unauthenticated attacker to obtain information entered from forms created using the affected product. The affected products and versions are as follows: JB Inquiry form versions 0.6.1 and 0.6.0, JB Inquiry form versions 0.5.2, 0.5.1 and 0.5.0, and JB Inquiry form version 0.40."
|
"value": "JB Inquiry form contains an exposure of private personal information to an unauthorized actor vulnerability, which may allow a remote unauthenticated attacker to obtain information entered from forms created using the affected product. The affected products and versions are as follows: JB Inquiry form versions 0.6.1 and 0.6.0, JB Inquiry form versions 0.5.2, 0.5.1 and 0.5.0, and JB Inquiry form version 0.40."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.5.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "551D6264-5C5B-4CB5-A79E-77614A4619FA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.5.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3845790E-96A1-41D8-8C63-34C38862075F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.5.2:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "6262C814-C397-4DAE-920F-CAFA9162F2B5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.6.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4A7B3B7F-341D-42F2-846B-FA5A36924974"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.6.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4D04C8BD-88F3-4070-AC82-61CB32CAC814"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.40:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8F3C55CD-138D-4B56-A59A-A90F30674ADC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://jubei.co.jp/formmail/info20230414.html",
|
"url": "https://jubei.co.jp/formmail/info20230414.html",
|
||||||
"source": "vultures@jpcert.or.jp"
|
"source": "vultures@jpcert.or.jp",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://jvn.jp/en/jp/JVN36340790/",
|
"url": "https://jvn.jp/en/jp/JVN36340790/",
|
||||||
"source": "vultures@jpcert.or.jp"
|
"source": "vultures@jpcert.or.jp",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
20
CVE-2023/CVE-2023-316xx/CVE-2023-31677.json
Normal file
20
CVE-2023/CVE-2023-316xx/CVE-2023-31677.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-31677",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:13.913",
|
||||||
|
"lastModified": "2023-05-16T22:15:13.913",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Insecure permissions in luowice 3.5.18 allow attackers to view information for other alarm devices via modification of the eseeid parameter."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zzh-newlearner/record/blob/main/luowice.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2023/CVE-2023-316xx/CVE-2023-31678.json
Normal file
20
CVE-2023/CVE-2023-316xx/CVE-2023-31678.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-31678",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:13.957",
|
||||||
|
"lastModified": "2023-05-16T22:15:13.957",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Incorrect access control in Videogo v6.8.1 allows attackers to bind shared devices after the connection has been ended."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zzh-newlearner/record/blob/main/yingshi_devicekey.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2023/CVE-2023-316xx/CVE-2023-31679.json
Normal file
20
CVE-2023/CVE-2023-316xx/CVE-2023-31679.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-31679",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-05-16T22:15:14.003",
|
||||||
|
"lastModified": "2023-05-16T22:15:14.003",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Incorrect access control in Videogo v6.8.1 allows attackers to access images from other devices via modification of the Device Id parameter."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zzh-newlearner/record/blob/main/yingshi_privacy.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,19 +2,76 @@
|
|||||||
"id": "CVE-2023-31906",
|
"id": "CVE-2023-31906",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-05-10T15:15:10.187",
|
"published": "2023-05-10T15:15:10.187",
|
||||||
"lastModified": "2023-05-10T15:26:03.940",
|
"lastModified": "2023-05-16T23:11:15.007",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c."
|
"value": "Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/jerryscript-project/jerryscript/issues/5066",
|
"url": "https://github.com/jerryscript-project/jerryscript/issues/5066",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,19 +2,76 @@
|
|||||||
"id": "CVE-2023-31907",
|
"id": "CVE-2023-31907",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-05-10T15:15:10.353",
|
"published": "2023-05-10T15:15:10.353",
|
||||||
"lastModified": "2023-05-10T15:26:03.940",
|
"lastModified": "2023-05-16T23:12:04.163",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via the component scanner_literal_is_created at /jerry-core/parser/js/js-scanner-util.c."
|
"value": "Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via the component scanner_literal_is_created at /jerry-core/parser/js/js-scanner-util.c."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/jerryscript-project/jerryscript/issues/5073",
|
"url": "https://github.com/jerryscript-project/jerryscript/issues/5073",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Issue Tracking",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
227
README.md
227
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-05-16T21:55:25.390018+00:00
|
2023-05-17T00:00:24.004568+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-05-16T21:51:49.343000+00:00
|
2023-05-16T23:12:04.163000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -29,143 +29,112 @@ Download and Changelog: [Click](releases/latest)
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
215422
|
215495
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `6`
|
Recently added CVEs: `73`
|
||||||
|
|
||||||
* [CVE-2021-27131](CVE-2021/CVE-2021-271xx/CVE-2021-27131.json) (`2023-05-16T20:15:08.987`)
|
* [CVE-2021-0010](CVE-2021/CVE-2021-00xx/CVE-2021-0010.json) (`2023-05-16T22:15:10.137`)
|
||||||
* [CVE-2023-27742](CVE-2023/CVE-2023-277xx/CVE-2023-27742.json) (`2023-05-16T20:15:09.093`)
|
* [CVE-2021-0011](CVE-2021/CVE-2021-00xx/CVE-2021-0011.json) (`2023-05-16T22:15:10.210`)
|
||||||
* [CVE-2023-29927](CVE-2023/CVE-2023-299xx/CVE-2023-29927.json) (`2023-05-16T20:15:09.213`)
|
* [CVE-2021-0014](CVE-2021/CVE-2021-00xx/CVE-2021-0014.json) (`2023-05-16T22:15:10.260`)
|
||||||
* [CVE-2023-30189](CVE-2023/CVE-2023-301xx/CVE-2023-30189.json) (`2023-05-16T20:15:09.273`)
|
* [CVE-2021-0015](CVE-2021/CVE-2021-00xx/CVE-2021-0015.json) (`2023-05-16T22:15:10.310`)
|
||||||
* [CVE-2023-30281](CVE-2023/CVE-2023-302xx/CVE-2023-30281.json) (`2023-05-16T20:15:09.323`)
|
* [CVE-2021-0016](CVE-2021/CVE-2021-00xx/CVE-2021-0016.json) (`2023-05-16T22:15:10.357`)
|
||||||
* [CVE-2023-31544](CVE-2023/CVE-2023-315xx/CVE-2023-31544.json) (`2023-05-16T21:15:09.027`)
|
* [CVE-2021-0017](CVE-2021/CVE-2021-00xx/CVE-2021-0017.json) (`2023-05-16T22:15:10.403`)
|
||||||
|
* [CVE-2021-0018](CVE-2021/CVE-2021-00xx/CVE-2021-0018.json) (`2023-05-16T22:15:10.450`)
|
||||||
|
* [CVE-2021-0019](CVE-2021/CVE-2021-00xx/CVE-2021-0019.json) (`2023-05-16T22:15:10.497`)
|
||||||
|
* [CVE-2021-0020](CVE-2021/CVE-2021-00xx/CVE-2021-0020.json) (`2023-05-16T22:15:10.547`)
|
||||||
|
* [CVE-2021-0021](CVE-2021/CVE-2021-00xx/CVE-2021-0021.json) (`2023-05-16T22:15:10.593`)
|
||||||
|
* [CVE-2021-0022](CVE-2021/CVE-2021-00xx/CVE-2021-0022.json) (`2023-05-16T22:15:10.643`)
|
||||||
|
* [CVE-2021-0023](CVE-2021/CVE-2021-00xx/CVE-2021-0023.json) (`2023-05-16T22:15:10.693`)
|
||||||
|
* [CVE-2021-0024](CVE-2021/CVE-2021-00xx/CVE-2021-0024.json) (`2023-05-16T22:15:10.733`)
|
||||||
|
* [CVE-2021-0025](CVE-2021/CVE-2021-00xx/CVE-2021-0025.json) (`2023-05-16T22:15:10.773`)
|
||||||
|
* [CVE-2021-0026](CVE-2021/CVE-2021-00xx/CVE-2021-0026.json) (`2023-05-16T22:15:10.813`)
|
||||||
|
* [CVE-2021-0027](CVE-2021/CVE-2021-00xx/CVE-2021-0027.json) (`2023-05-16T22:15:10.860`)
|
||||||
|
* [CVE-2021-0028](CVE-2021/CVE-2021-00xx/CVE-2021-0028.json) (`2023-05-16T22:15:10.910`)
|
||||||
|
* [CVE-2021-0029](CVE-2021/CVE-2021-00xx/CVE-2021-0029.json) (`2023-05-16T22:15:10.963`)
|
||||||
|
* [CVE-2021-0030](CVE-2021/CVE-2021-00xx/CVE-2021-0030.json) (`2023-05-16T22:15:11.010`)
|
||||||
|
* [CVE-2021-0031](CVE-2021/CVE-2021-00xx/CVE-2021-0031.json) (`2023-05-16T22:15:11.060`)
|
||||||
|
* [CVE-2021-0032](CVE-2021/CVE-2021-00xx/CVE-2021-0032.json) (`2023-05-16T22:15:11.107`)
|
||||||
|
* [CVE-2021-0033](CVE-2021/CVE-2021-00xx/CVE-2021-0033.json) (`2023-05-16T22:15:11.157`)
|
||||||
|
* [CVE-2021-0034](CVE-2021/CVE-2021-00xx/CVE-2021-0034.json) (`2023-05-16T22:15:11.207`)
|
||||||
|
* [CVE-2021-0035](CVE-2021/CVE-2021-00xx/CVE-2021-0035.json) (`2023-05-16T22:15:11.247`)
|
||||||
|
* [CVE-2021-0036](CVE-2021/CVE-2021-00xx/CVE-2021-0036.json) (`2023-05-16T22:15:11.290`)
|
||||||
|
* [CVE-2021-0037](CVE-2021/CVE-2021-00xx/CVE-2021-0037.json) (`2023-05-16T22:15:11.337`)
|
||||||
|
* [CVE-2021-0038](CVE-2021/CVE-2021-00xx/CVE-2021-0038.json) (`2023-05-16T22:15:11.387`)
|
||||||
|
* [CVE-2021-0039](CVE-2021/CVE-2021-00xx/CVE-2021-0039.json) (`2023-05-16T22:15:11.423`)
|
||||||
|
* [CVE-2021-0040](CVE-2021/CVE-2021-00xx/CVE-2021-0040.json) (`2023-05-16T22:15:11.470`)
|
||||||
|
* [CVE-2021-0041](CVE-2021/CVE-2021-00xx/CVE-2021-0041.json) (`2023-05-16T22:15:11.513`)
|
||||||
|
* [CVE-2021-0042](CVE-2021/CVE-2021-00xx/CVE-2021-0042.json) (`2023-05-16T22:15:11.557`)
|
||||||
|
* [CVE-2021-0043](CVE-2021/CVE-2021-00xx/CVE-2021-0043.json) (`2023-05-16T22:15:11.600`)
|
||||||
|
* [CVE-2021-0044](CVE-2021/CVE-2021-00xx/CVE-2021-0044.json) (`2023-05-16T22:15:11.647`)
|
||||||
|
* [CVE-2021-0045](CVE-2021/CVE-2021-00xx/CVE-2021-0045.json) (`2023-05-16T22:15:11.693`)
|
||||||
|
* [CVE-2021-0046](CVE-2021/CVE-2021-00xx/CVE-2021-0046.json) (`2023-05-16T22:15:11.737`)
|
||||||
|
* [CVE-2021-0047](CVE-2021/CVE-2021-00xx/CVE-2021-0047.json) (`2023-05-16T22:15:11.780`)
|
||||||
|
* [CVE-2021-0048](CVE-2021/CVE-2021-00xx/CVE-2021-0048.json) (`2023-05-16T22:15:11.823`)
|
||||||
|
* [CVE-2021-0049](CVE-2021/CVE-2021-00xx/CVE-2021-0049.json) (`2023-05-16T22:15:11.867`)
|
||||||
|
* [CVE-2021-0050](CVE-2021/CVE-2021-00xx/CVE-2021-0050.json) (`2023-05-16T22:15:11.917`)
|
||||||
|
* [CVE-2021-0059](CVE-2021/CVE-2021-00xx/CVE-2021-0059.json) (`2023-05-16T22:15:11.963`)
|
||||||
|
* [CVE-2021-0068](CVE-2021/CVE-2021-00xx/CVE-2021-0068.json) (`2023-05-16T22:15:12.010`)
|
||||||
|
* [CVE-2021-0080](CVE-2021/CVE-2021-00xx/CVE-2021-0080.json) (`2023-05-16T22:15:12.060`)
|
||||||
|
* [CVE-2021-0081](CVE-2021/CVE-2021-00xx/CVE-2021-0081.json) (`2023-05-16T22:15:12.103`)
|
||||||
|
* [CVE-2021-0085](CVE-2021/CVE-2021-00xx/CVE-2021-0085.json) (`2023-05-16T22:15:12.147`)
|
||||||
|
* [CVE-2021-0087](CVE-2021/CVE-2021-00xx/CVE-2021-0087.json) (`2023-05-16T22:15:12.197`)
|
||||||
|
* [CVE-2021-0088](CVE-2021/CVE-2021-00xx/CVE-2021-0088.json) (`2023-05-16T22:15:12.243`)
|
||||||
|
* [CVE-2021-0122](CVE-2021/CVE-2021-01xx/CVE-2021-0122.json) (`2023-05-16T22:15:12.287`)
|
||||||
|
* [CVE-2021-0123](CVE-2021/CVE-2021-01xx/CVE-2021-0123.json) (`2023-05-16T22:15:12.327`)
|
||||||
|
* [CVE-2021-0128](CVE-2021/CVE-2021-01xx/CVE-2021-0128.json) (`2023-05-16T22:15:12.370`)
|
||||||
|
* [CVE-2021-0130](CVE-2021/CVE-2021-01xx/CVE-2021-0130.json) (`2023-05-16T22:15:12.410`)
|
||||||
|
* [CVE-2021-0136](CVE-2021/CVE-2021-01xx/CVE-2021-0136.json) (`2023-05-16T22:15:12.457`)
|
||||||
|
* [CVE-2021-0137](CVE-2021/CVE-2021-01xx/CVE-2021-0137.json) (`2023-05-16T22:15:12.507`)
|
||||||
|
* [CVE-2021-0138](CVE-2021/CVE-2021-01xx/CVE-2021-0138.json) (`2023-05-16T22:15:12.553`)
|
||||||
|
* [CVE-2021-0139](CVE-2021/CVE-2021-01xx/CVE-2021-0139.json) (`2023-05-16T22:15:12.597`)
|
||||||
|
* [CVE-2021-0140](CVE-2021/CVE-2021-01xx/CVE-2021-0140.json) (`2023-05-16T22:15:12.637`)
|
||||||
|
* [CVE-2021-0141](CVE-2021/CVE-2021-01xx/CVE-2021-0141.json) (`2023-05-16T22:15:12.677`)
|
||||||
|
* [CVE-2021-0142](CVE-2021/CVE-2021-01xx/CVE-2021-0142.json) (`2023-05-16T22:15:12.720`)
|
||||||
|
* [CVE-2021-0149](CVE-2021/CVE-2021-01xx/CVE-2021-0149.json) (`2023-05-16T22:15:12.763`)
|
||||||
|
* [CVE-2021-0150](CVE-2021/CVE-2021-01xx/CVE-2021-0150.json) (`2023-05-16T22:15:12.810`)
|
||||||
|
* [CVE-2021-0181](CVE-2021/CVE-2021-01xx/CVE-2021-0181.json) (`2023-05-16T22:15:12.857`)
|
||||||
|
* [CVE-2021-0184](CVE-2021/CVE-2021-01xx/CVE-2021-0184.json) (`2023-05-16T22:15:12.903`)
|
||||||
|
* [CVE-2021-0191](CVE-2021/CVE-2021-01xx/CVE-2021-0191.json) (`2023-05-16T22:15:13.460`)
|
||||||
|
* [CVE-2021-0192](CVE-2021/CVE-2021-01xx/CVE-2021-0192.json) (`2023-05-16T22:15:13.507`)
|
||||||
|
* [CVE-2021-0195](CVE-2021/CVE-2021-01xx/CVE-2021-0195.json) (`2023-05-16T22:15:13.557`)
|
||||||
|
* [CVE-2021-23145](CVE-2021/CVE-2021-231xx/CVE-2021-23145.json) (`2023-05-16T22:15:13.603`)
|
||||||
|
* [CVE-2021-26946](CVE-2021/CVE-2021-269xx/CVE-2021-26946.json) (`2023-05-16T22:15:13.647`)
|
||||||
|
* [CVE-2021-33065](CVE-2021/CVE-2021-330xx/CVE-2021-33065.json) (`2023-05-16T22:15:13.700`)
|
||||||
|
* [CVE-2021-33066](CVE-2021/CVE-2021-330xx/CVE-2021-33066.json) (`2023-05-16T22:15:13.750`)
|
||||||
|
* [CVE-2021-33067](CVE-2021/CVE-2021-330xx/CVE-2021-33067.json) (`2023-05-16T22:15:13.787`)
|
||||||
|
* [CVE-2021-33070](CVE-2021/CVE-2021-330xx/CVE-2021-33070.json) (`2023-05-16T22:15:13.830`)
|
||||||
|
* [CVE-2023-31677](CVE-2023/CVE-2023-316xx/CVE-2023-31677.json) (`2023-05-16T22:15:13.913`)
|
||||||
|
* [CVE-2023-31678](CVE-2023/CVE-2023-316xx/CVE-2023-31678.json) (`2023-05-16T22:15:13.957`)
|
||||||
|
* [CVE-2023-31679](CVE-2023/CVE-2023-316xx/CVE-2023-31679.json) (`2023-05-16T22:15:14.003`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `118`
|
Recently modified CVEs: `20`
|
||||||
|
|
||||||
* [CVE-2017-14025](CVE-2017/CVE-2017-140xx/CVE-2017-14025.json) (`2023-05-16T20:58:31.210`)
|
* [CVE-2020-14575](CVE-2020/CVE-2020-145xx/CVE-2020-14575.json) (`2023-05-16T22:55:30.580`)
|
||||||
* [CVE-2017-15583](CVE-2017/CVE-2017-155xx/CVE-2017-15583.json) (`2023-05-16T20:58:31.210`)
|
* [CVE-2020-14678](CVE-2020/CVE-2020-146xx/CVE-2020-14678.json) (`2023-05-16T22:59:36.700`)
|
||||||
* [CVE-2017-16731](CVE-2017/CVE-2017-167xx/CVE-2017-16731.json) (`2023-05-16T20:10:13.340`)
|
* [CVE-2020-14680](CVE-2020/CVE-2020-146xx/CVE-2020-14680.json) (`2023-05-16T22:58:48.653`)
|
||||||
* [CVE-2018-1168](CVE-2018/CVE-2018-11xx/CVE-2018-1168.json) (`2023-05-16T21:04:23.433`)
|
* [CVE-2020-14697](CVE-2020/CVE-2020-146xx/CVE-2020-14697.json) (`2023-05-16T22:55:00.257`)
|
||||||
* [CVE-2018-14805](CVE-2018/CVE-2018-148xx/CVE-2018-14805.json) (`2023-05-16T20:21:29.777`)
|
* [CVE-2020-14702](CVE-2020/CVE-2020-147xx/CVE-2020-14702.json) (`2023-05-16T22:56:00.377`)
|
||||||
* [CVE-2018-20720](CVE-2018/CVE-2018-207xx/CVE-2018-20720.json) (`2023-05-16T21:02:25.137`)
|
* [CVE-2020-15888](CVE-2020/CVE-2020-158xx/CVE-2020-15888.json) (`2023-05-16T22:31:05.550`)
|
||||||
* [CVE-2019-0097](CVE-2019/CVE-2019-00xx/CVE-2019-0097.json) (`2023-05-16T21:43:11.747`)
|
* [CVE-2020-16168](CVE-2020/CVE-2020-161xx/CVE-2020-16168.json) (`2023-05-16T22:42:15.457`)
|
||||||
* [CVE-2019-18247](CVE-2019/CVE-2019-182xx/CVE-2019-18247.json) (`2023-05-16T21:02:25.137`)
|
* [CVE-2021-0187](CVE-2021/CVE-2021-01xx/CVE-2021-0187.json) (`2023-05-16T22:15:13.397`)
|
||||||
* [CVE-2019-18253](CVE-2019/CVE-2019-182xx/CVE-2019-18253.json) (`2023-05-16T21:02:25.137`)
|
* [CVE-2021-20600](CVE-2021/CVE-2021-206xx/CVE-2021-20600.json) (`2023-05-16T22:50:39.020`)
|
||||||
* [CVE-2019-18998](CVE-2019/CVE-2019-189xx/CVE-2019-18998.json) (`2023-05-16T20:06:09.550`)
|
* [CVE-2021-3609](CVE-2021/CVE-2021-36xx/CVE-2021-3609.json) (`2023-05-16T22:39:09.540`)
|
||||||
* [CVE-2019-19000](CVE-2019/CVE-2019-190xx/CVE-2019-19000.json) (`2023-05-16T20:21:29.777`)
|
* [CVE-2022-24738](CVE-2022/CVE-2022-247xx/CVE-2022-24738.json) (`2023-05-16T22:53:49.397`)
|
||||||
* [CVE-2019-19001](CVE-2019/CVE-2019-190xx/CVE-2019-19001.json) (`2023-05-16T20:21:29.777`)
|
* [CVE-2022-27856](CVE-2022/CVE-2022-278xx/CVE-2022-27856.json) (`2023-05-16T21:56:30.183`)
|
||||||
* [CVE-2019-19002](CVE-2019/CVE-2019-190xx/CVE-2019-19002.json) (`2023-05-16T20:21:29.777`)
|
* [CVE-2022-35266](CVE-2022/CVE-2022-352xx/CVE-2022-35266.json) (`2023-05-16T22:36:44.887`)
|
||||||
* [CVE-2019-19003](CVE-2019/CVE-2019-190xx/CVE-2019-19003.json) (`2023-05-16T20:21:29.777`)
|
* [CVE-2022-45061](CVE-2022/CVE-2022-450xx/CVE-2022-45061.json) (`2023-05-16T23:04:21.670`)
|
||||||
* [CVE-2019-19089](CVE-2019/CVE-2019-190xx/CVE-2019-19089.json) (`2023-05-16T20:21:29.777`)
|
* [CVE-2022-47137](CVE-2022/CVE-2022-471xx/CVE-2022-47137.json) (`2023-05-16T21:58:18.313`)
|
||||||
* [CVE-2019-19090](CVE-2019/CVE-2019-190xx/CVE-2019-19090.json) (`2023-05-16T20:21:29.777`)
|
* [CVE-2022-47423](CVE-2022/CVE-2022-474xx/CVE-2022-47423.json) (`2023-05-16T22:08:09.307`)
|
||||||
* [CVE-2019-19091](CVE-2019/CVE-2019-190xx/CVE-2019-19091.json) (`2023-05-16T20:21:29.777`)
|
* [CVE-2022-47436](CVE-2022/CVE-2022-474xx/CVE-2022-47436.json) (`2023-05-16T22:09:53.720`)
|
||||||
* [CVE-2019-19092](CVE-2019/CVE-2019-190xx/CVE-2019-19092.json) (`2023-05-16T20:21:29.777`)
|
* [CVE-2023-27510](CVE-2023/CVE-2023-275xx/CVE-2023-27510.json) (`2023-05-16T22:29:07.847`)
|
||||||
* [CVE-2019-19093](CVE-2019/CVE-2019-190xx/CVE-2019-19093.json) (`2023-05-16T20:21:29.777`)
|
* [CVE-2023-31906](CVE-2023/CVE-2023-319xx/CVE-2023-31906.json) (`2023-05-16T23:11:15.007`)
|
||||||
* [CVE-2019-19094](CVE-2019/CVE-2019-190xx/CVE-2019-19094.json) (`2023-05-16T20:21:29.777`)
|
* [CVE-2023-31907](CVE-2023/CVE-2023-319xx/CVE-2023-31907.json) (`2023-05-16T23:12:04.163`)
|
||||||
* [CVE-2019-19095](CVE-2019/CVE-2019-190xx/CVE-2019-19095.json) (`2023-05-16T20:21:29.777`)
|
|
||||||
* [CVE-2019-19096](CVE-2019/CVE-2019-190xx/CVE-2019-19096.json) (`2023-05-16T20:21:29.777`)
|
|
||||||
* [CVE-2019-19097](CVE-2019/CVE-2019-190xx/CVE-2019-19097.json) (`2023-05-16T20:21:29.777`)
|
|
||||||
* [CVE-2019-5620](CVE-2019/CVE-2019-56xx/CVE-2019-5620.json) (`2023-05-16T20:44:12.157`)
|
|
||||||
* [CVE-2021-22278](CVE-2021/CVE-2021-222xx/CVE-2021-22278.json) (`2023-05-16T20:56:48.347`)
|
|
||||||
* [CVE-2021-26845](CVE-2021/CVE-2021-268xx/CVE-2021-26845.json) (`2023-05-16T20:21:29.777`)
|
|
||||||
* [CVE-2021-27196](CVE-2021/CVE-2021-271xx/CVE-2021-27196.json) (`2023-05-16T21:04:23.433`)
|
|
||||||
* [CVE-2021-27414](CVE-2021/CVE-2021-274xx/CVE-2021-27414.json) (`2023-05-16T20:16:56.977`)
|
|
||||||
* [CVE-2021-27416](CVE-2021/CVE-2021-274xx/CVE-2021-27416.json) (`2023-05-16T20:16:56.977`)
|
|
||||||
* [CVE-2021-31239](CVE-2021/CVE-2021-312xx/CVE-2021-31239.json) (`2023-05-16T21:03:51.827`)
|
|
||||||
* [CVE-2021-35526](CVE-2021/CVE-2021-355xx/CVE-2021-35526.json) (`2023-05-16T20:56:48.347`)
|
|
||||||
* [CVE-2021-35527](CVE-2021/CVE-2021-355xx/CVE-2021-35527.json) (`2023-05-16T20:21:29.777`)
|
|
||||||
* [CVE-2021-35529](CVE-2021/CVE-2021-355xx/CVE-2021-35529.json) (`2023-05-16T20:09:00.503`)
|
|
||||||
* [CVE-2021-35533](CVE-2021/CVE-2021-355xx/CVE-2021-35533.json) (`2023-05-16T21:04:23.433`)
|
|
||||||
* [CVE-2022-28613](CVE-2022/CVE-2022-286xx/CVE-2022-28613.json) (`2023-05-16T21:04:23.433`)
|
|
||||||
* [CVE-2023-0536](CVE-2023/CVE-2023-05xx/CVE-2023-0536.json) (`2023-05-16T20:05:41.627`)
|
|
||||||
* [CVE-2023-1031](CVE-2023/CVE-2023-10xx/CVE-2023-1031.json) (`2023-05-16T20:00:29.527`)
|
|
||||||
* [CVE-2023-2195](CVE-2023/CVE-2023-21xx/CVE-2023-2195.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2196](CVE-2023/CVE-2023-21xx/CVE-2023-2196.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-22361](CVE-2023/CVE-2023-223xx/CVE-2023-22361.json) (`2023-05-16T21:13:19.133`)
|
|
||||||
* [CVE-2023-22696](CVE-2023/CVE-2023-226xx/CVE-2023-22696.json) (`2023-05-16T21:25:22.240`)
|
|
||||||
* [CVE-2023-23794](CVE-2023/CVE-2023-237xx/CVE-2023-23794.json) (`2023-05-16T21:32:54.857`)
|
|
||||||
* [CVE-2023-23873](CVE-2023/CVE-2023-238xx/CVE-2023-23873.json) (`2023-05-16T21:35:51.213`)
|
|
||||||
* [CVE-2023-24406](CVE-2023/CVE-2023-244xx/CVE-2023-24406.json) (`2023-05-16T21:37:27.610`)
|
|
||||||
* [CVE-2023-25824](CVE-2023/CVE-2023-258xx/CVE-2023-25824.json) (`2023-05-16T20:54:11.347`)
|
|
||||||
* [CVE-2023-2631](CVE-2023/CVE-2023-26xx/CVE-2023-2631.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2632](CVE-2023/CVE-2023-26xx/CVE-2023-2632.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2633](CVE-2023/CVE-2023-26xx/CVE-2023-2633.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2721](CVE-2023/CVE-2023-27xx/CVE-2023-2721.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2722](CVE-2023/CVE-2023-27xx/CVE-2023-2722.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2723](CVE-2023/CVE-2023-27xx/CVE-2023-2723.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2724](CVE-2023/CVE-2023-27xx/CVE-2023-2724.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2725](CVE-2023/CVE-2023-27xx/CVE-2023-2725.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2726](CVE-2023/CVE-2023-27xx/CVE-2023-2726.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2738](CVE-2023/CVE-2023-27xx/CVE-2023-2738.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2739](CVE-2023/CVE-2023-27xx/CVE-2023-2739.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-2740](CVE-2023/CVE-2023-27xx/CVE-2023-2740.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-27419](CVE-2023/CVE-2023-274xx/CVE-2023-27419.json) (`2023-05-16T21:39:13.027`)
|
|
||||||
* [CVE-2023-27455](CVE-2023/CVE-2023-274xx/CVE-2023-27455.json) (`2023-05-16T21:43:52.443`)
|
|
||||||
* [CVE-2023-27527](CVE-2023/CVE-2023-275xx/CVE-2023-27527.json) (`2023-05-16T20:33:27.193`)
|
|
||||||
* [CVE-2023-27888](CVE-2023/CVE-2023-278xx/CVE-2023-27888.json) (`2023-05-16T20:20:33.970`)
|
|
||||||
* [CVE-2023-28076](CVE-2023/CVE-2023-280xx/CVE-2023-28076.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-28128](CVE-2023/CVE-2023-281xx/CVE-2023-28128.json) (`2023-05-16T20:15:09.140`)
|
|
||||||
* [CVE-2023-28318](CVE-2023/CVE-2023-283xx/CVE-2023-28318.json) (`2023-05-16T20:03:20.540`)
|
|
||||||
* [CVE-2023-28932](CVE-2023/CVE-2023-289xx/CVE-2023-28932.json) (`2023-05-16T21:23:45.097`)
|
|
||||||
* [CVE-2023-29101](CVE-2023/CVE-2023-291xx/CVE-2023-29101.json) (`2023-05-16T21:51:49.343`)
|
|
||||||
* [CVE-2023-29439](CVE-2023/CVE-2023-294xx/CVE-2023-29439.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-30501](CVE-2023/CVE-2023-305xx/CVE-2023-30501.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-30502](CVE-2023/CVE-2023-305xx/CVE-2023-30502.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-30503](CVE-2023/CVE-2023-305xx/CVE-2023-30503.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-30504](CVE-2023/CVE-2023-305xx/CVE-2023-30504.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-30505](CVE-2023/CVE-2023-305xx/CVE-2023-30505.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-30506](CVE-2023/CVE-2023-305xx/CVE-2023-30506.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-30507](CVE-2023/CVE-2023-305xx/CVE-2023-30507.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-30508](CVE-2023/CVE-2023-305xx/CVE-2023-30508.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-30509](CVE-2023/CVE-2023-305xx/CVE-2023-30509.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-30510](CVE-2023/CVE-2023-305xx/CVE-2023-30510.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-31519](CVE-2023/CVE-2023-315xx/CVE-2023-31519.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-31572](CVE-2023/CVE-2023-315xx/CVE-2023-31572.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-31576](CVE-2023/CVE-2023-315xx/CVE-2023-31576.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-31587](CVE-2023/CVE-2023-315xx/CVE-2023-31587.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-31856](CVE-2023/CVE-2023-318xx/CVE-2023-31856.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-31857](CVE-2023/CVE-2023-318xx/CVE-2023-31857.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-31890](CVE-2023/CVE-2023-318xx/CVE-2023-31890.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32568](CVE-2023/CVE-2023-325xx/CVE-2023-32568.json) (`2023-05-16T20:09:16.343`)
|
|
||||||
* [CVE-2023-32569](CVE-2023/CVE-2023-325xx/CVE-2023-32569.json) (`2023-05-16T20:13:37.477`)
|
|
||||||
* [CVE-2023-32570](CVE-2023/CVE-2023-325xx/CVE-2023-32570.json) (`2023-05-16T20:48:09.520`)
|
|
||||||
* [CVE-2023-32977](CVE-2023/CVE-2023-329xx/CVE-2023-32977.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32978](CVE-2023/CVE-2023-329xx/CVE-2023-32978.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32979](CVE-2023/CVE-2023-329xx/CVE-2023-32979.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32980](CVE-2023/CVE-2023-329xx/CVE-2023-32980.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32981](CVE-2023/CVE-2023-329xx/CVE-2023-32981.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32982](CVE-2023/CVE-2023-329xx/CVE-2023-32982.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32983](CVE-2023/CVE-2023-329xx/CVE-2023-32983.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32984](CVE-2023/CVE-2023-329xx/CVE-2023-32984.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32985](CVE-2023/CVE-2023-329xx/CVE-2023-32985.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32986](CVE-2023/CVE-2023-329xx/CVE-2023-32986.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32987](CVE-2023/CVE-2023-329xx/CVE-2023-32987.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32988](CVE-2023/CVE-2023-329xx/CVE-2023-32988.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32989](CVE-2023/CVE-2023-329xx/CVE-2023-32989.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32990](CVE-2023/CVE-2023-329xx/CVE-2023-32990.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32991](CVE-2023/CVE-2023-329xx/CVE-2023-32991.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32992](CVE-2023/CVE-2023-329xx/CVE-2023-32992.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32993](CVE-2023/CVE-2023-329xx/CVE-2023-32993.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32994](CVE-2023/CVE-2023-329xx/CVE-2023-32994.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32995](CVE-2023/CVE-2023-329xx/CVE-2023-32995.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32996](CVE-2023/CVE-2023-329xx/CVE-2023-32996.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32997](CVE-2023/CVE-2023-329xx/CVE-2023-32997.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32998](CVE-2023/CVE-2023-329xx/CVE-2023-32998.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-32999](CVE-2023/CVE-2023-329xx/CVE-2023-32999.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-33000](CVE-2023/CVE-2023-330xx/CVE-2023-33000.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-33001](CVE-2023/CVE-2023-330xx/CVE-2023-33001.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-33002](CVE-2023/CVE-2023-330xx/CVE-2023-33002.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-33003](CVE-2023/CVE-2023-330xx/CVE-2023-33003.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-33004](CVE-2023/CVE-2023-330xx/CVE-2023-33004.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-33005](CVE-2023/CVE-2023-330xx/CVE-2023-33005.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-33006](CVE-2023/CVE-2023-330xx/CVE-2023-33006.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
* [CVE-2023-33007](CVE-2023/CVE-2023-330xx/CVE-2023-33007.json) (`2023-05-16T20:04:03.627`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
Loading…
x
Reference in New Issue
Block a user